0% found this document useful (0 votes)
20 views18 pages

Project Roman ECL

Uploaded by

roman.kirkorov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views18 pages

Project Roman ECL

Uploaded by

roman.kirkorov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

RULES OF

BEHAVIOR
THE ON
INTERNET

Roman Kirkorov
CONTENT

INTRODUCTION.......................................................................................................................................
MAIN PART.............................................................................................................................................
Theoretical aspect...........................................................................................................................................
● ONLINE CORRESPONDENCE............................................................................................................................

● CYBERSECURITY................................................................................................................................................

● ANALYSIS OF THE THEORETICAL ASPECT.......................................................................................................


Practical aspect................................................................................................................................................
Preparing and launching the survey...................................................................................................................................
Survey results....................................................................................................................................................................
Recommendations.............................................................................................................................................................
CONCLUSION...........................................................................................................................................
LIST OF USED SOURCES............................................................................................................................

1
INTRODUCTION
Subject of the research: Internet communication and cybersecurity.

Relevance: The current century is the age of technology, and everyone spends several hours on
the internet, which has some risks, as there are more and more scammers. You need to know the
rules of safe communication on the internet.

Purpose: To protect people from malicious sites and programs, as well as intruders who work
through electronic means of communication.

Tasks:

1) To study the topic of communication on the internet.

2) Study the topic of cybersecurity.

3) Conduct a survey on this topic among the lyceum participants and draw conclusions.

4) Give a number of recommendations that will help protect the internet user.

Hypothesis: Nowadays, many students become victims of intruders, because they do not know
the basics of safe behaviour on the Internet.

Research methods: Search and analysis of articles that describe existing research projects on
this topic. Conducting a survey on this topic among students of Lyceum 1535.

The intended result of the study: Confirmation of the hypothesis based on the results of the
survey.

Research product: Providing a number of practical recommendations that will help people.

2
MAIN PART
In 2022, the percentage of internet users in Russia was 89% of the total population. This
means that the popularity of internet communication tends to real communication, therefore, the
internet crime rate is also growing.

Theoretical aspect
● ONLINE CORRESPONDENCE
Communication on the internet today is an integral part of every teenager's life. Besides,
this type of communication is becoming very popular among adults. About 69% of users believe
that it is easier to communicate on the internet than in real life. Internet correspondence is a
modern, affordable and fast means of transmitting information. This method became more
popular after 2000. Nowadays everyone communicates actively this way. Companies also began
to switch to communication in messengers, as it is very convenient and simple.

Trolls and netiquette


There are a lot of scammers, intruders and trolls on the internet. A troll is a person who
feeds on negative energy, who enjoys making chaos around him. Also, he does not follow the
netiquette (Network etiquette (netiquette) is a set of rules for online communication, email
correspondence, mailing lists, etc. The rules of network etiquette are not universal and strictly
established, they can vary significantly in different network communities. Gross violations of
etiquette are insult, slander, misinformation, advertising and self-promotion in unintended
places) Using anonymity, and, hence, impunity, trolls are engaged in unacceptable things: they
interfere with the discussion of important issues, give harmful advice, spread misinformation.
Most often they do it for fun. It makes no sense to argue with such people, they should be
ignored and added to the blacklist.

Teenage slang
Internet correspondence influenced the younger generation. This is expressed in the speech
of teenagers and their slang, they began to use a simplified language. In Internet correspondence,
everything should be stated briefly and clearly. Abbreviations and loanwords are used for this

3
purpose. Examples of abbreviations: inet (internet), comp (computer), proga (program) and
others. Examples of loanwords:

▪ blog (Russian pronunciation) — blog; bloger (Russian pronunciation) — blogger

▪ brauzer (Russian pronunciation) — browser

▪ veb (Russian pronunciation) — web

▪ defoltnya (Russian pronunciation) — default (value)

