This document discusses various computing ethics and security best practices. It recommends regularly updating software, using antivirus software, strong and unique passwords, and caution when downloading files or entering personal information online. It warns about phishing scams, social engineering tricks, and protecting information in public places like internet cafes. The overall message is that practicing basic online safety and being wary of potential threats can help avoid most cyber dangers.
1. Computing Ethics
Towards Safe Computing
By: Dheeraj Mehrotra
www.computerscienceexpertise.com
computerscienceexpertise.com
Towards Quality IT Literacy
3. Ensure you have the latest
updates. Install updates and
security patches on all servers,
desktop and laptop PCs.
computerscienceexpertise.com
Towards Quality IT Literacy
4. Reduce the risk of viruses.
There are numerous things you
can do to protect your computer
and your network against viruses.
Using anti-virus software and
keeping it current is the first step,
computerscienceexpertise.com
Towards Quality IT Literacy
5. Use Windows Security Centre
to manage your settings. Get a
clear picture of the security
settings on your PC using the
single, unified view provided in
the Windows Security Centre.
computerscienceexpertise.com
Towards Quality IT Literacy
6. Download internet files from
trusted sources only. If you're
unsure if the files you want to
download are safe, consider
downloading them to a disk
separate from your hard drive,
such as a CD or floppy. Then you
can scan the files with your virus
scanner.
computerscienceexpertise.com
Towards Quality IT Literacy
7. Use password encryption to protect Office
files. Improved encryption technology has
strengthened password security in Word 2003
and Excel 2003 and extends password
encryption to PowerPoint 2003. Look under the
Tools menu in each of these three programs to
activate password protection. This is an
effective way to restrict access to confidential
business information.
computerscienceexpertise.com
Towards Quality IT Literacy
8. Clean your hard drive before you discard a
PC. If you're getting a new PC or notebook and
your old one is being discarded, be sure to
remove any sensitive business or personal
information before you let it go. This doesn't
mean simply deleting files and emptying your
Recycle Bin. Your options include reformatting
the hard drive or acquiring software that wipes it
clean.
computerscienceexpertise.com
Towards Quality IT Literacy
9. Use a firewall. If your company
uses always-on broadband to
connect to the internet, install a
firewall as a basic line of defence
against outside intruders.
computerscienceexpertise.com
Towards Quality IT Literacy
10. Never surf the web from a
server. As the command centre
for your entire network, a server
typically stores critical business
information.
computerscienceexpertise.com
Towards Quality IT Literacy
11. Be smart about passwords.
Always use strong passwords
that are at least eight characters
long and a combination of lower
and upper case letters, numbers
and symbols. Don't use the same
password repeatedly and make it
a point to change your
passwords frequently.
computerscienceexpertise.com
Towards Quality IT Literacy
12. Create secure, original
passwords. Creating unique
passwords is one of the easiest
ways for consumers to ensure
their privacy and security online.
computerscienceexpertise.com
Towards Quality IT Literacy
13. Avoid deceptive attempts to trick
you into revealing credit card
numbers, bank accounts,
passwords or other personal
information.
computerscienceexpertise.com
Towards Quality IT Literacy
14. To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
any doubt, call the institution
claiming to need the information.
computerscienceexpertise.com
Towards Quality IT Literacy
15. Avoid Phishing
What is phishing?
Phishing means sending an e-mail that falsely claims to
be from a particular enterprise (like your bank) and
asking for sensitive financial information.
Phishing is sending out a 'bait' in the form of a spoofed
e-mail that closely mimics most bank notifications.
