Komputer Sains    
   
Daftar Isi
(Sebelumnya) Internet Printing ProtocolInternet Security Association ... (Berikutnya)

Internet safety

Internet Safety, or Online Safety, is the knowledge of minimizing the user's personal safety and security risks on private information and property associated with using the internet, and the self-protection from computer crime in general. As the number internet users continue to grow worldwide,[1] internet safety is a growing concern for both children and adults. Common concerns regarding safety of the internet include malicious users (Spam, Phishing, Cyberbullying, Cyberstalking etc.), websites and software ( Malware, Computer Virus, etc.) and various types of obscene or offensive content. Numerous groups, and governments and organizations have expressed concerns and are dedicated to the safety of children using the Internet. In the UK the Get Safe Online campaign has received sponsorship from government agency Serious Organized Crime Agency (SOCA) and major Internet companies such as Microsoft and eBay. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety.

Contents

Concerns

Information Security

Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property. Common causes of information security breaches include:

Phishing

Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.

Internet Scams

Internet Scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.

Malware

Malware, particularly spyware, is malicious software disguised as legitimate software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as oftentimes it is impossible to determine whether a file is infected, despite the source of the file.

Personal Safety

The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed us to communicate with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include:

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.

Cyberbullying

Cyberbullying is often an extension of bullying outside the internet, and may take form in many different ways. For example, the malicious user might release images of the user without his or her consent. Because cyberbullying often stems from real-life bullying, this is largely a social concern, rather than internet safety. Cyberbullying occurs more frequently than real-life bullying as the internet provides often provides means to carry out bullying while allowing the perpetrator to remain anonymous and hidden, avoiding backlash in the process.

Online Predation

Online Predation is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums. It is debated whether online predators is actually a threat to internet safety, as many cases take a long time to develop the relationship. As such, targets of online predators may see the relationship as a legitimate attempt at romance.

Obscene/Offensive Content

Various websites on the internet may contain offensive, distasteful or explicit material, which may often be not of the user's liking. Such material may sometimes be stumbled upon through chance and may have adverse effect on users, particularly children. Such websites may include internet pornography, shock sites, hate speech or otherwise inflammatory content. Offensive content may manifest in many ways, such as pop-up ads and unsuspecting links.

Prevention

Securing Information

Keep shared information at a minimum

Cyberstalking and identity theft often begins by malicious users identifying the user through identifying information provided by the user himself. It is important to remember that information posted online may be seen by more people than is originally intended. Social networks make it simple to inadvertently share details about oneself (address, phone number, birthday, etc.), so as a precaution, it is best not to input this type of information onto these websites. It is also a common occurrence for users to make the mistake of sharing small bits of information occasionally, and through the use of search engines and some research it is possible to piece these information together to identify the user. As such, avoid sharing personal information and personal history whenever possible. When creating usernames, websites, or e-mail addresses, avoiding using anything that reveals any useful information such as a year of birth. Passwords and PINs should never be shared under any circumstances.

Passwords

Passwords are often created to keep personal information and property secure. If a password is compromised, it may lead to consequences such as financial theft from online services such as bank accounts. One common way that passwords may be compromised is through repeated guessing. Weak passwords make this process easier, so it is important that passwords be strong. Creating strong passwords is a way of keeping information secure. A strong password may contain the following:[2]

  • At least 10 characters
  • Both upper and lower case letters
  • Numbers
  • Symbols(if allowed)
  • Does not contain dictionary words

Avoid using simple passwords such as: “password”, “123456”, “qwerty”, “abc123”, names, birthdates, etc. Besides having a strong password, it is important to use different passwords for different accounts. This prevents access to all internet accounts, should someone get hold of a password. It is also good practice to regularly change your passwords.

PINs

PINs, like passwords, are means of keeping information secure. A PIN may consist of at least 4 digits. Birthdays, birth-years, consecutive numbers, repeating numbers, and banking PINs should not be used as PINs for your internet accounts.

Social Network Websites

Profiles on social network websites may be seen by people you may not know. These websites often have privacy settings that you can alter so you can control who sees you profile and what information they are allowed to see. Do not accept friend requests from people you don't know.

