Q.7 Warn fellow students about the hazards of online activity and provide guidelines on online safety.

Digital divide

Hazards of online activity

HTML files may contain Javascript, ActiveX controls or macros that can allow an attacker to gain control of a PC or turn into a remotely controlled zombie. One of the oldest abuses of corporate Internet links, is the downloading of porn, gambling and other objectionable data, is another still-popular activity becoming a frequent source of infection via ‘drive-by downloads’ and ‘zero-day exploits. Random surfing of unknown, untrusted Web sites are becoming one of the most popular targets of attackers on the Web. Using any old Wi-Fi network, users are even more at risk if their wireless card uses the Wireless Access Protocol, which is notoriously simple to hack.

[Online]. Available at:  https://www.forbes.com/2006/10/25/microsoft-mozilla-malware-ent-tech-cx_sb_1025smallbizresource.html [Accessed 12 June 2017].

Guidelines on online safety.

  • Digital Security is protecting yourself on the Internet
  • Protecting your Identity
    • Do not give out personal information to people you do not know
    • Creating Strong Passwords
  • This protects you from people gaining access to your information
    • Virus and Malware Protection
  • Keeps your computer safe from harmful viruses and malware which can be used to steal your sensitive information and disrupt your computer’s performance
    • Phishing is a method that people use to access sensitive information like passwords and Credit Card info. (Digital Citizenship)
  • Use Surge Protectors and other devices to secure your hardware
    • Protects your computer from outside influences that can damage your device (Ribble & Bailey, 2007)
    • Lightning strikes
    • Power surges

[Online]. Available at:  https://cunedigitalcitizenship.wikispaces.com/Digital+Security [Accessed 12 June 2017].

Guidelines on online safety.

  • Treat other interacting parties with respect, regardless of income, ethnicity, gender, Physical location or disability;
  • Protect their digital identity from unauthorised use;
  • Be responsible for all actions taken with their digital identity;
  • Take appropriate action as soon as possible after discovering or suspecting that their digital identity has been compromised;
  • Take appropriate action as soon as possible after discovering that systems that they control are being used for the storage and/or transmission of unlawful material;
  • Comply with the relevant legislation, regulations, codes of conduct and best practice where they are digitally interacting

[Online]. Available at: http://www.eurim.org.uk/activities/ig/GTC-Metanoya_Proposal.pdf [Accessed 12 June 2017].

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s