The fraudulent mail is socially engineered to convince
recipients to divulge sensitive information such as credit
card numbers, PIN, social security numbers and some
such information as per the experts.
computerscienceexpertise.com
Towards Quality IT Literacy
16. Practice basic e-mail and
downloading quot;street smarts.quot;
Most viruses are transmitted as
e-mail attachments.
computerscienceexpertise.com
Towards Quality IT Literacy
17. Avoid opening e-mail
attachments that contain quot;.vbs,quot;
quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file
extensions. Files that end in
these extensions are most likely
to contain some sort of virus.
computerscienceexpertise.com
Towards Quality IT Literacy
18. Be wary of e-mail messages that
ask for personal or financial
information such as user names
and passwords, credit card
numbers, and other sensitive
personal information, especially
those that are alarming and
upsetting in tone.
computerscienceexpertise.com
Towards Quality IT Literacy
19. Do not click any links inside an e-
mail that is suspected to be
spoofed. Instead, go directly to
the valid company's site then log
on from there or call the company
directly.
computerscienceexpertise.com
Towards Quality IT Literacy
20. Ensure that any Web site visited
is secure when submitting
sensitive information such as
credit card numbers
computerscienceexpertise.com
Towards Quality IT Literacy
21. Knowledge is still the best
protection from getting scammed.
It is important to educate oneself
on Internet fraud.
computerscienceexpertise.com
Towards Quality IT Literacy
22. Ensure that any Web site visited
is secure when submitting
sensitive information such as
credit card numbers
computerscienceexpertise.com
Towards Quality IT Literacy
23. Visit websites by typing the URL
directly into the address bar.
Make sure any site you reveal
information to uses encryption.
computerscienceexpertise.com
Towards Quality IT Literacy
24. Check credit card and bank
statements routinely. Notify
authorities if you suspect any
abuses of your personal
information.
computerscienceexpertise.com
Towards Quality IT Literacy
25. To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
any doubt, call the institution
claiming to need the information.
computerscienceexpertise.com
Towards Quality IT Literacy
26. Keep your passwords strong,
and keep them in your head.
computerscienceexpertise.com
Towards Quality IT Literacy
27. BACK UP THE HARD DRIVE
REGULARLY: Backing up files
will not prevent exposure or
damage from a virus but it can
minimize the consequences.
computerscienceexpertise.com
Towards Quality IT Literacy
28. INSTALL ANTI VIRUS
SOFTWARE: Make sure that you
have antivirus software installed
and that it is up to date.
computerscienceexpertise.com
Towards Quality IT Literacy
29. Don't share your password
with anyone, and don't write it
down - the only secure place
for your password is in your
head.
computerscienceexpertise.com
Towards Quality IT Literacy
30. USE GOOD PASSWORDS: Use
Good Passwords. Do NOT allow
a password to be blank or empty.
computerscienceexpertise.com
Towards Quality IT Literacy
31. SCAN EVERY FILE DOWNLOADED
FROM THE INTERNET BEFORE
USING OR OPENING IT: Another
way computers are infected is from
files downloaded from the internet. If
you scan every file every
time immediately after it is
downloaded, the risk of being
infected is greatly reduced
computerscienceexpertise.com
Towards Quality IT Literacy
32. BE WARY OF PUTTING YOUR
DISK INTO OTHER
COMPUTERS. If you use other
computers such as a colleague’s
computer, these computers may
not be protected. Make sure you
scan any disk that has been
in another computer as soon as
you insert it into your computer.
computerscienceexpertise.com
Towards Quality IT Literacy
34. SCAN YOUR HARD DISK
REGULARLY FOR VIRUSES.
computerscienceexpertise.com
Towards Quality IT Literacy
35. Get anti-virus software. Use it.
Keep it up to date.
computerscienceexpertise.com
Towards Quality IT Literacy
36. If you can't trust the source
you're downloading from, you
can't trust the file.
computerscienceexpertise.com
Towards Quality IT Literacy
37. Don't leave a computer you're
logged into unattended or
unprotected.
computerscienceexpertise.com
Towards Quality IT Literacy
38. 3. When considering what services should
be running on your system, here are a few
easy rules of thumb:
If you don't know what it is or what it does,
don't turn it on. In most every case, if you
find out later that you need it, you can go
back and turn it on.
If it's on, and you don't need it, turn it off.
