SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Cyber Security Consumer Tip Sheet
Most of what we do online falls into one of three categories: Talk, Shop and Play. There are
risks associated with all these activities that consumers need to be aware of so they can take
the necessary steps to protect themselves and their computers.
The Canadian Internet Registration Authority (CIRA), in partnership with Media Awareness
Network wants to make sure you stay safe online. We have developed the following list of
potential risks you may encounter during your online experience and suggested tools that may
assist in lowering the level of risk.isk
Steps to Take

Cybersquatting

Scammers may register a Web address that looks like it belongs to a legitimate business, or one
that can easily be typed be accident when navigating to a legitimate Web site.

Tools to use: Bookmarks, Content Filters

Cookies

Small files your Browser saves on your computer. They often include data like your login and
password.
Tools to use: Browser and antivirus updates, Clearing browser cache, Privacy policies, Private browsing tools,
Secure sites.

Data theft

Your financial and personal data can be very valuable in the wrong hands.

Tools to use: Bookmarks, Browser and antivirus updates, Clearing browser cache, Creating strong pass words, Email encryption, Firewalls, Privacy policies, Privacy settings, Private browsing tools, Reporting online crime, Secure
sites.

Excessive spending

The ability to buy real or virtual things instantly can make it easy to lose track of how much
money you’re spending.
Tools to use: Prepaid credit, Content filters

Griefing

Some people enjoy annoying other people on purpose and ruining experiences that should be
fun.
Tools to use: Blocking other users, Contacting sites and ISPs, Content filters, Privacy settings, User/vendor rating
systems
Identity spoofing

It’s easy to pretend to be someone else online. There are lots of fake Facebook profiles and
Twitter accounts that pretend to be from someone they’re not.
Tools to use: Blocking other users, Browser and antivirus updates, E-mail encryption, Firewalls, Managing
reputation, Privacy policies, Privacy settings.

Identity theft

Scammers can steal your online identity by getting access to your credit card or bank
information or to other data you use to verify your identity.

Tools to use: Bookmarks, Browser and antivirus updates, Clearing browser cache, Firewalls, Privacy policies,
Private browsing tools, Reporting online crime, Secure sites.

Malware

These programs — which may pretend to be something useful or install themselves by getting
you to click a box — can hurt your computer or even take control of it.
Tools to use: Bookmarks, Browser and antivirus updates, Firewalls, Secure sites.

Online fraud

It’s easy to be taken in by people online who promise more than they intend to deliver. You can
see a complete list of online frauds at http://www.rcmp-grc.gc.ca/scams-fraudes/indexeng.htm.
Tools to use: Bookmarks, Contacting sites and ISPs, Prepaid credit, Reporting online crime, Secure sites,
User/vendor rating systems.

Phishing scams

E-mails that try to get data from you by pretending to be from a bank or other business.
Tools to use: E-mail encryption, Reporting online crime.

Spyware

Malware that collects data from your computer. Some spyware records everything you type
Tools to use: Bookmarks, Browser and antivirus updates, Firewalls, Secure sites.

