INTERNET SAFETY QUIZ

Similar documents
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Computer Viruses: How to Avoid Infection

Network Security and the Small Business

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

1 Introduction. Agenda Item: Work Item:

What's the difference between spyware and a virus? What is Scareware?

E-BUSINESS THREATS AND SOLUTIONS

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

How to stay safe online

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Virus Definition and Adware

PC Security and Maintenance

What are Viruses, Trojans, Worms & Spyware:

Computer Security Maintenance Information and Self-Check Activities

Learn to protect yourself from Identity Theft. First National Bank can help.

Get Started Guide - PC Tools Internet Security

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

What you can do prevent virus infections on your computer

Viruses and spam what you need to know

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Desktop and Laptop Security Policy

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Statistical Analysis of Internet Security Threats. Daniel G. James

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

Willem Wiechers 3 rd March 2015

Airtel PC Secure Trouble Shooting Guide

1 Introduction. Agenda Item: Work Item:

Spyware: Securing gateway and endpoint against data theft

ANDRA ZAHARIA MARCOM MANAGER

ZNetLive Malware Monitoring

The answers vary widely, but there are five components to every spyware definition:

Cyber Security Awareness

Stopping zombies, botnets and other - and web-borne threats

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

How Spyware and Anti-Spyware Work

GlobalSign Malware Monitoring

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Information Security Threat Trends

October Is National Cyber Security Awareness Month!

What is a Virus? What is a Worm? What is a Trojan Horse? How do worms and other viruses spread? Viruses on the Network. Reducing your virus Risk.

Cyber Security Awareness

Improving protection and security awareness amongst home users

Module 5: Analytical Writing

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Using Windows Update for Windows XP

Practical tips for a. Safe Christmas

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

WHITE PAPER. Understanding How File Size Affects Malware Detection

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Spyware. Summary. Overview of Spyware. Who Is Spying?

Emerging Trends in Malware - Antivirus and Beyond

General Security Best Practices

E Commerce and Internet Security

Outlook Safe Sender s Filtering

ESET SMART SECURITY 6

BE SAFE ONLINE: Lesson Plan

Introduction to Computer Security Table of Contents

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via (and How to Avoid That)

Dealing with spam mail

How To Understand What A Virus Is And How To Protect Yourself From A Virus

High Speed Internet - User Guide. Welcome to. your world.

Chapter 10. Privacy and Security. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES

white paper Malware Security and the Bottom Line

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Cyber Security Awareness. Internet Safety Intro.

Welcome. Thank you for choosing Cogeco High Speed Internet.

Cyber Security: Beginners Guide to Firewalls

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

ANTIVIRUS BEST PRACTICES

Network Security. Demo: Web browser

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Introduction to Computer Security

STOP. THINK. CONNECT. Online Safety Quiz

FKCC AUP/LOCAL AUTHORITY

Evolutionism of Intrusion Detection

Information Security Training on Malware

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

1949 Self-reproducing cellular automata Core Wars

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Don t Fall Victim to Cybercrime:

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Spyware and Viruses. There is a distinct difference between spyware and viruses.

Case study: What the? Online scams and identity theft

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Understanding Internet Security. What you need to protect yourself online.

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Transcription:

INTERNET SAFETY QUIZ Below are ten questions that have to do with safety on the Internet. If you are using the Internet for research, for social activities, communication, or just for fun (and even if you re not!) it s important that you know this information. 1. The Internet gives us access to many resources we couldn t otherwise come in contact with. 2. Information on the Internet can always be trusted to be factual. It wouldn t be online if it wasn t true. 3. Anything I send in my private email, IM or chat cannot be seen by others. 4. Websites must have my permission to put online any personal information about me, like my phone number, address or birthday. 5. If I want to know something about a stranger that sends me an Instant Message, I can check their profile and trust that information. 6. Installing a virus checker on my machine will keep my PC safe. 7. Putting blocking software on my child s PC will keep my child safe. 8. I can always trust emails and attachments I get from friends. 9. People who look for children to harm often don t get caught until they ve hurt over 30 children. 10. Criminals and terrorists are sending encrypted messages in photos as forwards being mass-emailed around the world.

INTERNET SAFETY QUIZ ANSWERS Below are ten questions that have to do with safety on the Internet. The truth about these safety issues is in italicized text following the question. 11. The Internet gives us access to many resources we couldn t otherwise come in contact with. That s probably the best thing about the Internet it gives us instant access to things that are far away, things that are locked away, things that even don t really exist yet. It s a travel agent, a museum guide, and a party with friends from other continents! 12. Information on the Internet can always be trusted to be factual. It wouldn t be online if it wasn t true. The Internet is an open forum for anyone and everyone. Bias is the rule rather than the exception. Evaluate carefully ALL information on websites, personal or public. 13. Anything I send in my private email, IM or chat cannot be seen by others. There are people and programs which can see into your private correspondence online. NEVER send personal information unless you are positive it is a secure site. 14. Websites must have my permission to put online any personal information about me, like my phone number, address or birthday.check out www.kysafeschools.org for a listing of websites that post exactly these things without your permission. 15. If I want to know something about a stranger that sends me an Instant Message, I can check their profile and trust that information. Part of the wonder of the Internet is it s anonymity and the scariest thing, too. Unlike the physical world, you cannot verify a person s age, location, etc. online so it s easier to lie and get away with it. 16. Installing a virus checker on my machine will keep my PC safe. Just installing the program will help for a little while, but new viruses are spawning all the time. Update and run the software at least once each month. 17. Putting blocking software on my child s PC will keep my child safe. Blocking software, by itself, will not keep your child safe from sending out personal information and putting your family at risk, among other things. 18. I can always trust emails and attachments I get from friends. New programs and viruses send out emails to everyone in your inbox without their knowledge or consent. Verify it is in fact from your friend first. 19. People who look for children to harm often don t get caught until they ve hurt over 30 children. Most online predators aren t caught until they ve terrorized or harmed at least this many children. 20. Criminals and terrorists are sending encrypted messages in photos as forwards being mass-emailed around the world. The answer here is really frightening, if you forward a lot of goodies. This is, in fact, reality. LIMIT forwards to only those truly interested in this information.