If it's off, and you don't need it, don't turn
it on.
computerscienceexpertise.com
Towards Quality IT Literacy
39. Oath by kids:
I will not give out any personal information
online without my parents' permission. This
includes my name, phone number, address, e-
mail, location of my school, my parents' work
address/ telephone numbers and credit card
numbers, and my picture. This goes for
anywhere on the Internet, including e-mail, chat
rooms, newsgroups - even Web sites that
promise me free stuff or prizes, or on Web
pages that I make myself.
computerscienceexpertise.com
Towards Quality IT Literacy
40. Oath by kids:
When using the Internet, I will
always use a pretend name or
nickname that doesn't reveal
whether I'm a boy or a girl.
computerscienceexpertise.com
Towards Quality IT Literacy
41. Oath by kids:
When creating a password, I will
make one up that is hard to
guess but easy for me to
remember. To avoid having it
stolen, I will never reveal it to
anyone (except my parents) - not
even my best friend.
computerscienceexpertise.com
Towards Quality IT Literacy
42. Oath by kids:
I will not respond to any message
that makes me uncomfortable. I
will show an adult right away.
computerscienceexpertise.com
Towards Quality IT Literacy
43. Oath by kids:
I will arrange to meet a friend I
have made on the Internet ONLY
if one of my parents has been
informed and will be present.
computerscienceexpertise.com
Towards Quality IT Literacy
44. Oath by kids:
I will not send an insulting or rude
message to anyone online. This
is called quot;flamingquot; and it is not
good Netiquette.
computerscienceexpertise.com
Towards Quality IT Literacy
45. Oath by kids:
I will not open e-mail, files, links,
pictures or games from people
that I don't know or trust. I will
always ask an adult first.
computerscienceexpertise.com
Towards Quality IT Literacy
46. What you need to worry about:
Email frauds:
Emails that cheat you of huge sums of money by
offering fantastic overseas financial schemes and
promising great returns
nasty or obscene emails
People hacking into your account
People publishing your personal details (name,
photograph, telephone numbers) on dating or
pornographic sites without your consent
Identity theft: When people steal your personal
information
computerscienceexpertise.com
Towards Quality IT Literacy
47. THINGS YOU NEED TO WORRY
ABOUT:
Social engineering: When people trick you
into revealing your password
Downloading files or attachments that
may have Trojans (destructive programs
that masquerade as benign applications)
Clicking on links that can pick up your
personal details.
Losing money while shopping online
computerscienceexpertise.com
Towards Quality IT Literacy
48. Precautions you can take:
Email security:
Be careful where you post/submit
your email id on public forums.
Share it only with known people.
Do not download attachments or
files received through emails sent
by unknown persons.
computerscienceexpertise.com
Towards Quality IT Literacy
49. At a cyber café:
Never surf from a cyber café if you are keying in
any sensitive data. The computer may have a
program running in the background that is
storing all your information.
Be careful of inquisitive surfers around.
Always logout of all your messengers and any
mailbox you have open, before you leave.
computerscienceexpertise.com
Towards Quality IT Literacy
50. At home:
Most companies regularly release patches for security
holes in their software products. Always keep your
operating systems and software you regularly use (like
browsers, instant messengers, email programs, media
players) updated by downloading these patches.
Never click on links that say, 'download software' unless
you are absolutely sure of the content.
Never click on pop-ups that say, 'Click here for more
information'
computerscienceexpertise.com
Towards Quality IT Literacy
51. Better safe than sorry
If you stick to the above principle,
you can avoid most of the online
dangers.
computerscienceexpertise.com
Towards Quality IT Literacy
52. • An Initiative by:
– Dheeraj Mehrotra
• www.computerscienceexpertise.com
• (TOWARDS QUALITY IT LITERACY FOR ALL)
computerscienceexpertise.com
Towards Quality IT Literacy
53. •
Read a BLOG on QUALITY IN
EDUCATION:
http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/
Visit: www.computerscienceexpertise.com
The Quality IT learning Portal for All
computerscienceexpertise.com
Towards Quality IT Literacy