Você está na página 1de 4

TSI 3013 Information and Communication Technology In Science PBL 2: Ways to prevent from becoming cybercrime victim

Name of group members: Nurul Izzati Musa (D20091035121) Nor Fazilah Zainul (D20091035128) Tuan Zakiah Tuan Mahmood (D20091035112) Aziren Santharan (D20091035141) Munirah Pairon (D20091035142) Nur Ayuni Rozaki D20091035084

Ways to prevent from becoming cybercrime victim

One of the steps to avoid being a victim of cybercrime is by educate ourselves about the knowledge of cybercrime. We must know the techniques they use to trap their victims. All over time, we must be aware of the existence of new scam and phishing. What is scam? Scam is a confidence trick or confidence game to mislead a person usually with the goal of financial or other gain. The confidence trickster, con man or scam artist often works with an accomplice called the shill, who tries to encourage the mark by pretending to believe the trickster. Sometimes we got a bunch of email and messages about we won a grand prize although we did not participate in any contest, or we got a message about we will become the next heir of someones wills. We can found these types of email in spam folder in our email site. Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. There are many type of spam but the most widely recognized form of spam is email spam, mobile spam and phishing. Email spam today is sent via zombie networks which is the network of virus or worm-infected personal computers in homes and office and allows the spammer access the computer and uses it for malicious purposes. Mobile phone spam is directed at the text messaging. This type of spam irritating customers because of the inconvenience and also because of the fee charge per message received. Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in electronic communication. Phishing is an example of social engineering techniques used to deceive users and exploits the poor usability of current web security technologies. Then, we must know how to avert the scam by be suspicious of any email with urgent requests for personal financial information unless the email is digitally signed, avoid filling forms in email messages and always ensure that you are using a secure website when submitting credit cards or other sensitive information via your Web browser. Practicing save surfing when navigating the web, you need to take precautions to avoid phony websites that ask for your personal information and pages that contain malware. Use a search engine to help you navigate to the correct web address since it will correct misspellings. That way, you wont wind up on a fake page at a commonly misspelled address which including typing URLs in directly instead of following links and keeping a close eye on PayPal and other payment accounts. And for people wanting to donate to charity, the U.S. Federal Trade Commission has a charity checklist with tips such as asking groups seeking donations for more information about who is behind the operation, being wary of charities that spring up overnight in response to disasters, and not sending cash or donations. Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet; full name, home address, phone number, Social Security number, passwords, names of family members and credit card numbers. In chat rooms, use a nickname that's different from your screen name. That way, if you ever find yourself in a conversation that makes you uncomfortable, you can exit without having to worry that someone knows your screen name and can track you down via email. Some people who hang out with their friends online set up private chat rooms where only they and the people they invite can enter to chat. You may also want to use

a product like McAfee or Site Advisor. This software is to help you navigate. Site Advisor software is a free browser tool that tells you if a site is safe or not right in your search results, so you are warned before you click. Another way to prevent ourself from being a victim of cybercrime is to practice the safe shopping when we shop online.It is the current trend nowadays that people tend to shop online as an alternative way of going shopping in a mall.Surprisingly,some people even buy goods in the social web such as facebook or tweeters.It is not wrong to shop online but be cautious when shopping at a site that youve never visited before.For example, do a little investigation before you enter your payment information.A trustmark,such as McAfee SECURE, will be able to tell you if the site is safe or not.The most important part is actually when youre on a payment page. Look for the lock symbol in your browser, indicating that the site uses encryption, or scrambling, to keep your information safe. Click on the icon to make sure that the security certificate pertains to the site you are on.Taking one example,when you buy online flight ticket ,its not as easy as you think.You have to look into the official site of AirAsia.After confirming the site is genuine and completed your bookings,you will enter the payment part,step by step.You will pass through an encryption page before choosing your paying method.Another tips here, When it comes time to pay, use a credit card instead of a debit card.This is because if the site turns out to be fraudulent your credit card issuer may reimburse you for the charges, but with a debit card all your money is gone.After submitting your username and password of your bank account,you need to request a TAC number.A TAC is a safety major step taken to ensure that the amount of payment made was informed via your mobilephone.Therefore,you will be notified with the activitys run in your account You also want to look at the address bar to see if the site starts with https:// instead of http:// because this is another way to see if the site uses encryption.Finally, evaluate the sites security and privacy policies in regards to your personal data. Next, be sure to take your passwords seriously. We use them all the time and they must be secure. Selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and away from the wrong hands. Although it may be easier for you to remember short passwords that reference your birthday, middle name, or pets name, these kinds of passwords also make it easy for hackers. Strong passwords can help to secure your information, so choose a password that is at least 10 characters long and consists of a combination of letters, numbers and special characters. Try to select especially strong, unique passwords for protecting activities like online banking. For example, the password STOPPHISHING might be rendered as $T0P-P#!$#!N6. In order to keep strong passwords effective, change them often. Set an automatic reminder for yourself to change your passwords on your email, banking, and credit card websites about every three months. Secondly, change network, email, database and other passwords regularly at least once a month, and not reusing passwords. This can limit the damage caused by someone who has already gained access to your account. If you notice something suspicious with one of your

online accounts, one of the first steps you can take is to change your password. Secondly, never keep your user names and passwords written anywhere. Never keep your passwords in digital form anywhere in your PC or Laptop. Never write down a password, stick it to a computer or under a mouse pad, or keep it in a desk drawer. Anyone finding the written password is like giving the key to your safe to a thief. Then, use firewall to protect against cybercrime. A firewall is a device or set of devices created to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, on the other hand, many firewalls can perform basic routing functions. Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. Lastly, to avoid from becoming cybercrime victim we can use comprehensive security software and always keep the system updated. This is because hackers have a wide variety of ways to access your system and information, you need comprehensive security software that can protect you from all angles. Security software is computer software which is designed to enhance security for an individual computer or for a computer network. As a general rule, it runs all the time, providing background protection, and users can also run utilities to scan their computers for specific computer threats. Besides, there are numerous software companies that make security products, ranging from freeware which can be downloaded by individual computer users to specialty programs designed for particular networks.Some programs are designed for a single and specific purpose, such as spyware removal. Then, the security software can also be used for access filtering. With some computers and networks, access filtering may be desired to keep people away from sites which could threaten security, such as sites which automatically start downloads of malicious code. Access filtering may also be utilized to ensure that people in the workplace only access work-appropriate sites, and to protect young computer users such as children from material which could be threatening or dangerous.

Você também pode gostar