{"id":152,"date":"2020-11-27T14:43:04","date_gmt":"2020-11-27T19:43:04","guid":{"rendered":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/security-issues-on-the-internet\/"},"modified":"2022-07-25T15:22:15","modified_gmt":"2022-07-25T19:22:15","slug":"security-issues-on-the-internet","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/security-issues-on-the-internet\/","title":{"raw":"Topic A: Security issues on the Internet","rendered":"Topic A: Security issues on the Internet"},"content":{"raw":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\r\nhttps:\/\/media.bccampus.ca\/id\/0_kmrortn5?width=608&amp;height=70&amp;playerId=23449753\r\n<h1>Security Issues<\/h1>\r\nAlthough Internet led to many benefits, it also poses a greater potential for security threats. Below are a number of common Internet security issues.\r\n<h2>Hacker<\/h2>\r\n[pb_glossary id=\"394\"]Hacker[\/pb_glossary] \u2013 refers to a person who can gain unauthorized access to (break into) a computer or a network to commit crimes.\r\n\r\nSome things a skilled hacker can do to your computer:\r\n<ul>\r\n \t<li>Hijack your usernames and passwords;<\/li>\r\n \t<li>Gain access to the personal information (credit card numbers, bank account, Social Insurance Number, etc.);<\/li>\r\n \t<li>Steal, change, exploit, sell, or destroy data;<\/li>\r\n \t<li>Damage or bring down the system;<\/li>\r\n \t<li>Hold the system hostage to collect ransom;<\/li>\r\n<\/ul>\r\n<h2>Malware<\/h2>\r\n[pb_glossary id=\"491\"]Malware[\/pb_glossary] (short for malicious software) \u2013 a software that is designed to damage, disrupt, or infect computers.\r\n<ul>\r\n \t<li>Malware is a single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware, etc.<\/li>\r\n \t<li>Malware can gain unauthorized access to a computer and continuously run in the background without the owner\u2019s knowledge.<\/li>\r\n<\/ul>\r\n<h2>Computer virus<\/h2>\r\n[pb_glossary id=\"513\"]Computer virus[\/pb_glossary] \u2013 a specific type of malware that is designed to replicate (copy) and spread from one computer to another.\r\n<ul>\r\n \t<li>A virus can make a copy of itself over and over again.<\/li>\r\n \t<li>A virus can spread from one computer to another through email attachments, removable storage devices, networks (Internet messaging services, download infected files \u2026), etc.<\/li>\r\n \t<li>A virus can damage your computer by corrupting system files, sending spam, stealing data and personal information from your computer, destroying data, deleting everything on your hard drive, etc.<\/li>\r\n<\/ul>\r\n<h2>Trojan horse<\/h2>\r\n[pb_glossary id=\"467\"]Trojan horse[\/pb_glossary] (or Trojan) \u2013 a type of malware that looks harmless but can cause harm to a computer system.\r\n<ul>\r\n \t<li>A Trojan misleads users of its true intent.<\/li>\r\n \t<li>A Trojan may claim to get rid of your computer viruses but instead introduce viruses onto your computer.<\/li>\r\n \t<li>A Trojan can take the form of innocent-looking email attachments, downloads, etc.<\/li>\r\n<\/ul>\r\n<h2>Worm<\/h2>\r\n[pb_glossary id=\"460\"]Worm[\/pb_glossary] \u2013 it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and spread copies of itself from one computer to another.\r\n<ul>\r\n \t<li>The key difference between a worm and a virus is that a worm does not require any human action to replicate while a virus does. A virus only spreads when a user opens an affected file whereas a worm spreads without the use of a host file.<\/li>\r\n<\/ul>\r\n<h2>Phishing<\/h2>\r\n[pb_glossary id=\"486\"]Phishing[\/pb_glossary] \u2013 a scammer uses deceptive emails or websites and tries to obtain valuable personal information (i.e., username, password, account number, etc.).\r\n<ul>\r\n \t<li>Phishing is a common online scam used by cyber criminals.<\/li>\r\n \t<li>A scammer may use a deceptive email or website appearing to represent a legitimate firm.<\/li>\r\n<\/ul>\r\n<h2>Spyware<\/h2>\r\n[pb_glossary id=\"472\"]Spyware[\/pb_glossary] \u2013 a software that secretly monitors (spies) user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.\r\n<ul>\r\n \t<li>A spyware can record a user's Web browsing habits, email messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\r\n \t<li>Advertisers can use spyware to target specific advertisements to your tastes.<\/li>\r\n \t<li>Criminal organizations can use spyware to collect financial information (banking accounts, credit card information, password, etc.).<\/li>\r\n<\/ul>\r\n<h1>Prevent Cyber Threats<\/h1>\r\n<h2>Tips on how to prevent malware from infecting your computer<\/h2>\r\n<ul>\r\n \t<li>Backup files and store in different locations.<\/li>\r\n \t<li>Don\u2019t open any suspicious\/unknown emails or the websites.<\/li>\r\n \t<li>The second part (the part after the @) of an email should represent the company that owns the email (domain).\r\n<div class=\"textbox\">\r\n\r\nExample: registrarsoffice@cnc.bc.ca\r\n\r\n(cnc.bc.ca is the domain for the College of New Caledonia)\r\n\r\n<\/div><\/li>\r\n \t<li>Don't download an unknown or suspicious attachment (document, picture, music, game, video, etc.).