Introduction
The safest and most responsible use of information and communication technology is cyber safety. When using the Internet, safe practice means avoiding personal attacks, preventing unauthorised access, and not engaging in illegal activity.
The cyber safety strategy is based on:
- Maintaining a balanced attitude to the many advantages of technology
- Encouraging the public to recognise ICT-related risks
- Establishing plans for reducing and managing risks
- Recognising the value of effective programmes for teaching and learning
To keep systems and users safe we must understand viruses and malware. The following sections explain what they are, how they harm computers, how to spot them and how to protect yourself.
What is a Virus?
A computer virus is a small program that can enter a computer and self-replicate. Viruses commonly spread through unsafe browsing, opening infected email attachments, and using removable media such as USB drives. Once present, a virus can spread from one computer to another and interfere with normal operation. A virus may delete or corrupt files, alter settings, or use an email program to send copies of itself to contacts.
How a Virus Harms a Computer System
Some viruses are written specifically to damage computers by corrupting programs, erasing files, or reformatting the hard drive. Others replicate rapidly or flood a system with traffic, making it difficult to perform normal tasks. Even less destructive viruses can reduce system performance, consume memory and cause frequent crashes.
Key Symptoms of a Virus Infection
If you notice any of the following, scan your computer with a reputable antivirus program:
- Unusually slow performance
- Frequent crashes
- Unknown or new programs that start when you turn on your computer
- Mass messages being sent from your email account
- Unexpected changes to home page settings or to passwords
Types of Computer Virus
- Boot Sector Virus: Infects the master boot record; difficult to remove and often requires formatting. It usually spreads through removable media.
- Multipartite Virus: Spreads in more than one way, for example by infecting both the boot sector and executable files.
- Direct Action Virus: Also called a non-resident virus; it attaches to specific file types and activates when those files are used.
- Resident Virus: Installs itself into computer memory and can be difficult to detect and remove.
- Overwrite Virus: Overwrites files it infects, destroying the original content. Removal often requires deleting the infected file, losing its contents.
Malware
What is Malware?
Malware (malicious software) is a general term for programmes designed deliberately to cause harm to a computer system, server, user device or network. Malware includes viruses, ransomware, spyware, worms, Trojan horses, adware, rogue software and scareware. Malware is commonly delivered as links or files in email and requires a user to click the link or open the file to execute the malicious code.
Malware has been a threat since the mid-1970s when the Creeper experiment appeared. Since then many malware variants have been created and used to attack computer systems.
How Malware Harms a Computer System
Malware can:
- Steal passwords and personal data
- Delete or corrupt files
- Make computers inoperable
- Allow attackers remote access to devices
- Use infected devices to attack other systems
Key Symptoms of Malware Infection
Signs that your computer may be infected include:
- Computer becomes slow and unresponsive
- Frequent crashes and restarts
- Applications crash often
- Storage space is unexpectedly used or files are missing
- Unusual error messages
- Unwanted pop-up messages
If you observe these symptoms, there is a high chance of malware infection and you should run a full malware scan and follow removal guidance from a trusted security vendor.
Common Types of Malware
- Virus: Intended to damage or disrupt systems and data.
- Worm: A self-replicating programme that spreads over networks by exploiting system weaknesses; it does not require user action to replicate.
- Trojan Horse: Malicious software disguised as legitimate software to trick users into installing it; once installed it can damage files or allow attackers access.
- Spyware: Software that collects a user's browsing and activity data without permission.
- Ransomware: Encrypts or steals data and demands payment to restore access.
Safely Browsing the Web and Using Social Networks
We live in a digital age where much of our life is online. Safe browsing and responsible use of social networks require awareness of identity protection, strong passwords, privacy settings, confidentiality, cyber stalking and reporting cybercrime. The following subsections explain each of these concepts and give practical advice.
Identity Protection
Identity protection means using methods to ensure that personal data which represents you online or offline is secure and not stolen or misused so others cannot impersonate you (for example to access your bank accounts or create online profiles in your name).
What is Identity Theft?
Identity theft occurs when someone uses your personal data without your consent. Thieves can use stolen identity to access funds, open accounts, commit fraud, or impersonate you for other crimes. Complete protection is difficult, but being vigilant helps reduce risk and enables a fast response if theft occurs.
How to Protect Your Identity
- Protect your computer and phone with up-to-date security software
- Learn to spot spam, phishing and scams
- Use strong, unique passwords for each account
- Be alert about what personal information you share online
- Enable additional protections such as two-factor authentication where offered
Password or Secret Key
A password (or secret key) is a string of characters used to confirm a user's identity during authentication. Passwords are usually used with a username and should be known only to the user. Passwords may contain letters, numbers and special symbols. Other related terms are passphrase (longer password of multiple words) and PIN (numeric password).
Steps to Use Passwords Properly
- Treat a password as the gatekeeper between your personal data and potential online threats.
- Create unique passwords for each online account to prevent a breach of one account from affecting others.
- Use passwords to protect all devices: PC, tablet and phone.
- Consider a reputable password manager to store and generate complex passwords.
How to Create a Strong Password
- Make it at least eight characters long (longer is better).
- Use a mix of upper- and lower-case letters and at least one number.
- Include at least one non-alphanumeric symbol (for example: ! @ # $ %).
- Use the first letters of each word from a memorable sentence, and substitute some letters with similar numbers (for example replace 'e' with '3').
- Use a combination of unrelated words, pet names and favourite numbers rather than obvious personal data such as birthdays or addresses.
