User's Manual
81 - Internet and online security
FRPSDQ\OLNH1RUWRQRU0LFURVRIWDQGWKDW\RXKDYHDYLUXV7KHPDLQ
PRWLYH EHKLQG WKHVH VFDPV LV WR H[WRUW PRQH\ IURP WKH YLFWLP
&\EHUFULPLQDOVFDQDOVRLQVWDOOPDOZDUHVXFKDVNH\ORJJLQJVRIWZDUH
RUEDFNGRRU7URMDQVLQRUGHUWRJDLQDFFHVVWRSHUVRQDOLQIRUPDWLRQ
+RZWRVWD\VDIH'RQWIDOOIRUSKRQHFDOOVWKDWWHOO\RX\RXUVRIWZDUH
RU FRPSXWHU LVQW ZRUNLQJ 1HYHU JLYH \RXU SHUVRQDO LQIRUPDWLRQOLNH
VRFLDOVHFXULW\RUFUHGLWFDUGQXPEHUVWRVRPHRQHWKDW\RXGRQWNQRZ
RYHUWKHSKRQH
Common threats cybercriminals use
1RZ\RXNQRZDIHZYHU\FRPPRQZD\VF\EHUFULPLQDOVWU\WRVQHDN
RQWR\RXUGHYLFHRUWULFN\RXLQWRSURYLGLQJSULYDWHLQIRUPDWLRQWRWKHP
GLUHFWO\ +HUH DUH D IHZ RI WKH W\SHV RI PDOZDUH WKH\ OLNH WR GHSOR\
RQFHWKH\YHJRWLQWRDGHYLFHDQGZKDWWRGRLI\RXUHHYHULQIHFWHG
Ransomware
$ IRUP RI PDOZDUH WKDW ZLOO HQFU\SW SHUVRQDO GDWD ILOHV RQ \RXU
FRPSXWHUDQGDWWDFKHGGHYLFHV(QFU\SWLRQFRQYHUWVILOHVLQWRDQRWKHU
IRUPDWWKDWFDQRQO\EHRSHQHGZLWKDVSHFLILFGHFU\SWLRQNH\2QFH
WKHUDQVRPZDUHLQVWDOOV LWVHOI LW ZLOO GLVSOD\ D ZDUQLQJ PHVVDJH WKDW
WKH FRPSXWHU LV QRZ ORFNHG 7KH XVHU LV JLYHQ D VSHFLILF DPRXQWRI
PRQH\ WR SD\ DV D ILQH DQG D WLPHIUDPH LQ ZKLFK WR SD\ (YHQ LI
SDLGWKHFULPLQDOPLJKWFKRRVHWRQRWXQHQFU\SWWKHILOHVDQ\ZD\
:KDWWRGRLI\RXUHLQIHFWHG$YRLGJHWWLQJLQIHFWHGLQWKHILUVWSODFH
E\ VWD\LQJ SURWHFWHG ZLWK LQWHUQHW VHFXULW\ VRIWZDUH OLNH 1RUWRQ
6HFXULW\$OVRSHUIRUPUHJXODUEDFNXSVRIDOO\RXUGDWDHLWKHURQOLQH
RU WR D VHSDUDWH H[WHUQDO KDUG GULYH WKDW LV only attached WR \RXU
FRPSXWHUZKLOHSHUIRUPLQJWKHEDFNXS5DQVRPZDUHKDVEHHQNQRZQ
WRORFNDFFHVVWRH[WHUQDOKDUGGULYHVDWWDFKHGWRWKHFRPSXWHU
,I \RX DUH LQIHFWHG ZLWK UDQVRPZDUH WKLQN WZLFH EHIRUH \RX SD\ WKH
UDQVRP7KHUHLVQRJXDUDQWHHWKHF\EHUFULPLQDOZLOOXQORFN\RXUILOHV
DQG\RXOOEHIXQGLQJWKHPWRSUH\XSRQDQRWKHULQQRFHQWYLFWLP
Botnets
$ ERWQHW LV D VWULQJ RI LQIHFWHG FRQQHFWHG FRPSXWHUV FRRUGLQDWHG
WRJHWKHU WR SHUIRUP D WDVN %RWQHWV JDLQ DFFHVV WR \RXU PDFKLQH
WKURXJK VRPH SLHFH RI PDOLFLRXV FRGLQJ 2QFH WKH VRIWZDUH LV
GRZQORDGHGWKHERWQHWZLOOQRZFRQWDFWLWVPDVWHUFRPSXWHUDQGOHWLW
NQRZ WKDW HYHU\WKLQJ LV UHDG\ WR JR 1RZ \RXU FRPSXWHU SKRQH