ESafety2

Social Engineering

Learn It

  • Social engineering is the art of manipulating people so that you tell them your personal information.
  • Criminals are usually trying to fool you into giving them your passwords, bank information, or access your computer to secretly install malicious software which gives them access to your passwords, bank information and control over your computer.
  • Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software.
  • For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).

Try It

Answer the following questions in a text editor such as Word:

  • How good is your current password? Firstly, is it in the most common passwords here?
  • Secondly, test the strength of your password by using the online password checker.
  • Write down how long it would take to break.
  • Now we are going to try to improve that by reading the above article and watching the video below:
  • What does the article/ video/online checker suggest we do to make our passwords stronger?
  • What in the future are we going to replace passwords with?
  • What five tips would you give to someone to making a new secure password? Write them down!

Document It

  • In your document say how you have improved your password security i.e how long did it take to break at the start and now with your new password.

Research It

  • We have improved our password, at this point feel free to change your network password, now we need to protect it from us!
  • Look for examples of people being tricked. This article is a good starting point.
  • The video on this page is good too!
  • Think of tips to help us not being deceived into giving out of details.

Badge It - Silver

  • You should already have answered the above questions in full sentences which shows your strength of password at the start of the lesson and then new stronger version.
  • You should have written a 'top 5 tips' on choosing a password.
  • Finally from reading the two articles, including the video, write a sentence or two on how to avoid being tricked.

Malware and Security

Learn It

  • Malware is any type of software that is designed to do harm to your computer.
  • These might be viruses, adware, spyware, trojan horses, ransomware, scareware or worms.
  • Viruses are programs that embed themselves in some other software (including the operating system) on the target system without the user's consent and when that is run causes the virus to spread.
  • Adware is a software that downloads or displays unwanted ads when a user is online, collects marketing data and other information without the user's knowledge or redirects search requests to certain advertising websites.
  • Spyware is a program that do not spread like viruses; instead they are installed by exploiting security holes. They can also be hidden and packaged together with installed software.
  • Trojans are any malicious computer programs which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.
  • Worms are stand-alone malware programs that actively transmit themselves over a network to infect other computers.
  • Ransomware affects an infected computer in some way, and demands payment to reverse the damage.

Badge It - Gold

  • Adding to your written notes to be uploaded, answer the following questions:
  • How do you remove these malicious software programs?
  • Prevention is better than cure - give me five tips for avoiding them.
  • Find three antivirus programs. Make sure at least one is free and one is paid for.
  • What are the differences?
  • What would you recommend?
  • Finally, What’s a firewall?

Responsible Internet Use

Learn It

File sharing

  • There are piracy laws protecting the distribution of films and other media. It is illegal to rip a copyrighted DVD or CD and distribute it online. However, peer-to-peer (P2P) file-sharing networks and hosting websites mean it is easy to share files with anyone in the world.
  • At which point does sharing a film with others become piracy?

Software piracy

  • Software piracy is any attempt to break the licence terms of a piece of software. This includes downloading and using a program without paying for it, as well as buying, selling or giving away illegitimate copies of a game or any other piece of software. It could mean extracting code from a program, or modifying it without permission in order to do something that the developers did not wish you to do.
  • When you buy software, music or films legally, copyright law forbids you from:
    • giving a copy to a friend
    • making a copy and then selling it
    • using the software on a network (unless the licence allows it, eg it is a business licence)
    • renting the software without the permission of the copyright holder
    • The practice of copying software is a serious problem in some countries. Copying music, films and software illegally means that there is less money available to pay the writers, developers and artists.
    • Some people argue that the incentive to produce new songs, films, television shows and games disappears as a result of piracy.

Privacy

  • What information can we consider to be private and who owns data? For example, photographs that are uploaded to social networks often legally become the property of the website.
  • At what stage can private information like this be used and for what purposes?

Badge It - Platinum

  • You have been tasked with coming up with advice for Year 7s. Make a fun document, poster or presentation, that could be given to students to inform them of how to be reponsible online.

Validate