<\/li>\r\n \t<li>Do not call fake tech support numbers (tech support scams).<\/li>\r\n \t<li>If you get pop-up window from fake companies offering to help you with a malware infection, don't call the number.<\/li>\r\n \t<li>Use a secure and strong password (unique, hard to guess, etc.).<\/li>\r\n \t<li>Install anti-malware\/virus software (keep it up to date).<\/li>\r\n \t<li>Scan with antivirus software on a regular basis.<\/li>\r\n<\/ul>\r\n<h2>Some free antivirus software<\/h2>\r\n<ul>\r\n \t<li><img class=\"alignright wp-image-367\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Anti-virus.jpg\" alt=\"&quot;&quot;\" width=\"208\" height=\"207\" \/>Comodo Antivirus<\/li>\r\n \t<li>AVAST Free Antivirus<\/li>\r\n \t<li>AVG Antivirus Free<\/li>\r\n \t<li>Avira Antivirus<\/li>\r\n \t<li>Bitdefender Antivirus<\/li>\r\n \t<li>Sophos Home Free<\/li>\r\n \t<li>Kaspersky Free<\/li>\r\n<\/ul>","rendered":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\n<p><iframe loading=\"lazy\" id=\"kaltura_player\" title=\"Unit 5 Topic A: Security issues on the Internet\" src=\"https:\/\/api.ca.kaltura.com\/p\/148\/sp\/14800\/embedIframeJs\/uiconf_id\/23449753\/partner_id\/148?iframeembed=true&#38;playerId=kaltura_player&#38;entry_id=0_kmrortn5&#38;flashvars[leadWithHTML5]=true&#38;flashvars[streamerType]=auto&#38;flashvars[localizationCode]=en&#38;flashvars[sideBarContainer.plugin]=true&#38;flashvars[sideBarContainer.position]=left&#38;flashvars[sideBarContainer.clickToClose]=true&#38;flashvars[chapters.plugin]=true&#38;flashvars[chapters.layout]=vertical&#38;flashvars[chapters.thumbnailRotator]=false&#38;flashvars[streamSelector.plugin]=true&#38;flashvars[EmbedPlayer.SpinnerTarget]=videoHolder&#38;flashvars[dualScreen.plugin]=true&#38;flashvars[Kaltura.addCrossoriginToIframe]=true&#38;wid=0_h5ebce3v\" width=\"608\" height=\"70\" allowfullscreen=\"allowfullscreen\" sandbox=\"allow-downloads allow-forms allow-same-origin allow-scripts allow-top-navigation allow-pointer-lock allow-popups allow-modals allow-orientation-lock allow-popups-to-escape-sandbox allow-presentation allow-top-navigation-by-user-activation\" frameborder=\"0\"><\/iframe><\/p>\n<h1>Security Issues<\/h1>\n<p>Although Internet led to many benefits, it also poses a greater potential for security threats. Below are a number of common Internet security issues.<\/p>\n<h2>Hacker<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_394\">Hacker<\/a> \u2013 refers to a person who can gain unauthorized access to (break into) a computer or a network to commit crimes.<\/p>\n<p>Some things a skilled hacker can do to your computer:<\/p>\n<ul>\n<li>Hijack your usernames and passwords;<\/li>\n<li>Gain access to the personal information (credit card numbers, bank account, Social Insurance Number, etc.);<\/li>\n<li>Steal, change, exploit, sell, or destroy data;<\/li>\n<li>Damage or bring down the system;<\/li>\n<li>Hold the system hostage to collect ransom;<\/li>\n<\/ul>\n<h2>Malware<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_491\">Malware<\/a> (short for malicious software) \u2013 a software that is designed to damage, disrupt, or infect computers.<\/p>\n<ul>\n<li>Malware is a single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware, etc.<\/li>\n<li>Malware can gain unauthorized access to a computer and continuously run in the background without the owner\u2019s knowledge.<\/li>\n<\/ul>\n<h2>Computer virus<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_513\">Computer virus<\/a> \u2013 a specific type of malware that is designed to replicate (copy) and spread from one computer to another.<\/p>\n<ul>\n<li>A virus can make a copy of itself over and over again.<\/li>\n<li>A virus can spread from one computer to another through email attachments, removable storage devices, networks (Internet messaging services, download infected files \u2026), etc.<\/li>\n<li>A virus can damage your computer by corrupting system files, sending spam, stealing data and personal information from your computer, destroying data, deleting everything on your hard drive, etc.<\/li>\n<\/ul>\n<h2>Trojan horse<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_467\">Trojan horse<\/a> (or Trojan) \u2013 a type of malware that looks harmless but can cause harm to a computer system.<\/p>\n<ul>\n<li>A Trojan misleads users of its true intent.<\/li>\n<li>A Trojan may claim to get rid of your computer viruses but instead introduce viruses onto your computer.<\/li>\n<li>A Trojan can take the form of innocent-looking email attachments, downloads, etc.<\/li>\n<\/ul>\n<h2>Worm<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_460\">Worm<\/a> \u2013 it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and spread copies of itself from one computer to another.<\/p>\n<ul>\n<li>The key difference between a worm and a virus is that a worm does not require any human action to replicate while a virus does. A virus only spreads when a user opens an affected file whereas a worm spreads without the use of a host file.<\/li>\n<\/ul>\n<h2>Phishing<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_486\">Phishing<\/a> \u2013 a scammer uses deceptive emails or websites and tries to obtain valuable personal information (i.e., username, password, account number, etc.).