Lesson 3 Safe Computing
Objectives • Protect against malware/hacking • Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords
Hacking/Malware Hacking is the act of cracking into a computer to steal information. Malware is software that has malicious intent. Two types of malware: Discussion tips: Ask students about their experiences with hacking/malwareHacking is the act of cracking into a computer to steal information. A computer virus attaches itself to a file or program, enabling it to spread from one computer to another. Worms spread from one machine to another, rapidly, without human action.
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Look at the subject line. Does it say something suspicious like “Need cash now?” or “You may have already won!”?
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Use caution with attachments. Many times viruses are assigned a file extension like .exe or .vbs.
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Do you recognize the sender? If you don’t recognize the sender of the email, it is best practice to not open the email.
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Do not follow web links unless you are sure they are safe. Sometimes a link can direct you to a website that downloads a virus to your computer.
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Spelling and grammar. Companies and organizations typically have copywriters who proofread emails for errors before they are sent.
Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Generic greeting. Fraudulent emails are often sent in large batches and to save time, criminals use a generic greeting like “Dear Internet user.”
Antivirus Software Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses. Malware can be shared by: • E-mail attachments • Fictitious websites • Pop-up ads • Spam
Hacking/Malware Defenses Avoid attacks by: Do not open e-mails or attachments from unfamiliar e-mail addresses Question suspicious attachments from people you do know Right-click the pop-up taskbar or use the task manager to close pop-up ads Discussion tips: Students may have some knowledge on the subject here. Have them share how they avoid attacks. Avoid attacks by: Use tools to prevent viewing potentially dangerous sites.
Updates Updates also: Updates are important! They keep the operating system and applications up to date. Updates also: Close security loopholes Provide critical updates Protect against threats
Spam & Email Fraud Spam - an Internet slang term referring to unsolicited junk email or online communication that is sent to a large number of recipients.
Email Scams The primary goal of an Internet scam is to trick someone into giving money or sharing information. Some examples include: dating scams investment schemes claims you won the lottery pay speeding ticket bail out a friend Have students do some current event research on email scams and share their findings. Be sure to delete these emails.
Phishing Phishing is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers. Legitimate companies will never ask for your personal sensitive information in an email. Be sure to delete these emails.
Passwords Good password practices: The whole purpose of a password is to keep important, private information safe. Good password practices: Strong passwords use upper and lower case letters, numbers and symbols. (8 or more characters) Don’t share your passwords with anyone Change your password frequently or use a different password for every site you visit Don’t use information that is personal or easy to guess Weak passwords: Bickerton01 Fluffy1992 Strong passwords: Fi#1c@t! (Fluffy is # 1 cat!) #Ih8P@$$words (I hate passwords)
I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12 Rate the following password examples as strong or weak: I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12 Answers: Strong Weak
Summary • Protect against malware/hacking • Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords