0% found this document useful (0 votes)
60 views8 pages

Rachel Murphy 255275 Assignsubmission File Task 2-Threats of Using Online Communication Marked

Uploaded by

api-248749408
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views8 pages

Rachel Murphy 255275 Assignsubmission File Task 2-Threats of Using Online Communication Marked

Uploaded by

api-248749408
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Threats of using online communication

There are a number of threats of going online, mostly cyberbullying, spam, phishing, pharming, and denial of service attacks. Here is some information on these threats.

Cyber Bullying - Cyber bullying is when the internet or mobile phones are used to
send vicious and unpleasant messages to others with the direct intention of upsetting them. Most messages sent to cyberbully are often anonymous. Main threat-suicide

The statistics on bullying and suicide are alarming:


Suicide is the third leading cause of death among young people, resulting in about 4,400 deaths per year. For every suicide among young people, there are at least 100 suicide attempts. Over 14 percent of high school students have considered suicide, and almost 7 percent have attempted it. Bully victims are between 2 to 9 times more likely to consider suicide than non-victims, according to studies by Yale University. A study in Britain found that at least half of suicides among young people are related to bullying 10 to 14 year old girls may be at even higher risk for suicide, according to the study above. Nearly 30 percent of students are either bullies or victims of bullying, and 160,000 kids stay home from school every day because of fear of bullying.

How to prevent cyberbullying???


Make your profile private Always re-think what you are about to post before you do post Do not give out your phone number, address, school, credit card details Report and block the people bullying, you can do this through your privacy settings

Always speak out if you or someone you know is being cyberbullied to prevent it from happening to someone else.

Rachel Murphy

L2 COMPUTING

Spam - Spam is the use of electronic messaging systems to send bulk messages to large
quantities of people.

The statistics about spam:


14.5 billion messages are sent out globally per day from spam accounts. Spam makes up 45% of all emails. 36% of all spam messages are advertising-related emails. 31.7% is adult-related in subject. 26.5% of unwanted emails are related to financial matters.

How to prevent Spam???


Have multiple email addresses Have at least two email addresses. Keep your email address private Never publish your personal email address online. Never respond to any spam The more you reply, the more spam you will receive. Think before you click unsubscribe Spammers send fake unsubscribe letters, in an attempt to get active email addresses. If you click unsubscribe it will increase the amount of spam you receive. Keep your browser updated Make sure you use the latest version of your web browser and apply all the latest internet security patches. Use anti-spam filters.

Phishing - Phishing is a way of getting peoples personal


information.

The statistics about Phishing:


47% of people fall victim of phishing.
Between January 2005 and January 2006, more than 190,000 different phishing scams were reported. 11 million people have clicked on a fake link in their emails.

Rachel Murphy

L2 COMPUTING

How to prevent Phishing???


Install anti-spam software. Never click on links, download files or open attachments from people/companies you dont know. Never email personal information, even if you know the person. Beware if emails ask for personal information Protect your computer with an anti-virus and anti-spyware software and a firewall. Make sure you check online accounts and bank statements on a regular basis.

Pharming - Pharming is a scamming practice where malicious code is installed into


a personal computer or server, directing people to fake websites without their knowledge.

The statistics of Pharming:


Over 1300 internet domains were redirected to fake website in early March
2005.

How to prevent Pharming???


Only enter websites that have https in the http address. The s stands for secure. Check for authenticity certificates, in the properties option. Look for a padlock either at the bottom of the screen or on the computer task bar. If the padlock is locked it is a secure site. Install an anti-virus program, and keep these regularly updated.

Rachel Murphy

L2 COMPUTING

Denial of Service Attacks - Denial of service attacks is an attack against a website


or network and floods the servers with activity, such as emails. When servers are flooded with a lot of information, it will deny service to legitimate users of the network.

The statistics of denial of service attacks:


In Renalt, Argentina they suffered 37,000 accounts leaked. Camp, a Philippine Training Computer Centre had over 1,120
names, phone numbers, passwords, security questions, and answers put on the internet.

How to prevent denial of service attacks???


Software can be installed by administartors. The amount of damaged can be limited.

Safety and Security when setting up a web blog


Personal information
Dont use personal details. Make the web blog private. Keep others information private. Check your posts before you submit them. Make sure you dont mind the pics you post going on internet. Have a strong username and password. Limit login attempts. Keep your blog up to date. Keep your blog database up to date.