Security Software

Through the use of antivirus software, the user can automatically detect, prevent and remove computer viruses and various types of malware. Very often it is impossible for the user alone to identify infected files and software until it is too late, especially if the infected file or software is well disguised as legitimate files. Because of this, it is important that the user keeps antivirus software running on the computer whenever accessing the internet so that the user can filter and block infected files.

Firewalls

A firewall is a program that controls incoming and outgoing internet traffic. Most operating systems come with firewalls. In order to keep your computer and information safe, it is important to keep the firewall on at all times when accessing the internet to prevent unauthorized access. Users are also able to control which specific programs are allowed through the firewall as well as those that are not.

Keeping Up-to-Date

Many computer software, such as operating systems, are not without flaws. Computer viruses often take advantage of these flaws to gain unauthorized access to a user's computer. When these security vulnerabilities are discovered they are often patched with security updates to eliminate the vulnerability. Operating systems, anti-viruses, and any other programs should be kept up-to-date with the newest security updates in order to keep viruses and harmful software from taking advantage of exploits that have been fixed with updates.

Avoid Scams

Be cautious of the internet. Avoid misleading ads, strangers with offers, strange e-mails, and questionable websites. Do research to verify the validity of these offers. If someone you know is sending you messages that don’t seem like themselves, their account may have been taken over by somebody trying to get information out of you.[3] The best way to avoid scams is to be fully informed of the deal. Do some research for the following information:[4]

  • How exactly does the offer work?
  • How trustworthy is the person/company making the offer?
  • What was the experience for other users regarding the same offer?
  • Is the offer too good to be true?
  • Does the offer require payment in advanced?
  • Are there hidden costs unknown to the user?

Avoid Illegal Activity

Downloading torrents and illegal file sharing is a very common distribution method of malware and may inadvertently bring malicious software to your system.

Parental Controls

A good way to reduce the possibility of reaching offensive/obscene content is to set up parental controls. Parental controls allow users and parents to place content filters on their computers while using the internet. Content filters limit access to age-appropriate content and any specified type of content the user may dislike.

Public Computer

Public computers, as opposed to personal computers, may be physically accessed by anyone within reach of the computer. Because of this, it is inadvisable to do any processes that involve sensitive information, such as online banking. A common way unauthorized access may occur is through users from public computers not fully logging out and clearing usage data (such as cookies), and allows access of the account to the next user of the public computer. It is also possible that the public computer be infected with malware, unknown to the user. When using public computer terminals, remember to:[5]

  • Avoid saving private information such as usernames and passwords
  • Don't leave the computer unattended while logged in
  • Clear your browsing data when you are about to leave
  • Watch out for people looking over your shoulder
  • Avoid entering sensitive information such as bank information

Third Party Programs

Antivirus and Anti-Malware Programs

Antivirus and anti-malware programs help prevent infections from occurring as well as detect and remove them from your computer. A variety of programs are available for use with purchase such as Norton AntiVirus, McAfee VirusScan, and BitDefender Antivirus. There are also a many programs available for download for free such as Microsoft Security Essentials, AVG Anti-Virus, Avast! antivirus, and Malwarebytes' Anti-Malware.

Ad and Pop-Up Blockers

Misleading ads and pop ups can contribute to the accidental downloading of malicious software onto your computer. Most web browsers have internal pop-up blockers. These programs/web browser plug-ins remove the ads.

Password Managers

These programs help organize passwords for your internet accounts so you won’t have trouble remembering them. Password Managers encrypt your password data, and in some cases, automatically fill out your user and password data onto websites.

Organizations

Many organizations are involved in making the Internet a safer place. This includes governments,[6] global associations such as Insafe, non-profits[7] and businesses that are affected by problems on the Internet, such as banks.[8]

See also

  • Content control software - for high-level filtering, including workplace internet filtering
  • Parental controls - for parents to control how a computer is used
  • Accountability software - for adults who want to be accountable to another for how they use the internet.
  • Internet security for information about protecting data and avoiding malware.
  • Website reputation rating tools for information about website safety & trustability.

Groups and individuals working in the topic

  • ThinkUKnow
  • Tween summit
  • Youth Internet Safety Survey
  • AHTCC - Australian High Tech Crime Centre
  • Sonia Livingstone
  • DISC foundation

References

External links

Parent Resources

Youth Resources

Other Resources

(Sebelumnya) Internet Printing ProtocolInternet Security Association ... (Berikutnya)