CIRA is a proud to sponsor Media Awareness Network
and the important work they do on behalf of Canadians.
Tools to use - definitions
Bookmarks: Most browsers let you set Bookmarks or Favorites so you can go straight to your favorite Web sites.
Blocking other users: Almost every kind of online communication lets you block other users from contacting you.
Browser and antivirus updates: Your Browser is your first line of defence against malware, but you need to keep
updating it. The same is true for free or commercial antivirus software.
Clearing browser cache: The cache is where your Browser saves cookies, so you should clear it often.
Contacting sites and ISPs: Bad behaviour that is not criminal can be reported to a site or the ISP that hosts it.
Content filters: Browsers, ISPs, Web sites and special software all offer ways of filtering out unwanted content.
Creating strong passwords: Choose a password that is at least seven characters long and is based on a word with
no personal connection to you. Change some of the letters to numbers or punctuation marks and use a mix of
upper– and lower-case letters. Then customize the password for each site by adding the first and last letters of the
site. (bananas becomes b@nAn2s and then fb@nAn2sk as your Facebook password.)
E-mail encryption: E-mails can be intercepted and read. Encryption software and some e-mail services allow you to
encrypt your e-mails so they remain private.
Firewalls: These block unauthorized access to your computer. Make sure yours is activated in your Control Panel.
Managing reputation: Do a search for your name to see what picture of you is on the Internet. If you find things
that you don’t like, try to get them taken down. You can also publish things that reflect the image that you want to
be the dominant picture of you. Consider registering your name as a Web address (www.yourname.ca).
Prepaid credit: Some banks and credit cards offer prepaid credit cards which only let you spend a set amount.
Private browsing tools: Most browsers have a function that lets you surf without saving anything in your cache.
Privacy policies: Any site that collects information should have a privacy policy. This should be written in easily
readable language and should explain what will be done with any information you give them as well as how you
can get your information deleted if you want to.
Privacy settings: Social networking sites such as Facebook have privacy settings that allow you to decide who can
see what on your profile. The default settings are often not the most secure, so make sure yours are set to show
your content only to your friends.
Reporting online crime: Online crime can only be stopped if it’s reported. If you know about successful or
attempted crime online, visit http://www.recol.ca/ to report it.
Secure sites: Secure Web sites use methods like encryption to keep your data safe. Look for a Web address that
starts with “https” and a padlock icon at the top or bottom right of your browser window (not the Web site itself.)
User/vendor rating systems: Some online commerce sites allow users to rate vendors based on their experience
with them. Look for a good rating and positive comments. As well, some online games and virtual worlds rate users
based on other users’ feedback. You can use these systems to help fight griefing.
About Us
The Canadian Internet Registration Authority (CIRA) is the organization that manages Canada's .CA
domain name registry, develops and implements policies that support Canada's Internet community and
represents the .CA registry internationally.
Media Awareness Network (MNet) is a Canadian not-for-profit centre of expertise in media and digital
literacy. MNet's programs are funded by its public and private sector sponsors and partners, who
include: CTV • Canwest • TELUS • Canadian Internet Registration Authority • National Film Board of
Canada • BELL.

Más contenido relacionado

Más de - Mark - Fullbright

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Cyber Security Consumer Tip Sheet

