Internet Safety: Parents
e-Securitye-security
e-security or internet security covers a range of activities to keep electronic information secure.
The Government’s Stay Smart Online website provides specific cybersecurity information including information sheets with advice about content filtering options.
e-security risks include:
- Viruses, worms and trojans
What is a virus?
A virus is a piece of malicious computer code transmitted by email, through infected downloads including new software, images, music files, infected computer devices such as a USB or when surfing the web. Viruses can damage computers, steal information and spread to other computers.
What is a trojan?
A trojan is a program which can damage a computer, steal private data, give other people access to the computer or spread a virus.
What is a worm?
A worm is a self-replicating program that can spread without user intervention. Worms are designed to further infect computers with other types of malicious software, such as programs that send spam. A worm can spread by sending itself to contacts in an email address book, or by a security flaw in a program or in the computer’s operating system.
What happens if my computer is infected?
The most common symptoms that a computer has been infected by a virus include:
- files and data have been deleted or file names are changed
- the computer takes longer to load programs or applications or web pages
- the computer takes longer to boot, continually restarts or does not start at all
- items and images on the screen are distorted and unusual images and text appear
- the hard disk may be inaccessible or appear to be working harder than normal
- excessive network activity (lights blinking excessively on modem)
- the web browser opens on a different homepage
- frequent system or program crashes.
This is not an exhaustive list and these symptoms may occur for reasons other than a virus infection. Seek advice from a computer professional if you suspect your computer may have become infected by a virus.
- Spyware and adware
Spyware is a computer program that is remotely installed on computers, usually without permission from the owner, with the purpose of collecting information and sending it back to another source.
Spyware can be a minor annoyance or a serious threat to computer security. At its most aggressive, spyware can be used to steal personal information, banking details and passwords.
Adware is a form of spyware that records a user’s web-surfing habits and displays advertisements targeted to their interests. Adware is sometimes offered in exchange for ‘free’ services, such as music downloads.
- Scams, spam and phishing
Scams are ways of obtaining information or money through false means. According to the Scamwatch website, scams target people of all backgrounds and succeed for two reasons. Firstly, a scam looks like the real thing and secondly, it appears to meet a need, offering quick cash, asking for a response to a compassionate issue, or making people feel special, for example. ‘Congratulations you are one of the lucky few chosen…’
Spam is an unsolicited commercial electronic message. This includes email, instant messaging, SMS and MMS received without consent, usually advertising a product or service. Spam can waste time and lead to viruses. Although the most common place to find spam is in an email, it can also appear in online forums, instant messaging chats, newsgroups and blogs.
Phishing is the use of email or SMS to encourage individuals to reveal financial details like credit card numbers, account names and passwords or other personal information. Phishing messages can look like genuine messages from a real bank, telecommunications provider, online retailer or credit card company. Often the message will contain an urgent ‘call to action’, such as claims that the bank account will be closed or compromised if action is not taken. Phishing is usually sent by email from falsified email addresses, but is increasingly being sent to mobile telephones and VoIP telephone services.
Tips for managing scams, spam and phishing (PDF 98KB)
- Pop-ups
Understanding pop-ups
Pop-ups are small windows that appear in front of an internet browser. They are frequently used to display advertising, including advertising for unwanted content such as pornography. Pop-ups are also used by many websites to enable users to enter required information legitimately.
Pop-ups used for advertising can annoy users, as they can appear without notice or warning. They can also open websites which are difficult to close, or link users to other, unwanted website content.
Managing pop-ups
There are a number of ways to manage pop-ups using settings on search engines or internet browsers. For example, the Google toolbar provides a free pop-up blocker that enables users to configure those websites where they want to allow pop-ups to appear, and to block pop-ups on websites where they aren’t required.
A number of popular browsers allow users to change settings to block pop-ups. Check the ‘Help’ options on these browsers for information.
There are some legitimate websites that invite users to switch off pop-up blocking software temporarily because a pop-up from that site will help the user to enter information required by the site. If it’s a reputable website, you can temporarily turn off pop-up blocking.
- Protecting against internet security risks
Firewalls
Firewalls can block all traffic between the internet and a computer that is not explicitly allowed, preventing unauthorised access to data. A firewall provides protection from viruses, spyware, spam as well as protecting personal identifying information and personal data stored on a computer. Having a firewall permanently turned is the first line of defence against viruses, spyware and hackers.
Most operating systems provide a firewall as part of a basic security set-up. Commercially available security software such as anti-virus and anti-virus software programs may also include a personal firewall option.
Securing a wireless network
Wireless networks in the office or at home enable users to share files, printers and internet access between all their computers without cables.
Wireless networking is very useful, but if not password protected, your wireless network may be accessed by others—even people who live next door or across the street. This could lead to you exceeding your download limit without knowing why. It can also enable others to access your personal information.
View the e-security tips (PDF 107KB) for ways to protect your wireless network. For more detailed information about protecting your wireless internet connection visit Stay Smart Online.
Safer use of public computers and public Wi-Fi
There are countless public computers offering internet access including computers in libraries, airports and internet cafes. Because these computers are accessible to many people, taking extra precautions to protect personal information and protect against possible virus infection is important.
Remember not to leave a public computer unattended until fully logging out, or save any files or any log-in information public computers. Where a website has an automatic log-in checkbox, it’s a good idea to uncheck it. This helps to prevent others logging in with your identity later. When you’ve finished, clear the history, quit the browser, log out and, if possible, reboot the computer.
If using a public wireless network try to avoid online banking or credit card transactions, and ensure that security software, such as anti-virus and anti-spyware software and a firewall, are installed on the laptop.
Where do I go for help?
Cybersmart Outreach internet safety awareness presentations
Cybersmart Outreach offers free Internet Safety Awareness presentations for parents, students and teachers. These sessions are informative, non-technical and available to all schools. Ask your child’s school if they have registered to host a parent presentation.