The Internet - University of Kentucky

Download Report

Transcript The Internet - University of Kentucky

The Internet
Netiquette and Dangers
Outline
• Netiquette
• Dangers of the Internet
Mailing lists
• "Listservs"
• people must subscribe
• messages sent by email
• sent only to people who subscribe, not general public
• do NOT use the "Reply All" option unless you mean to!
E-commerce
• buying, selling, advertising, banking
• look for secure "signed" sites
• https:// versus http://
• check with Better Business before buying
• use credit card for purchase
Online Dangers
• Spam – electronic junk mail
• Pop-ups – intrusive advertising
• Cookies – tracking user’s browsing habits
• Malware - software that has a malicious intent - spyware, viruses,
Trojans, worms, etc.
• Phishing and Hoaxes – Ruses to fool and maybe steal from users
Spam
• Junk e-Mail
• May soon comprise 90%
of email volume
• Named after a Monty Python sketch Link
• Antispam practices
•
•
•
•
Don’t reply to it, even to “unsubscribe”!
Use “dummy” addresses – can get free ones
Read privacy statement on a site before you give them your address
Spam filters
Pop-ups
•
•
•
•
•
Usually advertising
Pop-up automatically
Can also contain spyware
Most browsers can prevent them
Pop-up blockers
Cookies
• Text files stored on client computers
when visiting Web sites
• Used on return visits to Web sites
• Unique ID number
• Personal information remembered
• Privacy risk
• Selling information
Spyware
• Added as a program piggybacked with
a requested program
• Secretly gathers information, usually
about surfing habits
• Spyware removal programs are
required – Ad-aware or Malwarebytes
are good
Spyware
• Very often comes in from file-sharing, P2P sites
• Ties up system resources, can modify browser settings, can spawn
popups and other ads
• Read the EULA (end user license agreement) for any software you
install before you install!
Phishing and Hoaxes
• Phishing is a phony communication from a
trusted source
• Phishing attempts to scam someone into
sending vital information
• Hoaxes are attempts to scam people into
sending money, or join a chain letter (see
snopes.com)
Malware
• Software that has a malicious intent
• Spyware is a form of malware
• Other forms are viruses, worms, and Trojan horses
• Designed to render a computer useless or control it completely
Internet Access Security
• A connection that is "always on" is a security risk - turn the computer
off when you’re not using it!
• Keep OS and anti-virus software up to date
• USE firewall software
• browser security settings
• for LAN, use NAT - router Network Address Translation
• For more privacy on the Net, virtual private network (VPN)
Issue: Free Wi-Fi access
• Some people offer wireless access for free to the community
• A good point - people who can't afford to pay for it can use it
• Broadband providers don't like people giving it away for free
• A bad point - can be used for illegal activities