Verified Document

Using The Internet Safely Term Paper

¶ … Internet Safely Risks for Children

Avoiding Viruses

Avoiding SPAM

Credit Card Usage

Safety Online

Using the Internet Safely

The Internet is a wonderful place and can create many positive experiences for people of all ages. A vast amount of information is available with a simple click of a mouse. Great deals, convenience and choices are found all over the Internet. However, when exploring what the Internet has to offer, users must be smart to make the most of the online experience. The Internet is a very real place and there is good reason to be exercise caution when using it. The same dangers that exist on the street exist on the Internet.

Risks for Children

Children are often more advanced than their parents on the Internet (Coalition for Children, 2000). Young people are more comfortable with computer technologies, schools are going online rapidly and the Internet is growing in many new ways. Safety in this environment is an evolving issue, as technology holds more information, opportunity and richness of experience, than danger. However, children must understand the risks involved with using the Internet safely.

There is a great deal of risks involved with the Internet pertaining to children. The most common risk for children is exposure to pornography or other inappropriate material. There are many sites on the Internet that are not intended to be seen by children and children must be protected from them.

These sites are relatively easy to find, even by accident. For example, if an innocent child looking for new cheers types the word "cheerleader" into a search engine, he or she will find sites leading to pornographic material.

Children are also at risk of being lured into chat rooms or communicating with other Internet users that might expose them to inappropriate things. They may also be invited to join in acts that are dangerous or illegal. It is difficult to protect children from the dangers of the Internet entirely. However, it can be very beneficial to instruct children on procedures that help them use the Internet safely.

Children should be advised to stay away from sites that make them uncomfortable (NetNanny). In addition, they should be advised not to communicate with strangers on the Internet. It is important to allow children the freedom to roam the Internet yet they should be aware of its dangers.

Many people on the Internet do not have good intentions. People can pretend to be anything they want to be on the Internet. Adults have pretended to be children to lure children into talking to them.

Children must understand that, under no circumstance, should they reveal personal information over the Internet. Rather than giving out their real names, phone numbers, addresses, school names or other personal information, they should use aliases on the Internet.

Unfortunately, one of the greatest risks of the Internet is difficult to prevent. Child molesters have been known to use the Internet as a tool to meeting and kidnapping children. Children should be warned about meeting people on the Internet and restricted from going out with their Internet "friends" or calling strangers on the telephone without parental supervision.

Parents may be held legally or financially responsible for whatever their children do on the Internet. Children may have access to their parents' credit card numbers or other financial information, and the temptation to buy products on the Internet is great. Children should be aware that financial information should never to be given out by anyone without parental consent.

Children tend to download games and programs from the Internet more than any other age group. There is a risk that they may inadvertently download a virus that could damage a computer or lose all of the computer's data.

Children must be trained on the proper use of the Internet before executing any files they download. An updated virus checker should check all executable files before they are executed.

Basically, the best way to keep children safe on the Internet is to make sure that they are aware of all the risks involved with the web and to encourage parents to join them and take an active interest in what they are doing.

In addition, children can be protected from exposure to pornography, explicit language and other inappropriate interactions on the Internet through the use of online groups, such as the Parental Control Center, which assist parents in blocking chat rooms, instant messages, bulletin board services, news groups and pornographic sites (Coalition for Children, 2000).

Avoiding Viruses

Computer viruses are an unavoidable risk of the Internet. Basically, viruses are self-replicating pieces...

However, many of these viruses are specifically designed to wreak havoc on computers by changing the way they work. These changes may be as simple as displaying a message to Internet users, or as destructive as erasing all of a computer's data.
There are many types of viruses. One of the most common forms is a boot sector virus, which appends itself to floppy disks. If an infected disk in left in a floppy drive, it can copy itself onto the boot sector of a computer's hard drive.

Program sector viruses attach themselves to other programs and infect any file that the infected computer runs when it launches a program.

Macro viruses change the template used to make documents or spreadsheets, infecting all documents or spreadsheets opened with the program.

E-Mail viruses can infect your computer through e-mail. These viruses are widespread and have a variety of results. For example, an infected e-mail file attachment can send itself to everyone in the computer's address book before bringing down the entire network.

McAfee.com's Virus Information Library has created a list of tips that assist Internet users in safely using the Internet and avoiding viruses (McAfee Web Site, 2002). The most basic tips include:

Beware of unexpected or unsolicited e-mail attachments. McAfee advises that Internet users delete or research unsolicited e-mail attachments from unknown senders before opening them. E-mails are the most common means of spreading viruses, as they are easy and effective.

Use an anti-virus program to regularly scan the hard drive and scan all incoming e-mail attachments and files.

Anti-virus program can be implemented to provide regular check-ups for viruses. These programs can run in the background of the computer to eliminate risks. Due to the fact that viruses are constantly evolving, it is important to use a program that provides regular updates.

