6329 Httpswwwopeneduopenlearncreate Cmid164786 2020-08
Total Page:16
File Type:pdf, Size:1020Kb
OpenLearn Works Lesson 6: Staying safe and legal online 2 of 30 Thursday 29 July 2021 Contents Introduction 4 Learning Outcomes 4 6.1 Protecting your computer from viruses 4 What is a computer virus? 4 Choosing antivirus software 6 Firewalls 7 Updates 8 Email phishing 8 How do spammers obtain your email address? 9 How to spot spam 9 6.2 Cyber security and recognising scams 12 Health scams 14 Romance scams 16 6.3 Fake websites and identity theft 18 Identity theft 18 6.4 Data protection 22 General Data Protection Regulation (GDPR) 22 Lesson 6: Summary 26 Resources 27 Useful videos 29 Acknowledgements 29 3 of 30 Thursday 29 July 2021 Introduction Introduction Welcome to Lesson 6 of Everyday computer skills: a beginner’s guide to computers, tablets, mobile phones and accessibility. In this lesson we will be looking at cyber security – how to stay safe and legal online. We have already looked at staying safe in Lessons 4 and 5, so this lesson will build on what you have already learned. Key words and concepts are in bold. There is a course glossary you can refer to if any of these are unfamiliar to you. This lesson is in four sections: ● Protecting your computer from viruses. ● Cyber security and recognising scams. ● Fake websites and identity theft. ● Data protection. Learning Outcomes When you have completed this lesson, you will be able to: ● Protect your computer from viruses. ● Stay secure online and recognise scams. ● Beware of fake websites and identity theft. ● Identify key data protection issues. 6.1 Protecting your computer from viruses As you discovered in Lessons 4 and 5, there are risks involved in engaging with the world wide web, including computer viruses. There are a few simple steps you can take to protect your computer and the personal information that’s stored on it. In this section, we will look at antivirus software and firewalls. What is a computer virus? A computer virus is software that enters your computer system without your knowledge or permission, and ‘infects’ your computer programs with malicious codes. 4 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses For example, a virus might attach itself to a program such as Microsoft Word. Each time the Word program runs, the virus runs too. A virus can reproduce by attaching itself to other computer programs, files or a hard drive, and can cause havoc. Here are some different types of computer infections: ● Adware is software that causes pop-ups and banner adverts in order to generate revenue. It may not do any damage to your device, but it might be able to access your personal information. ● Malware is short for ‘malicious software’ and means any program or file that is harmful to your computer. It includes viruses, worms, Trojan horses and spyware. ● Ransomware is a type of malware that threatens to publish the victim’s data or block access unless a ransom is paid. ● Spyware is software that helps to gather information about a person or organisation without their knowledge. ● A Trojan horse is malicious code disguised as, or contained within, software that looks legitimate. It can install hidden software to gain access to the users’ systems, usually to steal data or cause data loss. ● A worm is a malicious piece of software that replicates itself in order to spread to other computers. Here are some tips (adapted from Dell Technologies, 2020) to help you protect your computer from viruses and other malware: Never download and install software unless you are certain it is from a trusted source. Install antivirus software that can detect, block and eliminate all types of computer viruses. Keep your antivirus software up to date, as well as running regular scans. Do not open email attachments unless you have scanned them first. Even a picture can carry a virus. Install an anti-malware program to prevent software from being installed on your device without your knowledge. Install anti-spyware software to prevent unwanted adverts from popping up, tracking your activities or scanning your computer for personal information. 5 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses Don’t trust modified software (cracked or hacked software), as it often contains malware. Guide: Protecting your computer GCFLearnFree.org explains how to protect your computer from potential threats in this short video. You can turn on captions by clicking on the subtitles icon in the bottom right corner of the video. View at: youtube:U4lweHnf71E Choosing antivirus software Antivirus software looks for and removes viruses before they can infect your computer. Have a look at PC Magazine’s guide to the Best Free Antivirus Protection for 2020. Your internet service provider (ISP) might offer security software as part of your internet deal. There are also popular free security software programs available to download online, such as AVG or Avast. Windows Defender is also free and already built into recent Windows devices. MoneySavingExpert.com has a guide to the best free antivirus software for PCs and Macs. If you decide to pay for your antivirus software, you may find that it offers more protection than the different pieces of free software listed above. Before you decide, check out the various options online, look at review websites or ask your local computer store for guidance. 6 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses Firewalls Running a firewall on your computer can help to protect you from unauthorised users and control the spread of malware when you’re online. Windows Firewall is included in Windows computers; and Apple products (such as iPads and Apple Macs) have built-in firewall software to safeguard your device. 7 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses Updates Your computer will be better protected from viruses if you keep your operating system updated, because these updates often include security responses to new kinds of threats. Whether your operating system is Windows or Mac, you will receive notifications when new updates are available. You can also update your system manually. If you’re worried that your computer is not working properly or think that it may have a virus, run a scan with your antivirus software. If that still doesn’t work, contact a computer store helpline. Email phishing This section extends what we have already learnt about email phishing in Lesson 4. Most emails sent every day are unsolicited junk mail, such as: advertising, for example online pharmacies, pornography, dating or gambling get rich quick and work from home schemes hoax virus warnings 8 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses hoax charity appeals chain emails, pretending to bring good luck if forwarded to multiple contacts. How do spammers obtain your email address? Spammers may use automated software to generate email addresses. They can also hack into legitimate websites to gather users’ details. Sometimes, they copy addresses from regular emails that have been copied or forwarded to lots of people without using ‘bcc’. They may also buy lists of emails from other spammers or scammers. These may be obtained through spam emails or scams encouraging people to enter their details on fraudulent websites, as we saw in Lesson 4. How to spot spam Spam emails may feature some of the following warning signs: 9 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses You don’t know the sender. The email includes misspellings designed to fool spam filters, such as ‘p0rn’ spelt with a zero. The email makes an offer that seems too good to be true. The subject line and contents of the email do not match. The email makes a pressing offer with an urgent end date. For example: ‘Buy today and get 50% off.’ The email asks you to forward an email to multiple people and may offer you money for doing so. The email comes with a virus warning. The email includes attachments such as an EXE file. EXE files are executable files that run programs. Although not all attachments contain viruses, if the email comes with a virus, it will appear in an attached file. Before you open any file attachments, make sure the file is coming from a trusted source. If in doubt, scan it with up to date antivirus software. Be wary about clicking on an email attachment as it could release a virus that scans your computer for personal information and sends out spam email to people in your address book. You may even get a phone call from someone claiming to be from a well-known software company like Microsoft. The person calling will tell you that there’s a problem with your computer and that they need to get access to it. This is intended to include access to your personal details. Legitimate IT companies never contact customers in this way. If you receive a scam call, hang up immediately. Spam or junk email may contain viruses and spyware and can be a vehicle for online fraud, such as phishing. Unwanted email may contain offensive images and clutters the 10 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses inbox. Never reply to a spam email as this would confirm to the spammers that your email address is active. Activity 6.1: How to spot a scam Allow about 5 minutes Take a look at this visual guide from DigitalLearn.org on recognising scams. Make notes in the space below about some of the signs to watch out for.