▪ internet (Russian pronunciation) — internet

▪ klik (Russian pronunciation) — click

▪ onlain (Russian pronunciation) — online

▪ lagin (Russian pronunciation) — login

New words appear by word formation from borrowed words. As a result, verbs such as:
upgreydnutsya, fludit', konnectit'sya, banit', haknut' and others appear. Studies have shown that
every year it becomes more and more difficult for students to switch from a spoken language to
an official one (for example, when writing an essay), since slang has already become a very
considerable part of the active vocabulary of children. Additionally, people use emojis as an easy
way to demonstrate their emotions, since sometimes it is very difficult to do it by text. The most
famous network symbol – smiley emoji appeared over 40 years ago. Its creator is considered to
be a professor of psychology at Carnegie Mellon University, Scott Falman, who suggested using
a smiley face in correspondence. Currently, over 500 graphic symbols are used in chats and SMS
messages, expressing emotions or replacing phrases.

4
● CYBERSECURITY
On the internet, it is much easier to deceive a person, since an ordinary internet user has a
deceptive sense of greater security than in real life. At the same time, most of all, when meeting
or communicating in messengers and social networks, users fear the risk of being deceived by
scammers (53% of people), receive unwanted messages (30% of people), get harassment in real
life (14% of people), believe that it is indecent to get acquainted online (11% of people) and fear
abuse (7% of people). However, unfortunately, many underestimate the attackers, and people
often become victims of leakage of personal information or loss of money. Let's look at all kinds
of dangers that can cause any problems for the user.

Computer viruses
A computer virus is a program that gets on a user's computer in some way. It harms the
performance of the computer, the information on the computer and the system as a whole. Such
programs often get to the device via the internet, but they can be accessed via a USB flash drive.
Such cases of a virus getting into a device can be divided into two types: when a person
downloaded something himself and when a virus purposely got into a person's device (hacker
interference).

WI-FI networks
WI-FI is one of the best ways to connect to the internet. But you can not always get access
for free: sometimes you need a password (if it is a private network). It's also worth noting that
public WI-FI networks are not very secure.

Social media sites


A social network is a site where everyone can register (create their own page) and start
communicating with other people, having common interests. Everyone can tell about themselves,
as well as about their daily lives. But we must remember that everything that is posted on the
internet remains there forever, even if you delete it soon.

Email
Email is a convenient way of communication which became popular in the last century.
Each registered user has their own mailbox, which usually looks like this:
nickname@domain_name, for example [email protected] . It is worth noting that this
method of communication is most often used by companies or some organisations, for example

5
Lyceum 1535. But nowadays even companies are switching to messengers, as it is more
convenient, but email is still in demand, but for official letters.

Cyberbullying
Cyberbullying is hooliganism on the internet. It is harassment by messages containing
insults, intimidation, aggression. It can also be a social boycott using various internet services.

The main characteristics of cyberbullying are:

- the frequency of destructive actions against the victim;

- the presence of intent to cause damage to the victim, both psychological, mental, and physical;

- causing harm;

- abuse of one's power or influence, position in the internet community.

Electronic money
Electronic money is a very convenient payment method, but there are scammers who want
to get this money. Electronic money has appeared quite recently and just because of this in many
states it is still not written about them in the laws. In Russia, they function and they are already
spelled out in the law, where they are divided into several types - anonymous and non-
anonymous. The difference is that anonymous ones are those in which it is allowed to carry out
operations without user identification, and in non-anonymous user identification it is mandatory.
It is also necessary to distinguish between electronic fiat money (equal to state currencies) and
electronic non-fiat money (not equal to state currencies).

Mobile phone
The mobile phone was originally conceived as something from which you can call and as
something that you can carry with you. The world is developing, and later touch phones began to
appear. Phones tend to be stationary computers in terms of performance. Moreover, the cameras
of modern smartphones have almost reached professional cameras. Attackers are also
developing, who always find a way to inject a virus on someone's mobile phone, since phones
are vulnerable.

