Cyber Safety
Mohammad Abbas AlamdarTeacher of ICTSTS Ajman – Boys School
Learning Objectives
The objectives of this module are to:
To know how what a cyber attack is
To know what can happen in a cyber attack
To know how to protect yourself from cyber attacks
To understand what shared and dedicated resources are
Learning Outcome
By the end of the module, you are able to:
• Conditions where digital security breaches & attacks can happen
• Understand the effects of various kind of security breaches & attacks.
• Ways to get protect from security breaches & attacks.
• Important to safe guard digital safety and security.
• Shared Resources VS Dedicated Resources
What is Cyber Safety / E-Safety?
• Cyber safety or Electronic safety is being safe online.
• It is being careful about what you say and what you and about how other people or internet sites interact with you.
What is Cyber crime
• This is crimes committed by using a computer.• Crimes committed by using technology.• More and more crime is happening by using
computers.
Digital Dangers• When on the internet, we have to be careful of the following
dangers;
1. Identity Theft - 2. Phishing e-mails3. Hacker & Crackers4. Cyber stalking 5. Cyber bully6. Internet Predator and Pornography
Identity Theft
• The use of someone’s personal information without their permission. • Damages not limited to just financial problems.• It can leave a person feeling violated.• Can cause emotional struggles.• Damage your name .• Result in illegal activities being associated with
you.
Phishing Emails • Junk or Spam Emails sent to email accounts.• They are informing of important information.• They are requesting personal information.• Bank details, Addresses and username and logins.
• Opening such emails is very dangerous.• Spyware gets installed which takes your personal information.
Hackers and Crackers
• Someone who can access your computer• They get into your computer through WiFi or through a
network.
• They can steal, your information, money, identity and personal data which can be lost forever.
Malware and Spyware
• Any technology that aids in gathering information about a person or organization without their knowledge.
• Sometimes occasionally installed just by visiting a Web site Drive by download
• Effects;• Read your emails1. Record your key strokes2. Change your homepage3. Read cookies4. Install other software
Examples
Examples
Examples
Stolen Equipment
• Stolen of laptop, external hard disk, thumb drive, hand phone
• Old equipment still contained important information• how to dispose them?
Protection
1. Online Banking – Access your account from a safe connection. Don't use public computers. Delete cache and cookies. Just do it at home.
2. Identity Theft – Never give out personal information, and make sure you know who you are giving your information to. Destroy documents with important information properly.
3. Phishing – Never give out information about your banking into an email. Your bank will ask you for your bank details. Never give your details over MSN or through the internet, only if you know it is safe.
Security breaches or Attacks1. Firewall – always have it switched on and inform your programs2. Anti-virus – Always have it installed and to protect you from worms.3. Anti-spyware – Will protect you from pop ups and unwanted
messages4. Parental Control – You can set low to high control, it is used to filter
out websites and bad words on Messenger sites.5. Regular updates – This makes sure that you have the most up to
date software installed.6. Browser - Turn off scripting, pop-ups and ads in browser to block
unwanted and possibly armful scripts.7. Backup - If you regularly make backup copies of your files
and keep them in a separate place, you can get some, if not all, of your information back in the event something happens to the originals on your computer
Security Breaches or Attacks
Always use a good strong password, It must be;1. Contain a mixture of characters2. Upper case3. Lower case4. Numbers5. Hard to guess6. Change it regularly7. Keep it a secret
Shared Network AreasA shared or Network area is an amount of space where multiple
people have access to it. It is mainly used for sharing files between many users. It can also be remotely shared on the internet.
Guidelines1. Limit users to access certain areas.2. Ensure users know how to use the network area3. Ensure there is adequate software and hardware in place4. Ensure users log off properly5. Ensure users change their passwords6. Ensure they don't share passwords7. Make sure there a backup of the network
Knowledge Check
1. What is things must you do stay safe online ?2. What should your password contain?3. What is a shared or network area?4. What is a firewall?5. Name two features of a phishing email ?6. What is Spyware ?7. How do you protect yourself when using
online banking ?8. What is ID theft?