INTERNET AND IT'S SAFETY
The internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Accoding to Internet World Stats, as of December 31,2011 there was estimated 2,267,233,742 internet users worldwide. This represents 32.7% of the world's population.
This are problems you might have when using the internet:
VIRUS:
A computer virus is a program or piece of code that is loaded onto your computer without your knowlede and runs against you wishes. Viruses can also replicate themselves. All computer viruses are man-made. a simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all avaible memory and bring the systemto a halt. An even more dangerous type of virus is one capable of transmitting itself across netwrok and bypassing security systems.
Viruses can get on to your computer through
- Visiting certain websites
- Opening emails downloading attachements or content from the Internet
- using infected protable storage devices such as memory sticks, CDs, DVDs
- Connecting to an infected hard disk.
SPYWARE:
A Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be download from the internet howeve it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even password and credit numbers.
COOKIES:
A cookie is a small file which stores information related to your internet activity and then reports this back to the website server.
Cookies are used legimately by website creators to enable websites to be customised for individual users.
For example, if you go on the BBC website, you can customise the hompage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can ucause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
PHISHING:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information.
SPAM:
Spam is flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to receive
it. Most spam is commercial advertising, often for dubious products,
get-rich-quick schemes, or quasi-legal services. Spam costs the sender very
little to send -- most of the costs are paid for by the recipient or the
carriers rather than by the sender.
HACKERS:
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer withouth your permission in order to steal information which they could use for malicious or criminal purposes.
Using
peer-to-peer software could increase the risk of
hackers accessing data stored on your computer.
IDENTITY THEFT:
Identity Theft is a crime whereby criminals impersonate individuals, usually for financial gain. In todays;s society, you often neeg to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address chnage and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfer in your name, to wipe out your bank account.
This is a list of how we can protect ourselves from this risks:
Copyright
Patents
Trade Marks
Other
protection
COPYRIGHT:
A Copyright protects the form of expression of a creator against copyin. literary, dramatic, musical and artistic works are included within the protection of U.S copyright law. The USPTO does not register copyrights, are the copyrights office does not.
Copyright protection is given to the authors of "original works of authorship, " including literary, dramatic, musical, artistic and certan other intellectual works. This protection is available for both published and unpublished works.
The owner of copyright has the exclusive right to do and to authorize others to do the following:
- Reproduce the work in copies or sound recordings.
- Make derivative works based upon the original.
- Distribute copies or sound recordings of the original to the public by sales, rentals, leasing, lending or licensing.
- Perform the original publicly: and that would include the use of digital audio.
- Display the original publicly.
PATENT:
A patent is a set of exclusive rights granted by a government to an invento or applicant for a limited amount of time (normally 20 years from filing date). It is a legal document defining ownership of a particular area of new technology.
Patents are Granted in over 150 countries and are predicted on the theory that inventors are more likely to invent and disclose that knowledge to the public in exchange for a limited period of exclusivity. the right granted by a patent excludes all other from making, using or selling an invention or products made by an invented process.
TRADEMARK:
Trademarks is a distinctive sign or indicator used by an individual, business organization, or ohter legal entity to identify for consumers that the products or services on or with wich the trademark appears orignate from a unique source, designated for a specific market, and to distinguish its products or services from those of ohter entities.