Cybercrime Activities

Site: UNESCO ICT Competency Framework for Teachers International Courses Repository
Course: ICT Essentials for Teachers (Module 4)
Book: Cybercrime Activities
Printed by: Guest user
Date: Sunday, 6 October 2024, 9:20 AM

1. Cybercrime Threats

The following are examples of some of the cybercrime threats that exist on the internet:

  • Theft of personal information (aka phishing)
  • Hacking of passwords to access personal information
  • Installing infected programmes/files onto your computer or mobile device
  • Cyberbullying
  • Accessing illegal material on the internet.

 

Let's explore each of these threats in further detail and find out how best we can protect ourselves from such threats.


1.1. Phishing

I am sure that most of us have, at some stage of our digital life, received a request from a person pretending that they are a representative from a company which we deal with. They will usually request you to reveal personal information such as address, contact numbers and login details (including passwords) to specific sites. They may also provide a hyperlink where they request that e.g. your password be changed.  (This is referred to as a 'phishing' attack).

 

The golden rule when receiving such requests is the following:

  • Never give out personal information to a person/company that you do not know
  • Never list your personal information on social media sites
  • Never follow a link to change your password details without first checking that the request is legitimate.


Watch the videos below which will provide you with clear explanations of what phishing is as well as what 'red flags' you need to look out for when you are a victim of phishing.


York Information Services. (2015). What is Phishing? (CC licence) 

Protected Trust. (2018). Phishing Red Flags (CC licence)

 

1.2. Lack of Password Security

Passwords grant us access to our online personal information such as bank accounts, emails, your computer and mobile devices. What makes it challenging is that it isn't recommended that you use the same password for all of the above so we need to create different passwords for different applications. A further challenge is that some applications even ask you to change your password every 30 days! How on earth do we remember them all?


General Rule

Here are some do's and don'ts that should be followed when creating a secure password:

 

Do’s

  • Do create password with at least eight characters long, although for extra security it should be even longer.
  • Do include numbers, symbols and both uppercase and lowercase letters (e.g. Susp!Ci0us&#).
  • Do use unusual words or words that are difficult yo guess.
  • Do change your password regularly.

 

Don’ts

  • Don't use your birthday date (e.g. 25121999).
  • Don't use your name followed by your year of birth (e.g. John1976).
  • Don't use your spouse/children's names with the year they were born (e.g. Mary1979).
  • Don't use the same password for all your accounts. If someone discovers your password for one account, all of your other accounts will be vulnerable.


The videos below will provide you with some practical tips on password security


First American. (2017). Strong passwords

  


Safety in Canada. (2014). How to create a strong password

  

GoDaddy. (2019). How to keep your passwords safe (CC attribution licence)

  

1.3. Malware

Malware is an abbreviation of malicious software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

 

Unwittingly we can download a file or programme off the internet which contains malware. This file can then infect your computer and either share your personal information with the malware designer or even lock your computer until you pay money to have it unlocked. Malware designers are innovative and it is easy to fall for their scam so it is highly recommended that you don't download, or open, any file or hyperlink that you are not 100% confident is from a legitimate website.


The video below explains what malware is, and the different types that exist.


Malware: Difference Between Computer Viruses, Worms and Trojans

 


How to Avoid Malware

Malware is one of the most common hazards to your computer when you're online, but it is easy to avoid. Developing safe and smart browsing habits can protect you from malware and other threats, like viruses. Securing your computer and learning how to identify and avoid suspicious links are the fundamentals of safe browsing habits.

There are various safety options that you can take to avoid malware, these can include installing antivirus software, installing the latest software updates, avoiding suspicious links and being aware of your browser's security features. 

Have a quick review of the two articles below by tapping/clicking on the topics.


Internet Safety - How to Avoid Malware


Internet Safety - Your Browser's Security Features



Watch the short video below which highlights, in a fun, dynamic yet informative manner, the perils of these first three threats discussed so far. (The video will play on Vimeo)

Internet Security

Internet Security from Talent Plantation on Vimeo.

1.4. Cyberbullying

There are many advantages with the evolvement of digital technology but unfortunately, this evolvement comes with disadvantages too. One of these common downsides is that of cyberbullying. Cyberbullying involves the online harassment of another person through digital means. These digital means can include email, Facebook, WhatsApp, SMS or any other social media platform.

 

The video below will provide you with an indication of the different forms of cyberbullying and the effects that they can have on the recipients. Unfortunately, most of the recipients of cyberbullying do not communicate that they are being bullied so it is up to us, as educators, to be alert to the symptoms of bullying and to make every effort that the learners do not become a victim.


Bezbednonainternet. (2012). Bully (CC BY licence)

 


How to handle cyberbullying

Watch the video on the site linked below, for some tips on how to deal with cyberbullying, should you know that it is taking place. This site also provides insight on how to handle a person who you know is a cyberbully e.g. maybe you are aware that one of your learners is a cyberbully - how do you handle this?

Cyberbullying and Cyberharassment



1.5. Accessing Illegal Material

Illegal material can be easy to find on the internet and it can sometimes be difficult to avoid. Illegal material is illegal for a reason – it is deemed inappropriate and can be damaging to you and the people around you.

 

Examples of illegal materials include:

  • Gambling websites
  • Adult websites including pornography
  • Websites that promote negative actions such as self-harm or eating disorders.

 

When you search for anything on the internet, it creates a 'profile' of you, meaning that all of the things that you search for are saved in a database so people who can access that database know all about your preferences, interests and search history.

 

The easiest way to avoid these sites is not to search for them. Sometimes they can open up automatically on your computer. If this happens, then close them immediately.