Safety and Security of Data


Firewall - A firewall protects computers from downloading harmful materials and
attachments.
Rachel Murphy 4 L2 COMPUTING

Why do you need a firewall???


Firewalls are needed to protect your computer from hackers, provides protection from online thieves, it also stops access being gained to network resources.

Anti-Virus Software Anti-virus software is software


that protects your computer against viruses.

Why do you need anti-virus software???


We need to use anti-virus software to prevent viruses from entering our computers.

Why is it dangerous to download files from the internet???


If you download files from the internet, this can be dangerous as you cant always tell what files are safe, and which arent safe. Although viruses can be easily attached to a file, they may also be disguised as a file. This could then bring viruses and unwanted programs into your computer.

Why can it be dangerous to open email attachments???


The dangers of opening an email attachment are viruses and Trojan horses. These attachments are sent from hackers. You can you can keep areas within the computer system locked so only some people can gain access into these areas, anti-virus software can be installed, regularly change passwords, set up a firewall. This can be prevented by running regular backups to the computer and its software.

Legislation
Data Protection Act some of these are listed below and these all protect data within
the computer system. 1. Data must be collected and used only within law and fairly. 2. Data must only be held and used for the reasons given to the information commissioner. 3. Data must only be used for registered purposes and only be disclosed to people mentioned with the register entry. It must not be given away or sold. 4. The information held must be adequate, relevant and mot excessive when compared with the purpose stated in the register. 5. Data must be accurate and kept up to date.
Rachel Murphy 5 L2 COMPUTING

6. Data must not be kept for longer than necessary for the registered purpose. 7. The information must be kept safe and secure. This also includes information being backed up and away from any unauthorised access. 8. Dad must not be transferred outside of the European Economic Area.

Computer Misuse Act


The computer misuse act is a law within the UK which makes it illegal to gain access to a computer using some elses personal details, username, password etc., which you dont have permission to use. This also makes deleting dat a of the computer illegal also.

Copyright
Copyright is a type of legal protection for creative things such as recorded, stored, wrote down in some way. Copyright covers things such as, books, images, music, films, and video. This allows the person who created it to have almost total control over whether or not other people can use or copy what the person has made. Every photo, song, book and website is protected and has the copyright symbol and if someone wants to use music or photos they have to pay to gain permission to use it.

Plagiarism
Plagiarism is when someone uses text from a book, the internet or something that someone has said and uses it as their own work and doesnt give the person who owns it credit for it.

Rachel Murphy

L2 COMPUTING

Bibliography http://www.bullyingstatistics.org/content/bullying-andsuicide.html http://www.deletecyberbullying.org/preventingcyberbullying/ http://answers.yahoo.com/question/index?qid=201101140545 27AAdnxPf http://www.spamlaws.com/spam-stats.html http://www.kaspersky.co.uk/internet-securitycenter/threats/spam-phishing http://www.privacymatters.com/identity-theftinformation/phishing.aspx http://searchsecurity.techtarget.com/definition/pharming http://ed271phishingandpharming.weebly.com/statistics.ht ml http://securityresponse.symantec.com/norton/clubsymantec /library/article.jsp?aid=cs_prevent_pharming http://answers.yahoo.com/question/index?qid=201012152037 22AACfE1A http://hackmageddon.com/tag/denial-of-service-attack/ http://www.wikihow.com/Keep-Your-Blog-Safe http://www.socialmediaexaminer.com/5-steps-to-ensureyour-wordpress-blog-is-secure/ http://in.answers.yahoo.com/question/index?qid=200904102 21346AALDf6q
Rachel Murphy 7 L2 COMPUTING

http://in.answers.yahoo.com/question/index;_ylt=AvsiF70U XKFTvLAwGHs.Fr5OSBV.;_ylv=3?qid=20100304071538AAl5FL0 http://uk.ask.com/question/why-is-it-dangerous-todownload-files-from-the-internet http://uk.ask.com/question/why-is-it-dangerous-todownload-files-from-the-internet http://uk.ask.com/question/what-are-the-dangers-ofopening-email-attachments http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/0dat aprotectionactrev5.shtml http://answers.yahoo.com/question/index?qid=201104120222 14AAaYwGi http://in.answers.yahoo.com/question/index?qid=201103272 13426AAy7Fgs http://answers.ask.com/computers/science/what_is_the_com puter_misuse_act

Rachel Murphy

L2 COMPUTING

You might also like