Sie sind auf Seite 1von 4

Securing your computer

1. Using the link https://www.staysmartonline.gov.au/protect- yourself/why- matters- you explain,

Make sure your data and privacy is protected from hackers and scammers. Someone could pretend to be you and do
illegal activity.

2. Using the link to the PDF document below,


https://www.staysmartonline.gov.au/sites/g/files/net1886/f/Stay-Smart-Online-My-Guide.PDF, scroll to
and answer the following question.

Discuss the to secure your computer. Briefly explain each of them and what you need to do.

: What you need to do: Stop and think before you provide any photos or financial or personal
information about yourself, your friends or your family

: What you need to do: Use strong, hard-to-guess passphrases and/or two-factor authentication
where available to access your accounts

: What you need to do: when you receive an email, consider who is emailing you and what they are
asking you to do. Call the business a suspect message claims to be from using contact details obtained from
a website or other legitimate source.

: What you need to do: Minimise visits to unknown websites and avoid being enticed by the
promise of sensational content through ‘clickbait’
: What you need to do: Access your bank’s website by typing the address directly into your
browser. (ii) Keep your computer up-to-date with anti-virus, anti-spyware and firewall software. (iii) Use the
security measures (such as two-factor authentication) recommended by your bank. (iv) Always log out of the
internet banking menu and closing your browser when you have completed a session. (v) Research for
unknown retailers and their products and services. (vi) Deal primarily with trusted and reliable online
retailers.

: What you need to do: ) Install reputable security software. (iv) Read the user manual. (v) Use the
most up-to-date operating systems
: What you need to do: Regularly update applications (including anti-virus software and plugins)
and operating systems to fix these vulnerabilities. Most vendors make automatic updates available.

: What you need to do: (ii) Back up your data regularly and retain the backup in a safe location,
preferably protected or isolated from the device the data is being backed up from.

Computer Security Risks

3. Using the link, https://www.communications.gov.au/what-we-do/internet/stay-smart-online/glossar y,


answer the following questions.
a) What is a computer ?
a piece of code which is capable of copying itself and typically has a detrimental effect, such
as corrupting the system or destroying data.
b) How does a virus infect a computer? A computer worm is a standalone malware
computer program that replicates itself in order to spread to other computers.
... Worms almost always cause at least some harm to the network, even if only by consuming
bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer

c) How does a virus work?


Trojans are also known to create a backdoor on your computer that gives malicious users access
to your system, possibly allowing confidential or personal information to be compromised.
Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-
replicate.
d) What does refer to?
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords
and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

e) What is ?
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system.

f) What is and how do we get it?


1. irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for
the purposes of advertising, phishing, spreading malware, etc.
o
2. 2.
TRADEMARK
4. From what you have learnt,
a) What is ?

software that enables a user to obtain covert information about another's computer activities
by transmitting data covertly from their hard drive.
b) What is the difference between by the terms & ?
A hoax email is when your faking to steal someone information or try to get money out of them like a scam.
Spam is just random things telling you stuff trying to scam you.
Try the cyber-safety Game: GRAPPLE
http://www.side.wa.edu.au/static/grapple

How well did you complete the games/activities and what have you learnt from the site? Explain.

Das könnte Ihnen auch gefallen