SCMA161 : Internet & Social Media Awareness


One of the most common crimes associated with
computer viruses revolves around everyone’s favorite topic, money. A virus pop-up window,
designed to look like a legitimate warning from a company like Microsoft, warns you about
a virus infecting your computer. Users are then instructed to call a phone number for
help removing the virus. On the other hand , cybercriminals are waiting to
charge you with big bucks for the anti-virus software and gain access to your computer. Once
they start to install the software, they actually place virus on your computer that
gives them access to all of your computer activities, from banking transactions to saving
family pictures. Any code designed to do more than spread the
worm is typically referred to as the “payload”. Typical malicious payloads might delete files
on a host system, encrypt files in a ransomware attack, or exfiltrate
data such as confidential documents or passwords. Probably the most common payload for worms
is to install a backdoor. This allows the computer to be remotely controlled by the
worm author as a zombie . Networks of such machines are often referred to as botnets
and are very commonly used for a range of malicious purposes, including sending spam
or performing DoS attacks. The anti-spyware, anti-virus, and anti-spam
software all work in very much the same way To help you get rid of the unwanted files in your computer or viruses. They have definitions of known malicious
programs, and they may also have algorithms to raise flags about unknown programs which
operate in an unusual way. Depending upon user preferences, the programs either automatically
block or delete the suspicious mail or program, stop a running process, or quarantine a file
for the user to delete. In general, users delete all or virtually
all of these identified programs and blocked mail. I mean, who really wants spyware or
viruses, right? However, both the identification of programs as spyware or spam, and the deletion
of these programs may, in fact, be a violation of the law in general the law attempt to prohibit the
“deceptive” practices of the unauthorized installation of programs that monitor a consumer’s
activities without their consent. As a result, these statutes tend to prohibit both the transmission
or installation “through intentionally deceptive means” of software that either changes configurations
of certain programs, or collects personally identifiable information, or prevents a user’s
efforts to block installation, or falsely claims that software will be disabled by the
user’s actions, so what you should aware on yourself is to only access to an reliable
websites. Scam
It is the Internet deceiving. It might ask you to join the business or ask for personal
information or else. I will give you two examples of scam. Firstly, Phishing Scam is the deception try
to get your personal information such as usernames, passwords and credit card details by disguising
oneself as a trustworthy entity in an electronic communication. It often directs users to enter
personal information at a fake website which matches the look and similar to the legitimate
site. Secondly, Nigerian Prince Scam, or what we
call Nigerian letter or foreign money exchanges, starts from overseas deceivers who email you
and claim to be royalty and may ask your money. The fraudsters lure you in by offering a share
of a huge investment opportunity or a fortune if you help them since they cannot get out
of the country without your help, then Scammers may ask for your bank account details to ‘help
them transfer the money’ and use this information to later steal your funds. Or they may ask
you to pay fees, charges or taxes to ‘help release and transfer the money out of the country’
through your bank. Cyberbullying is one of a human danger that
can be found online. It can comes in all forms such as texts, photos, and clips. When people
share the negative information about others without permission, it can be considered as
cyberbullying which sometimes break the law or become a source of criminal.
People who are bullied may be a victim. Some of them may commit suicide as being bullied
online. Just like what a young man of age 16 did when he was outed as being bisexual. Another kind of human danger online is Track
down. When people on social media can track where the others are, that is surely unsafe.
The people who are being tracked down would possibly be harmed in a way. People can however
bring dangers to themselves as sharing locations on social media.
For example, a man can track down on woman’s location for sexual purposes such as sexual
harassment. Sexual predation is a danger that always come
with trusts. The online predators usually come in a form of friends. When it comes to
the point that the prey gives their trusts, those predators may sometimes ask the online
users for dates which is sometimes known to be for sexual purposes. In another way, the
users are asked to send a picture of themselves being naked, so they can use these photos
for sell as a business. To avoid these kinds of online human dangers,
the online users should screen all the followers and friends on social media. The unknown people
should not be able to keep track of what you are doing.




Leave a Reply

Your email address will not be published. Required fields are marked *