6
Phishing or theft of personal data
The main purpose of phishing is to get the user's personal data, in particular logins and
passwords from different sites. In English, phishing is read as fishing (like trying to make the
fish get onto the hook)

● ANALYSIS OF THE THEORETICAL ASPECT


Based on theoretical material, as well as on my subjective estimates, modern students are
switching to slang and it is difficult for them to switch to the official language. Teenagers also
use emojis instead of textual descriptions of emotions, which is very convenient. As for
cybersecurity, along with the development of the internet sphere, attackers are developing, so
there are more and more ways to get someone else's data. All kinds of dangers can be divided
into several types, which is what I did. Thus, nowadays we need to be very watchful on the
internet, and it is important to convey this to children, because they do not understand a potential
danger of the internet.

Practical aspect
Preparing and launching the survey
In order to make sure whether I am right that modern students are quite vulnerable to
intruders (hypothesis), I decided to conduct a social survey among the students of Lyceum 1535.
I formulated 8 questions that interested me the most.

7
Survey results

Based on the results of the survey, we see that the majority of respondents first registered in the
social network at the age of 11-15.

From the provided graph, we can conclude that spam/advertising messages are extremely
popular nowadays and mostly all people have met them.

8
Based on the results of this survey, we can understand that the majority of respondents ignored
such messages, and about a third immediately added a person to the blacklist.

From the provided chart, we can conclude that account hacks are quite popular nowadays, since
as many as 43% of respondents were hacked on some online platform.

9
Based on the results of this survey, we can understand that half of the respondents strengthened
the password after such a case, a quarter of the respondents did nothing and a quarter of the
respondents thought about strengthening the password, but for some reason did nothing.

From the provided graph, we can conclude that almost every fifth person has ever become a
victim after correspondence.

10
Based on the results of this survey, we can understand that 66% of respondents believe that the
reason for such cases among students is a lack of life experience, 69% believe that it is due to a
lack of knowledge in this field, and 39% believe that it is due to haste.

From the provided chart, we can conclude that slightly less than half of the respondents (45%)
believe that an official subject should be introduced at school – "Fundamentals of
Cybersecurity", and 20% believe that this should not be done.

Recommendations
From the sources I have studied, I have collected tips for various cases that will help avoid
trouble on the internet.

11
Cybersecurity tips
Methods of protection against malware:

1. Use modern operating systems that have a serious level of protection;

2. Constantly install patches (digital patches that are automatically installed in order to
refine the program) and other updates to your operating system. Download them only
from the official website of the OS developer. If there is an automatic update mode, turn
it on;

3. Work on your computer under user rights, not administrator rights. This will prevent
most malware from being installed on your personal computer;

4. Use antivirus software products from well-known manufacturers, with automatic


database updates;

5. Restrict physical access to the computer for unauthorised persons;

6. Use external media, such as a USB flash drive, disk or file from the internet, only from
trusted sources;

7. Do not open computer files obtained from unreliable sources.

Tips for working safely on public Wi-Fi networks:

1. Do not share your personal information over public Wi-Fi networks. Working in them, it
is advisable not to enter access passwords, logins and some numbers;

2. Use and update antivirus programs and firewalls. Thus, you will protect yourself from
downloading a virus to your device;

3. When using Wi-Fi, disable the "File and Printer Sharing" feature. This function is closed
by default, but some users activate it for ease of use in work or study;

4. Do not use public WI-FI to transfer personal data, for example, to access social networks
or email;

5. Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address,
enter exactly "https://";

6. In your mobile phone, disable the "Connect to Wi-Fi automatically" function. Do not
allow the device to automatically connect to Wi-Fi networks without your consent.

Basic safety tips on social networks:

12
1. Limit your friends list. You should not have random and unfamiliar people as friends;

2. Protect your privacy. Do not specify passwords, phone numbers, addresses, your date of
birth and other personal information. Attackers can even use information about how you
plan to spend your free time;

3. Protect your reputation - keep it clean and ask yourself the question: Would you like
other users to see what you upload? Think before you publish, write and upload
something;

4. If you are talking to people you do not know, do not use your real name and other
personal information: name, place of residence, place of study, etc.;

5. Avoid posting photos on the Internet where you are depicted in an area by which your
location can be determined;

6. When registering on a social network, it is necessary to use complex passwords


consisting of letters and numbers and with at least 8 characters;

7. For a social network, mail and other sites, you need to use different passwords. Then if
you get hacked, the attackers will get access to only one place, and not all at once.

