Page 57 - Cyber Safety C-7
P. 57

By practising ethical behaviour and digital kindness, everyone can make the online world a better
                 and safer place.



                 RECOGNISING AND SAFEGUARDING YOURSELF FROM

                 CYBER THREATS

                 In recent years, students have spent more time online and this trend is likely to continue. However,
                 as more people go online, cybercriminals are also increasing, targeting those who are new to the
                 digital world. To stay safe, it’s important to understand cyber threats like malware and computer
                 viruses and learn how to protect yourself.

                 Malware is a type of software designed to cause harm to your computer or steal information. It’s
                 a broad term used to describe any harmful software, including viruses, spyware and ransomware.

                 Malware comes in various types, such as viruses, spyware, ransomware, worms, etc.
                 A computer virus is a specific type of malware that can spread itself to other programs and files
                 on your computer. When you run the virus, it can damage, steal or delete data. Viruses often
                 replicate themselves and spread from one program to another.


                 Identifying and Mitigating Cyber Threats
                 Identifying  and mitigating cyber  threats  involves a structured,  proactive  approach  of risk

                 assessment,  control  implementation  and  continuous  monitoring.  Key  strategies  involve a
                 mix of people, processes and technology to defend against evolving threats like phishing and
                 ransomware. Cyber threats can take many forms and often evolve to exploit new vulnerabilities
                 and human error.

                 Some key signs to identify cyber threats are:
                      Suspicious Emails or Messages: Look out for unsolicited messages asking for personal details
                    or offering too-good-to-be-true deals, often with urgent requests.

                      Unexpected Pop-ups or Ads: Be cautious of pop-ups that claim to be security warnings or
                    prompt you to download unknown software.

                      Slow  or  Unresponsive Devices: A sudden  drop in device  speed  or frequent crashes can
                    indicate malware running in the background.

                      Unfamiliar Account Activity: Unexplained logins or changes to your account settings may
                    suggest someone else has gained access.

                      Strange  Device Behaviour: Unexpected  software installations  or redirects  to  unfamiliar
                    websites are signs that your device might be compromised.
                      Security  Software  Alerts: Pay  attention  to  warnings from antivirus  programs  or firewalls

                    about detected threats or suspicious activity.






                                                                             Cyberbullying—Recognising and Responding  55
   52   53   54   55   56   57   58   59   60   61   62