Information from Sophos Anti-Virus Viruses A virus or worm is a computer program that can spread across computers and networks by making copies of itself, usually without the user s knowledge. Viruses can have harmful effects. These can range from displaying irritating messages to stealing data or giving other users control over your computer. A virus program has to be run before it can infect your computer. Viruses have ways of making sure that this happens. They can attach themselves to other programs or hide in code that is run automatically when you open certain types of file. Sometimes they can exploit security flaws in your computer s operating system to run and to spread themselves automatically. You might receive an infected file in an email attachment, in a download from the internet, or on a disk. As soon as the file is launched, the virus code runs. Then the virus can copy itself to other files or disks and make changes on your computer. Trojan horses Trojan horses are programs that pretend to be legitimate software, but actually carry out hidden, harmful functions. For example, DLoader-L arrives in an email attachment and claims to be an urgent update from Microsoft forwindowsxp.ifyourunit,it downloads a program that uses your computer to connect to certain websites, in an attempt to overload them (this is called a denial of service attack). Trojans cannot spread as fast as viruses because they do not make copies of themselves. However, they now often work hand-in-hand with viruses.viruses may download Trojans which record keystrokes or steal information. On the other hand, some Trojans are used as a means of infecting a computer with a virus. Worms Worms are similar to viruses but do not need a carrier program or document. Worms simply create exact copies of themselves and use communications between computers to spread. Many viruses, such as MyDoom or Bagle, behave like worms and use email to forward themselves.

What can viruses do? Viruses used to play pranks or stop your computer working, but now they compromise security in more insidious ways. Here are some things they can do. Slow down email. Viruses that spread by email, such as Sobig, can generate so much email traffic that servers slow down or crash. Even if this doesn't happen, companies may react to the risk by shutting down servers anyway. Steal confidential data.the Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them. Use your computer to attack websites. MyDoom used infected computers to flood the SCO software company's website with data, making the site unusable (a denial of service attack). Let other users hijack your computer. Some viruses place backdoor Trojans on the computer, allowing the virus writer to connect to your computer and use it for their own purposes. Corrupt data. The Compatable virus makes changes to the data in Excel spreadsheets. Delete data.the Sircam worm may attempt to delete or overwrite the hard disk on a certain day. Disable hardware. CIH, also known as Chernobyl, attempts to overwrite the BIOS chip on April 26, making the computer unusable. Play pranks. The Netsky-Dworm made computers beep sporadically for several hours one morning. Display messages. Cone-F displays a political message if the month is May. Damage your credibility. If a virus forwards itself from your computer to your customers and business partners, they may refuse to do business with you, or demand compensation. Cause you embarrassment. For example, PolyPost places your documents and your name on sex- related newsgroups.

Where are the virus risks? Viruses can reach your computer via all the routes shown here. Programs and documents Programs and documents can be infected with viruses.when you share them with other users, by putting them on your network or intranet, or by sending them out, the infection can spread. Email Email can include infected attachments. If you double- click on an infected attachment, you risk infecting your machine. Some emails even include malicious scripts that run as soon as you preview the mail or read the body text. The Internet You may download programs or documents that are infected. Security vulnerabilities in your operating system can also allow viruses to infect your computer via the internet connection, without your having to do anything at all. CDs and Flash Drives Flash Drives can have a virus in the boot sector. They can also hold infected programs or documents. CDs may also hold infected items.

Spyware Spyware is software that enables advertisers to gather information about a computer user s habits. Spyware programs are not viruses (you cannot spread them to other computers) but they can have undesirable effects. You can get spyware on your computer when you visit certain websites. A pop-up message may prompt you to download a software utility that you need, or software may be downloaded automatically without your knowledge. The spyware then runs on the computer, tracking your activity (for example, visits to websites) and reports it to others, such as advertisers. It can also change the home page displayed when you start your internet browser, and can use a dial-up modem to call 0900 (premium rate) phone numbers. Spyware also uses memory and processing capacity, and can slow or crash the computer. Software is available that detects known spyware programs and enables you to remove them. Cookies When you visit a website, it can place a small data packet called a cookie on the computer. This enables the site to remember your details and keep track of your visits. Cookies do not pose a threat to your data. However, they do threaten your confidentiality. If you prefer to remain anonymous, use the security settings on your browser to disable cookies.

What is spam? Spam is unsolicited commercial email, the electronic equivalent of the junk mail that comes through your letterbox. The most common types of spam concern prescription drugs,drugs that enlarge or enhance body parts, herbal remedies, or weight loss drugs get-rich-quick schemes financial services,e.g.mortgage offers or schemes for reducing debts qualifications, e.g.university degrees,or professional titles available for purchase on-line gambling cut-price or pirated software. Spam sometimes comes in disguise, with a subject line that reads like a personal message, e.g. Sorry about yesterday, a business message, e.g. Your account renewal now due, or a non-delivery message. Is spam really a problem? Spam doesn t threaten your data in the way that viruses do, but it does harm your business. Spam wastes staff time. Users without anti-spam protection have to check which email is spam and then delete it. Users can easily overlook or delete important email, confusing it with spam. Spam,like hoaxes or email viruses,uses bandwidth and fills up databases. Some spam offends users.employers may be held responsible, as they are expected to provide a safe working environment. Spammers often use other people s computers to send spam ( hijacking ).