0% found this document useful (0 votes)
49 views3 pages

Viruses, Worms and Trojans

The document discusses risks of using the internet such as viruses, hackers, and spam emails. It provides tips for safe internet use including keeping software updated, using antivirus programs, and protecting personal information. Laws including copyright apply online as well as offline.

Uploaded by

giorgiana1987
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views3 pages

Viruses, Worms and Trojans

The document discusses risks of using the internet such as viruses, hackers, and spam emails. It provides tips for safe internet use including keeping software updated, using antivirus programs, and protecting personal information. Laws including copyright apply online as well as offline.

Uploaded by

giorgiana1987
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

According to research conducted by the Organization Save the Children in 2012, the vast

majority of children access the Internet daily or almost daily (86% of these). About 90% of
children assertthat they use at least one social network, most of them (87%) being users
Facebook. Two out of three children have seen or received messages with sexual content, of any
kind on the Internet.

The Internet is an important method of personal and professional communication, but it also has
many risks. For example, it can be used to send viruses and unsolicited messages. That's why it's
important to be aware of information security issues.

Using the Internet is secure as long as you keep in mind the following three basic things:

1. Protect your computer


 Keep your operating system up-to-date.
 Use an antivirus program.
 Use a firewall.
 Back up your important files.
 Take care of what you download.

2. Protect yourself when you are online


 Take care when giving your personal data.
 Think about who he is with talk.
 Remember, it's not all
 of trust and not everyone is
 honest online.

3. Respect the following rules


 You have to respect the law, even when you are on the Internet.
 Remember to take care of othersand when you are online.

Internet Inconvenience:

Viruses, Worms and Trojans

Viruses and worms are dangerous programs that can be spread by email or through Internet
pages. Viruses can destroy files or software on your computer.

Worms spread faster than viruses directly from one computer to another. For example, an email
worm can be sent to all e-mail addresses on the user's agenda on its own. Internet worms are
looking for computers that are connected to the Internet but do not contain the latest PC security
updates.

Trojans or Trojans are dangerous programs that are designed to look harmless, for example as a
game, but once activated, they can destroy files without the user realizing it.
Hackers and crackers

Hackers and crackers are terms that name people entering data systems. They can enter an
unprotected computer through the Internet and abuse, steal or copy files and use them for illegal
activities.

The best way to protect a computer against these attacks is by using a firewall or keeping your
operating system updated.

Send unsolicited Internet messages

Bulk emails are known as unsolicited messages or spam. They overload e-mail programs and can
block e-mail boxes. Those who send unsolicited messages sometimes use email worms as tools.

Five rules for email:

 Never open suspicious messages or email attachments from people you do not know.
Instead, delete them directly from the message menu.
 Never answer an unsolicited message.
 Use the spam filter of your Internet provider or e-mail program if it has one.
 Use a new or family-accessible email address for Internet questions, discussion forums,
etc.
 Never send emails in the chain. Instead, delete them.
 Also keep in mind

Close suspicious pop-ups

Pop-up windows are small windows with messages that encourage you to click on them. If such
a window appears on the screen, the safest thing is to close it by pressing the X button - it's
usually in the upper right corner. You can never be sure what the program will do even if you
press "No".

Do not be fooled
Hiding identity is easy to do on the Internet. It is recommended that you verify the identity of the
person you are communicating with (for example, in discussion groups). You should never
reveal personal information on the Internet, except for the people you know and trust. If you are
asked for personal information on a site, read the "Terms of Use" or "Privacy Policy" of the site
before you make sure that the operator explains how it will use this information and whether it
will pass it on to others people.
Laws also apply to the Internet

What is and is not allowed on the Internet?


The Internet is a public space. When you are online, you must adhere to some basic rules - as
you must adhere to traffic rules when driving.

Laws and the Internet


Although most laws have been created before the Internet spreads so much, laws still apply to
the Internet. What is illegal outside the Internet (offline) is illegal and online.

The Internet brings unprecedented free communication opportunities, but also brings obligations.
For example, you are always responsible for the content and legality of your own Internet page
and for what is published on it.

Copyright

The copyright law protects how you implement an idea, but not the idea itself. It is allowed to
copy materials from the Internet for personal use, but do not pass it as their author. For example,
if you use the material for your own presentation, you must also specify the source.

Forwarding unauthorized materials is illegal (such as movie copies or music files in peer-to-peer
networks).

Copying software or databases requiring a license is not allowed, even for personal use.

Unauthorized use of these materials may result in financial claims for damages or may have
other legal consequences.

The Internet is a public space. When you are online, you must adhere to some basic rules - as
you must adhere to traffic rules when driving.

About Information Security

 Remember!
Once you post information on the Internet, you lose control over them and you may not
be able to delete all of their copies.

 Check!
Always make sure you know who you are giving information and understand why they
will be used.

 Think!
It is advisable not to post your personal information on the site because you do not know
what to use for others.

You might also like