Monday, 30 November 2015


E-SAFETY


Some things that you can do while having fun to be safe online:

       
  • Parents – establish online rules and an agreement with your sons and daughters about Internet use at home and outside of the home.

  • Teens – talk to your friends if you see them making poor choices online that could compromise their safety

  • Parents – spend time online alongside your daughter or son and establish an atmosphere of trust regarding computer usage and online activities

  • Teens – your parents should respect you, but remember that they have the ultimate responsibility to keep you safe.

  • Parents – place your home computer in an area of your house where you can easily supervise your family’s Internet activity.

  • Parents – regularly discuss your sons and daughters about their online friends and activities.  This helps you learn about how the digital generation uses the Internet – and may help keep your family safe.

  • Teens -if your brother, sister, or friends seems to be making bad choices online that could harm them, talk with them, and a parent or trusted adult.

  • Teens and Parents – block instant/personal messages from people that you or your son and daughter don’t know.

  • Parents – review the amount of time your son or daughter spends on the Internet, and at what times of the day.

  • Teens – if one of your real world friends “lives” on the Internet – be a friend and invite that person to do something together that’s in “the real world.”


                                                                                

                                                                                                                                

Image result for e safety picsImage result for e safety pics                                                                                  







                            

Monday, 16 November 2015


Computer security threats 

THREAT #1: VIRUS
Description:  
virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as  memory sticks. Viruses are sometimes confused with worms and Trojan horses, or used incorrectly to refer to malware.
Worst case damage
Some v
iruses
delete files, reformat the hard disk. Others only replicate themselves and may present text, video, or audio messages, even these viruses take up memory and may cause erratic behavior, system crashes and loss of data.
Prevention:
Antivirus software detects and eliminates known viruses. The two most common methods used to detect viruses are:
1. Using a list of virus signature definitions.
2. Using a heuristic algorithm to detect viruses based on behavioral patterns.

THREAT #2: SPAM
Description: SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users’ address books.
Worst case damage:
Spam can clog a personal mailbox and impact network performance, Perhaps the real danger of spam is not so much in being a recipient of it as inadvertently becoming a transmitter of it. Spammers frequently take control of computers.
Prevention: 
User systems may use spam filters to screen out email messages with suspect titles or from suspect persons, as well email messages from blocked senders.
THREAT #3: SPOOFING
Spoofing is an attack in which a person or program masquerades as another. A common tactic is to spoof a URL or website (see phishing).
Worst case damage:
Once personal information is acquired, spoofers may use a person’s details to make transactions or create fake accounts in a victim’s name. They can ruin the victims’ credit rating or even deny the victims access to their own accounts.
Prevention: 
As spoofing rely on tricking users rather than advanced technology, the best way to handle these threats is through vigilance. Don’t open emails from unknown sources or click on links embedded in suspect messages. 
THREAT #4: SPYWARE
Description: Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer.
Worst case damage:
Spyware programs can collect various types of personal information, such as websites visited, credit card details, usernames or passwords, as well as install other malware.
Prevention, detection and removal: Anti-spyware programs can combat spyware in two ways:
1         Real-time protection: these programs work just like anti-virus software. They scan all incoming network traffic for spyware software and block any threats that are detected.
THREAT #5: KEYSTROKE LOGGING 
keylogger is a software program that is installed on a computer, often by a Trojan horse or virus. Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
Worst case damage:
While keyloggers will not damage your computer system per se, because they can capture passwords, credit card numbers and other sensitive data, they should be regarded as a serious threat.
Prevention, detection and removal:

Monitoring which programs are running.
Anti spyware
Firewall
THREAT #6: ADWARE
Adware is software which automatically plays, displays, or downloads advertisements to a computer. The adware runs either after a software program has been installed on a computer or while the application is being used. In some cases, adware is accepted by users in exchange for using software free-of-charge. Not all adware is innocuous, however. Some types of adware are also spyware and therefore a threat to privacy.
Worst case damage:
Adware is relatively harmless unless it is spyware (see spyware). It can, however, cause degradation in system performance.
Prevention, detection and removal:
As adware is also often spyware or malware, programs have been developed to detect, quarantine, and remove both spyware and adware. Two commonly used programs. These programs are specifically designed for spyware detection and therefore do not detect viruses.










Monday, 9 November 2015

DIGITAL CITIZEN SHIP


Nine Themes of Digital Citizenship

Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use.  

1.   Digital Access:  (full electronic participation in society). 

Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.
2.   Digital Commerce:  (electronic buying and selling of goods)
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy.  
3.   Digital Communication:  (electronic exchange of information). 
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.
4.   Digital Literacy:  (process of teaching and learning about technology and the use of technology)
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills. 
5. Digital Etiquette:  (electronic standards of conduct or procedure).
Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
6.   Digital Law:  (electronic responsibility for actions and deeds).
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.

7.   Digital Rights & Responsibilities:  (those freedoms extended to everyone in a digital world).
Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive. 
8.   Digital Health & Wellness:  (physical and psychological well-being in a digital technology world).
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training. 
9.   Digital Security (self-protection):  (electronic precautions to guarantee safety)
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.

Monday, 2 November 2015

Cyber safety 

Definition:- 
    Cyber safety is the safe and responsible use of Information and Communication Technologies. Net Safe's approach to cyber safety is founded on: Maintaining a positive approach about the many benefits brought by technologies. Here are some safety tips from which we could stay safe when using any social website on internet:-
    1. Always ask an adult if you’re unsure of anything when you are online.
    2. Don’t sign up for sites that are 13+ if you are not old enough (Facebook, YouTube, Instagram etc).
    3. Remember you should not share your online personal information with any unknown (Your full name, address, phone number, passwords, your plans). 
    4. Don’t add people as online friends unless you know them in real life or have parent permission. Never arrange to meet an online friend without talking to a parent.
    5. Remember that you cannot believe everything you read on the internet and you can’t trust everything online friends tell you.
    6. Choose sensible names for usernames, email addresses etc. 
    7. Talk to your parents about what you’re doing online and let them know when you’re going on the internet.
    8. Know what cyber bullying is and tell someone if you think it’s happening to you. Cyber bullying is when someone picks on you, annoys, embarrasses, or threatens you over and over again using technology, such as the internet or a phone.
    9. Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see.
    10. Treat others online the way you’d like to be treated.
    11.  Don’t post inappropriate or illegal content anywhere on the internet. 
    12.  Make sure your social networking profile is set to private (check your security settings). 
    13. Tell your friends to ask for your permission before uploading and/or tagging a photo of you on their social networking profiles
    14. Don’t click on any links that are embedded in emails - type the URL into the browser and go from there.
    15. 1. Use a strong password (a combination of upper and lower case letters, symbols and numbers).