Data files should be backed up on a regular basis.

Computer viruses can corrupt or destroy data on one or more files. Regular backups enable users to recover data more easily in the event that a virus damages all of the computer's files.

Purchase or obtain files or software only from trusted sources.

Many types of software pose various risks, including a higher risk of having one or more viruses. This tip is relevant to software or files that are downloaded over the Internet, that come as attachments to e-mail, or that are purchased at a store.

Avoid forwarding e-mail attachments unless they are first scanned for viruses.

Using an anti-virus program that scans all incoming e-mail attachments is the only way to safely to forward the attachment. Otherwise, attachments may carry viruses.

Avoiding Spam

Spammers are another unavoidable aspect of the Internet. Spam is mostly the junk e-mail found in email boxes around the world. Spam consists of marketing and sales offers, from discount life insurance to pornography.

Spammers have a variety of ways of getting email addresses (Help Desk: x2400, 2002). On web sites, they lure people into giving the e-mail addresses of their family and friends, as well as their own, by offering prizes, hosting contests and more. Any web page that requests other people's e-mail addresses is probably doing so for the purpose of sending unsolicited e-mail.

The number one rule in avoiding spam is to never respond to spam. When an advertiser gets a response, it alerts him or her that the responder is a prime target fro more spam, launching a vicious cycle. Advertisers who send spam in text format have no way of knowing if their messages are read, unless they get a response.

In addition, Internet users should read the fine print before ever giving out their own or someone else's e-mail address, and encourage their friends to do the same (Stratton, 2002). Even if an e-vite service is used to send invitations, it is used to get addresses for spam.

Spammers even guess probable e-mail addresses. There is nothing an Internet user can do about this except ensure that they are unable to confirm their guess. Spammers place images or links into their messages, and can confirm that the image was viewed. Internet users should avoid following these links.

On-line contests are a popular way to collect e-mail addresses for the purpose of sending spam (Welp, 2002). Many of these companies will sell your address, others will use it only internally but Internet users should be aware that if they ask for any personal information, they are more likely planning on using it.

Whenever e-mail addresses are used publicly, there is a risk that these addresses will be used for advertising. If an e-mail address is posted on a web page or posted on a newsgroup, a…

Sources used in this document:
Bibliography

1.Virus Resources

McAfee.com Virus Information Library

http://vil.mcafee.com

2. National Infrastructure Protection Center: www.nipc.gov
4. Help Desk: x2400: http://help.acusd.edu/Articles/spam.shtml
8. SurfWatch: http://www1.surfwatch.com/
10. Safe Kids Online: Child Safety on the Internet: http://www.safekids.com/index.html
11. Netaware: Safe Use of the Internet: http://www.netaware.org/
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet-Based Conferencing Information Technology Has
Words: 1230 Length: 4 Document Type: Term Paper

Web conferencing, though it is a very effective tool has its own drawback. The lack of human element and the absence of nonverbal feedback, particularly when dealing with clients constitute the negative side of electronic communication. The field of medicine is one that uses web conferencing to great success. Telemedicine success stories are a good indication of the useful application of web conferencing. Web Conferencing, for example allows physician assistants

Internet Voting What Is Your Initial Point-Of-View
Words: 1396 Length: 4 Document Type: Essay

Internet Voting What is your initial point-of-view? My initial point-of-view on the subject of a system where people could vote online in local, state, and national elections is very positive, with some reservations. For example, while it makes sense to encourage voting in any way possible -- the turnout for national elections has been inconsistent and sketchy in the past few years, sometimes less than 50% of eligible voters come out --

Internet Laws
Words: 3271 Length: 8 Document Type: Term Paper

Internet Ethics and the consumer's private existence in an unstable regulatory environment -- untapped economic waters in a wild, wild west of identity theft and chronic consumption When it comes to Internet ethics, even in the absence of legal requirements, businesses must themselves self-regulate when it comes to consumer privacy. If they do not, it is likely that the government will step in to do so, as the government has done

Internet Revolution and Medicine
Words: 608 Length: 2 Document Type: Case Study

Role of Informatics in Healthcare The author of this report has been asked to find an electronic service or mechanism that is involved with the prescription of medications. The source will be identified and explained in terms of how it can be of benefit in a clinical setting. The types of information that it will provide will be listed but there will also be some limitations that need to be pointed

History and Effects of the Internet on Instruction in K-12 Schools...
Words: 1726 Length: 5 Document Type: Research Paper

Internet and K-12 Schools The history and effects of internet The History and Effects of the Internet on Instruction in K-12 Schools The History and Effects of the Internet on Instruction in K-12 Schools History of the Internet in K-12 Schools Interactive Websites and Games as Computer-Aided Instruction The History and Effects of the Internet on Instruction in K-12 Schools Creating and sustaining a literate nation capable of democracy, self-government and continuous improvement of quality of life

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now