Privacy
Privacy is the ability to control what computer and Internet data you disclose about yourself and who can access that personal data.
Computer Privacy
Computer privacy is the ability to control what computer data you reveal about yourself and to control who may access this personal information.
Internet Privacy
Internet privacy is a part of computer privacy. It concerns what information you reveal about yourself online, which websites and web applications can access your data, and whether those sites and applications are trustworthy.
What is Personal Information?
Your computer and online activities store and reveal much personal information, such as:
- Websites you have visited
- Files, folders, photos and videos you have created or opened
- Email addresses, chat names and passwords
- Bank and credit card information
- Messages and communications (for example Skype, messaging apps)
- Work, education or creative content you have produced
- Online shopping activities and purchase history
- Photos, videos, age, hobbies and preferences
- Any other personal records stored electronically
All computer and internet information you consider private is part of your personal data.
How to Generate Secure Passwords
- Avoid using the same short or simple password for all accounts; this greatly increases risk.
- Attackers often try obvious details (name, pet, birthday) first, so avoid these.
- Hacked passwords can be used to send spam, steal money or private data, or install malware on your devices.
- Use a password manager to create and store strong, unique passwords for every account.
Confidentiality means protecting information so that only authorised people can access it. Most major security incidents reported in the media involve confidentiality breaches.
Things That You Should Keep Confidential
- Social security numbers or national identity numbers
- Phone numbers of friends, family, colleagues or students
- Driver's licence numbers
- Bank account numbers
- Tax information
- Passwords and login IDs
- Home address and telephone numbers
- Employee ID numbers
- Digital photographs and videos
- Any personal electronic records containing sensitive content
How to Protect Confidential Information
- Encrypt sensitive files and documents
- Manage and limit access to information
- Physically secure devices and paper records
- Securely dispose of information, devices and paper records
- Control how information is collected and minimise unnecessary collection
- Monitor and control how information is used
- Keep devices patched and managed (install security updates)
Cyber Stalking
What is Cyber Stalking?
Cyber stalking is online stalking that involves repeated use of the Internet or other electronic means to harass, threaten or frighten a person or group. It can include false accusations, posting slanderous statements, monitoring someone's online activity or physical location, identity theft, or sending malware to a victim's devices.
Cyber stalkers may use email, texts, social network messages and other communications to follow or intimidate a person. Cyber stalking can appear as unwanted attention, persistent contact, or intrusive interest in someone's life and family activities.
Why We Must Be Aware of Cyber Stalking
- Cyber stalking can take many forms and is often repeated over time via social networks, forums or email.
- It can begin with seemingly harmless messages but can become systematic and threatening.
- Not every negative comment is cyber stalking, but repeated or targeted messages that cause fear or distress may be.
Important Instructions to Fight Cyber Stalking
- Be careful about allowing physical access to your computer and other internet-enabled devices; attackers may install hardware or software to monitor activity.
- Always log out of web accounts when stepping away from a computer and use a screensaver with password protection. Use similar habits on mobile devices.
- Use strong password management and account privacy settings. Change passwords regularly and use a password manager if needed.
- Remove or set to private any online calendars where you list events. Such details can tell a stalker where you will be.
- Limit the personal information shown on social networks (name, DOB, workplace, home town). Use privacy settings to restrict who sees your posts and photos and to prevent your profile appearing in public searches where possible.
What is Cyber Crime?
Cyber crime is any crime that targets or uses a computer, computer network or network device. Cybercrime can be committed by individuals or organised groups. Some attackers seek money, while others act for political, personal or other motives. Attackers range from highly skilled professionals to beginners.
Types of Cyber Crime
- DDoS Attacks: Distributed Denial of Service attacks make an online service unavailable by overwhelming it with traffic from many sources. Botnets-large networks of infected devices-are often used to create this traffic.
- Botnets: Networks of compromised computers controlled remotely by attackers. Botnets can send spam, distribute malware or be used in attacks such as DDoS.
- Identity Theft: Criminals access a person's personal information to steal money, access private data, commit insurance or tax fraud, or create accounts in the victim's name. They may obtain passwords by hacking, collecting data from social media or using phishing.
- Cyber Stalking: Repeated online harassment that causes the victim fear or distress. Cyber stalkers may know the victim personally and use social media, search tools or messaging to intimidate.
- Social Engineering: Attackers contact victims by phone, email or social media and pretend to be a trusted person (for example, a support technician) to gain confidential information such as passwords or bank data.
- Where to Report Cyber Crime: You can file a cyber crime complaint or first information report (FIR) at the nearest police station. Under Section 154 of the Code of Criminal Procedure (CrPC) it is the duty of police to register information or a complaint of an offence.
Practical Measures to Stay Safe Online
- Keep your operating system, browser and applications up to date with security patches.
- Use reputable antivirus and anti-malware software and run regular scans.
- Enable two-factor authentication (2FA) on accounts that support it.
- Be cautious when clicking links or opening attachments in emails, even if they appear to come from known contacts-verify first.
- Do not download software from unknown or untrusted websites.
- Use secure (HTTPS) websites when entering sensitive information.
- Back up important files regularly to an external drive or trusted cloud storage, so you can recover data if ransomware locks your files.
- Educate family members, especially children, about online risks and safe behaviour.
Summary
Understanding viruses, malware, privacy, passwords, cyber stalking and cyber crime helps you use the Internet safely and responsibly. Use strong passwords, keep software updated, learn to spot scams, protect confidential information and report serious incidents to the police. These habits will reduce risk and keep your online life more secure.