  • 1. Cyber Security Consumer Tip Sheet Most of what we do online falls into one of three categories: Talk, Shop and Play. There are risks associated with all these activities that consumers need to be aware of so they can take the necessary steps to protect themselves and their computers. The Canadian Internet Registration Authority (CIRA), in partnership with Media Awareness Network wants to make sure you stay safe online. We have developed the following list of potential risks you may encounter during your online experience and suggested tools that may assist in lowering the level of risk.isk Steps to Take Cybersquatting Scammers may register a Web address that looks like it belongs to a legitimate business, or one that can easily be typed be accident when navigating to a legitimate Web site. Tools to use: Bookmarks, Content Filters Cookies Small files your Browser saves on your computer. They often include data like your login and password. Tools to use: Browser and antivirus updates, Clearing browser cache, Privacy policies, Private browsing tools, Secure sites. Data theft Your financial and personal data can be very valuable in the wrong hands. Tools to use: Bookmarks, Browser and antivirus updates, Clearing browser cache, Creating strong pass words, Email encryption, Firewalls, Privacy policies, Privacy settings, Private browsing tools, Reporting online crime, Secure sites. Excessive spending The ability to buy real or virtual things instantly can make it easy to lose track of how much money you’re spending. Tools to use: Prepaid credit, Content filters Griefing Some people enjoy annoying other people on purpose and ruining experiences that should be fun. Tools to use: Blocking other users, Contacting sites and ISPs, Content filters, Privacy settings, User/vendor rating systems
  • 2. Identity spoofing It’s easy to pretend to be someone else online. There are lots of fake Facebook profiles and Twitter accounts that pretend to be from someone they’re not. Tools to use: Blocking other users, Browser and antivirus updates, E-mail encryption, Firewalls, Managing reputation, Privacy policies, Privacy settings. Identity theft Scammers can steal your online identity by getting access to your credit card or bank information or to other data you use to verify your identity. Tools to use: Bookmarks, Browser and antivirus updates, Clearing browser cache, Firewalls, Privacy policies, Private browsing tools, Reporting online crime, Secure sites. Malware These programs — which may pretend to be something useful or install themselves by getting you to click a box — can hurt your computer or even take control of it. Tools to use: Bookmarks, Browser and antivirus updates, Firewalls, Secure sites. Online fraud It’s easy to be taken in by people online who promise more than they intend to deliver. You can see a complete list of online frauds at http://www.rcmp-grc.gc.ca/scams-fraudes/indexeng.htm. Tools to use: Bookmarks, Contacting sites and ISPs, Prepaid credit, Reporting online crime, Secure sites, User/vendor rating systems. Phishing scams E-mails that try to get data from you by pretending to be from a bank or other business. Tools to use: E-mail encryption, Reporting online crime. Spyware Malware that collects data from your computer. Some spyware records everything you type Tools to use: Bookmarks, Browser and antivirus updates, Firewalls, Secure sites. CIRA is a proud to sponsor Media Awareness Network and the important work they do on behalf of Canadians.
  • 3. Tools to use - definitions Bookmarks: Most browsers let you set Bookmarks or Favorites so you can go straight to your favorite Web sites. Blocking other users: Almost every kind of online communication lets you block other users from contacting you. Browser and antivirus updates: Your Browser is your first line of defence against malware, but you need to keep updating it. The same is true for free or commercial antivirus software. Clearing browser cache: The cache is where your Browser saves cookies, so you should clear it often. Contacting sites and ISPs: Bad behaviour that is not criminal can be reported to a site or the ISP that hosts it. Content filters: Browsers, ISPs, Web sites and special software all offer ways of filtering out unwanted content. Creating strong passwords: Choose a password that is at least seven characters long and is based on a word with no personal connection to you. Change some of the letters to numbers or punctuation marks and use a mix of upper– and lower-case letters. Then customize the password for each site by adding the first and last letters of the site. (bananas becomes b@nAn2s and then fb@nAn2sk as your Facebook password.) E-mail encryption: E-mails can be intercepted and read. Encryption software and some e-mail services allow you to encrypt your e-mails so they remain private. Firewalls: These block unauthorized access to your computer. Make sure yours is activated in your Control Panel. Managing reputation: Do a search for your name to see what picture of you is on the Internet. If you find things that you don’t like, try to get them taken down. You can also publish things that reflect the image that you want to be the dominant picture of you. Consider registering your name as a Web address (www.yourname.ca). Prepaid credit: Some banks and credit cards offer prepaid credit cards which only let you spend a set amount. Private browsing tools: Most browsers have a function that lets you surf without saving anything in your cache. Privacy policies: Any site that collects information should have a privacy policy. This should be written in easily readable language and should explain what will be done with any information you give them as well as how you can get your information deleted if you want to. Privacy settings: Social networking sites such as Facebook have privacy settings that allow you to decide who can see what on your profile. The default settings are often not the most secure, so make sure yours are set to show your content only to your friends. Reporting online crime: Online crime can only be stopped if it’s reported. If you know about successful or attempted crime online, visit http://www.recol.ca/ to report it. Secure sites: Secure Web sites use methods like encryption to keep your data safe. Look for a Web address that starts with “https” and a padlock icon at the top or bottom right of your browser window (not the Web site itself.) User/vendor rating systems: Some online commerce sites allow users to rate vendors based on their experience with them. Look for a good rating and positive comments. As well, some online games and virtual worlds rate users based on other users’ feedback. You can use these systems to help fight griefing.
  • 4. About Us The Canadian Internet Registration Authority (CIRA) is the organization that manages Canada's .CA domain name registry, develops and implements policies that support Canada's Internet community and represents the .CA registry internationally. Media Awareness Network (MNet) is a Canadian not-for-profit centre of expertise in media and digital literacy. MNet's programs are funded by its public and private sector sponsors and partners, who include: CTV • Canwest • TELUS • Canadian Internet Registration Authority • National Film Board of Canada • BELL.