<\/p>\n<ul>\n<li>Phishing is a common online scam used by cyber criminals.<\/li>\n<li>A scammer may use a deceptive email or website appearing to represent a legitimate firm.<\/li>\n<\/ul>\n<h2>Spyware<\/h2>\n<p><a class=\"glossary-term\" aria-haspopup=\"dialog\" aria-describedby=\"definition\" href=\"#term_152_472\">Spyware<\/a> \u2013 a software that secretly monitors (spies) user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.<\/p>\n<ul>\n<li>A spyware can record a user&#8217;s Web browsing habits, email messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\n<li>Advertisers can use spyware to target specific advertisements to your tastes.<\/li>\n<li>Criminal organizations can use spyware to collect financial information (banking accounts, credit card information, password, etc.).<\/li>\n<\/ul>\n<h1>Prevent Cyber Threats<\/h1>\n<h2>Tips on how to prevent malware from infecting your computer<\/h2>\n<ul>\n<li>Backup files and store in different locations.<\/li>\n<li>Don\u2019t open any suspicious\/unknown emails or the websites.<\/li>\n<li>The second part (the part after the @) of an email should represent the company that owns the email (domain).\n<div class=\"textbox\">\n<p>Example: registrarsoffice@cnc.bc.ca<\/p>\n<p>(cnc.bc.ca is the domain for the College of New Caledonia)<\/p>\n<\/div>\n<\/li>\n<li>Don&#8217;t download an unknown or suspicious attachment (document, picture, music, game, video, etc.).<\/li>\n<li>Do not call fake tech support numbers (tech support scams).<\/li>\n<li>If you get pop-up window from fake companies offering to help you with a malware infection, don&#8217;t call the number.<\/li>\n<li>Use a secure and strong password (unique, hard to guess, etc.).<\/li>\n<li>Install anti-malware\/virus software (keep it up to date).<\/li>\n<li>Scan with antivirus software on a regular basis.<\/li>\n<\/ul>\n<h2>Some free antivirus software<\/h2>\n<ul>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-367\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/Anti-virus.jpg\" alt=\"&quot;&quot;\" width=\"208\" height=\"207\" \/>Comodo Antivirus<\/li>\n<li>AVAST Free Antivirus<\/li>\n<li>AVG Antivirus Free<\/li>\n<li>Avira Antivirus<\/li>\n<li>Bitdefender Antivirus<\/li>\n<li>Sophos Home Free<\/li>\n<li>Kaspersky Free<\/li>\n<\/ul>\n<div class=\"glossary\"><span class=\"screen-reader-text\" id=\"definition\">definition<\/span><template id=\"term_152_394\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_394\"><div tabindex=\"-1\"><p>a person who can gain unauthorized access to (break into) a computer or a network to commit crimes.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_491\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_491\"><div tabindex=\"-1\"><p>a software that is designed to damage, disrupt, or infect computers.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_513\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_513\"><div tabindex=\"-1\"><p>a specific type of malware that is designed to replicate (copy) and spread from one computer to another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_467\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_467\"><div tabindex=\"-1\"><p>(or Trojan) a type of malware that looks harmless but can cause harm to a computer system.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_460\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_460\"><div tabindex=\"-1\"><p>a type of virus designed to quickly self-replicate and spread copies of itself from one computer to another.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_486\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_486\"><div tabindex=\"-1\"><p>when an Internet scammer uses deceptive emails or websites to try to obtain valuable personal information from people.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><template id=\"term_152_472\"><div class=\"glossary__definition\" role=\"dialog\" data-id=\"term_152_472\"><div tabindex=\"-1\"><p>a software that secretly monitors (spies) a user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.<\/p>\n<\/div><button><span aria-hidden=\"true\">&times;<\/span><span class=\"screen-reader-text\">Close definition<\/span><\/button><\/div><\/template><\/div>","protected":false},"author":90,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-152","chapter","type-chapter","status-publish","hentry"],"part":150,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":2,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/152\/revisions"}],"predecessor-version":[{"id":629,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/152\/revisions\/629"}],"part":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/parts\/150"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/152\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/media?parent=152"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapter-type?post=152"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/contributor?post=152"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/license?post=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}