Back To CourseBusiness 109: Intro to Computing
10 chapters | 84 lessons | 9 flashcard sets
As a member, you'll also get unlimited access to over 75,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.Try it risk-free
Paul has a PhD from the University of British Columbia and has taught Geographic Information Systems, statistics and computer programming for 15 years.
The Internet provides a wealth of information and services. Many activities in our daily lives now rely on the Internet, including various forms of communication, shopping, financial services, entertainment and many others. The growth in the use of the Internet, however, also presents certain risks. Just think about all the information you send over the Internet, such as personal messages, bank account information, photographs, etc.
As a typical Internet user, you have the reasonable expectation that your communications and transactions are private and secure. When you make a video call to a family member, you expect that nobody else is watching. When you buy something online with a credit card, you expect that nobody else can get access to your credit card details.
For the most part, the Internet is indeed private and secure, but there are a number of serious security risks. This lesson will review some of those security risks and provide some practical suggestions on how to address them.
One of the most serious threats consists of viruses and other harmful programs. A computer virus is a computer program that replicates itself into other computer programs and can cause damage to a computer's software, hardware or data. Once a virus is present on a computer, it typically performs some type of harmful action, such as corrupting data or obtaining sensitive information. Computer viruses are only one type of malware, short for malicious software. Malware is used by attackers to disrupt computer programs.
The best way to deal with the threat of a computer virus is to use antivirus software. Antivirus software helps to protect a computer system from viruses and other harmful programs. One of the most common ways to get a virus on your computer is to download a file from the Internet that is infected. Antivirus software scans your online activity to make sure you are not downloading infected files. Antivirus software also helps to detect and remove viruses from your computer system if you do get infected.
Spyware is a program installed on your computer that sends information about you and how you use your computer to a third party, typically without you being aware this is happening. Spyware often enters your system when you install some type of free software from an untrusted source. Installation of the program you were interested in also installs the spyware. Since you authorized the installation, conventional protection methods, such as antivirus software, do not prevent spyware from getting installed in this manner.
Once the spyware program is installed, it starts collecting information. Some spyware programs are relatively harmless and collect very generic information that does not personally identify you. Other spyware programs may record your actual keystrokes, including any passwords, and may search through any of your files looking for something that looks like a credit card number. These types of spyware programs can definitely be harmful.
Once spyware has collected its information, it sends this to whoever created the program. Again, this happens without you noticing it. Removing the spyware can be difficult - often the program installs itself again as quickly as you can delete it. To counter spyware, you need to use a dedicated spyware management tool. Some antivirus software is bundled with spyware management tools, but they are separate functions.
Phishing is an email scam that is disguised as an official communication from a legitimate website. The message tricks people into providing sensitive information, such as their login details. A typical scam consists of a message that describes some issue with your account and requires you to log in to your account to confirm something. The message looks very official, using logos and formal language, just like you would expect from a legitimate source. The message also presents some sense of urgency to get you worried. When you follow the link, the Web page looks very real - but if you look closely, the Internet address is actually not the official one.
Financial institutions don't send out these types of messages. Don't follow the link. If you are seriously concerned, go to the institution's official Web site and log in to your account the way you normally would. Never log in to your account from a link sent to you in an email.
Spam consists of electronic junk mail. These are unwanted solicitations sent out to hundreds of thousands of Internet users, typically to buy something, to make a phony investment or to sign up for some type of online service.
Spammers collect email addresses using automated spiders that crawl across Web pages. Spiders also look through newsgroups and discussion forums. Spammers may also use a technique known as a directory harvest attack, which sends a message to millions of automatically generated email addresses. The ones that don't bounce back are considered real and are then used for spamming.
Spamming has become part of the Internet, just as junk mail has become part of the postal system. Antispam software has been developed to filter out the spam before it gets to your inbox. Antispam software uses a number of different strategies:
Most email systems redirect spam into a special spam or junk mail folder. When you have a junk mail folder, you may want to check that everything in the folder is indeed spam. If you come across a particular email that should not have ended up in the spam folder, you can flag that particular email so that future messages from that sender are not considered spam.
One of the most common ways for viruses, spyware and other harmful programs to spread is through email attachments. You may use email attachments regularly to send a file to a colleague or friend. It's one of the easiest ways to share files with one or more individuals without posting it on a Web site for the whole world to see. Because many computer users have become so comfortable with using email attachments, it has also become a major security threat.
Those looking to spread harmful programs or get access to private information send out emails with an attachment to unsuspecting users. When you open the attachment, a program gets installed on your computer, and you may not even notice that anything has happened.
As a general rule, you should never open up any attachments you were not expecting. Sometimes the email may look like it comes from someone you know, but it may in fact have been sent by a virus on someone else's computer. You also want to be really careful with attachments you don't recognize. It is one thing for one of your colleagues to send you a report called 'QuarterlySales.doc,' but a file called 'install.exe' is very suspicious since you can't verify its content before opening it.
Email systems have gotten increasingly sophisticated at filtering out suspicious email attachments. However, you should scan any attachments for viruses before downloading and not open any attachments whose content you can't confirm.
Simply browsing the Internet presents its own security issues. Certain Web pages automatically launch a file download, and these files may contain harmful programs. Most Web browser software includes tools to check for suspicious files and will automatically block certain content. However, this requires that you have your browser's security features turned on. You should only turn these features off temporarily when downloading content from a trusted source.
When browsing the Internet, you also want to consider your privacy. Many Web sites add small text files to your computer called cookies. These cookies make it easier to use certain Web sites. For example, your browser may store the login information for frequently used accounts. This information is stored in a cookie. Cookies are also used to track your browsing history. Cookies present a security risk since anybody with access to your computer, even remotely, can obtain the information contained in them.
To prevent this information from being stored, you can change your browser settings to private browsing. Browser software also includes tools to manage your cookies.
Using the Internet presents a number of security issues. Being aware of these will make your Internet use safer and more enjoyable. Some of the most serious threats include computer viruses, spyware and other harmful programs. You should use antivirus and spyware management software to protect your computer system.
A widely used technique to obtain confidential information is the use of phishing scams. These trick users into providing account details using official-looking email messages and Web sites. Spam consists of electronic junk mail. This presents an annoyance but is typically not a security concern. A more serious concern are email attachments, which are widely used to distribute harmful programs. Internet browser software contains security features to prevent downloads of harmful programs and to manage your privacy while browsing.
After watching this lesson, you should be able to:
To unlock this lesson you must be a Study.com Member.
Create your account
Already a member? Log InBack
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Back To CourseBusiness 109: Intro to Computing
10 chapters | 84 lessons | 9 flashcard sets