Basic tips for working safely with email:

1. It is necessary to choose the right mail service. There is a huge selection of free mail
services on the internet, but it is better to trust those you know and who is first in the
ranking;

2. Do not specify personal information in your personal mail. For example, it is better to
choose "musician_fan@" or "pop2013" instead of "andrew13";

3. Use two-step authorization. This is when, in addition to the password, you need to enter a
code sent by SMS;

4. Choose a complex password. Each mailbox must have its own strong, crack-resistant
password;

5. Use multiple mailboxes. The first one is for private correspondence with recipients you
trust. This email address should not be used when registering on forums and websites;

6. Do not open files and other attachments in emails, even if they came from your friends.
Better check with them if they have sent you these files;

13
7. After you finish working on the mail service, before closing the tab with the site, do not
forget to click on "Log Out".

Basic Tips for Mobile Phone Security:

1. Be careful, because when you are offered free content, some paid services may be hidden
in it;

2. Think before you send an SMS, photo or video. Do you know exactly where they will
end up?

3. It is necessary to update the operating system of your smartphone;

4. Use antivirus programs for mobile phones;

5. Do not download applications from an unknown source, because they may contain
malicious software;

6. After you exit the site where you entered personal information, go to your browser
settings and delete cookies;

7. Periodically check which paid services are activated on your number;

8. Give your mobile phone number only to people you know and trust;

9. Bluetooth should be turned off when you are not using it. Don't forget to check it
sometimes.

Basic tips for combating phishing:

1. Keep an eye on your account. If you suspect that your profile has been hacked, then you
need to block it and inform the resource administrators about it as soon as possible;

2. Use secure websites, including online stores and search engines;

3. If you have been hacked, then it is necessary to warn all acquaintances who have been
added to your friends that you have been hacked, and, possibly, spam and links to
phishing sites will be sent on your behalf;

4. Set a strong password (PIN) on your mobile phone;

5. Disable password saving in the browser;

Internet communication tips


1. Think about your interlocutors;

14
2. Show your best side;

3. Read first, then ask;

4. Don't forget about spelling and punctuation;

5. Respect the personal data of others;

6. Respect the time and opportunities of others;

7. Forgive others minor mistakes;

8. Do not abuse the opportunities;

9. Try to avoid word wars;

10. Understand the rules of a particular community;

11. Do not disclose personal information;

12. Use neutral aliases;

13. Don't trust the chat participants;

14. Equality first of all: no one should feel like a stranger;

15. Write briefly and to the point;

15
CONCLUSION
This work is devoted to the study of issues of communication in the network, and since
communication in the network is related to the security of this communication, these two aspects
are considered in the research. At first, I hypothesised that students do not know the basics of
spending time safely on the internet. After that, I analysed the theoretical material using different
sources. Then I first looked at the aspect of communication on the Internet, and then
cybersecurity itself, because attackers often act through internet correspondence. After reviewing
all the theoretical material, I concluded that this topic is very relevant now. Therefore, I decided
to conduct my own survey among the lyceum students. The results of the study showed that my
hypothesis was confirmed, and this was especially expressed in the question where 44% of
respondents reported that they had ever been hacked. And also, in order to help deal with this
topic, I have given a list of recommendations for internet users from reliable sources I have read.

16
LIST OF USED SOURCES

● Russian native language. Grade 9: textbook for general education organisations / [O. M.

Alexandrova etc.]. — M.: Enlightenment, 2018.

● https://www.kp.ru/daily/27382/4576446/

● https://school-science.ru/2/10/31339

● https://volzskint.ru/informacionnaya-bezopasnost/kiberbezopasnost-v-seti-internet/

● https://www.kaspersky.ru/resource-center/preemptive-safety/what-is-netiquette

17

You might also like