Page 127 - digitalliteracy
P. 127

6.2  Remaining Safe and Secure Online




 Also, be especially cautious of financial loss or theft when purchasing game elements using   Maddie knew about the possibility of
 real cash. The cost of buying “extras” with online games can add up quickly and substantially.   some of the threats we discuss here. So
 Last, but certainly not least, be careful of developing an online gaming addiction. One of the   she purchased security software when
 biggest dangers of these games is that you can waste many hours playing and actually become   she bought her computer. However, the
 addicted to them and avoid other important aspects of your life (Get Safe Online, 2015).  software recommended that she regu-
                       larly install updates and scan her com-
                       puter to ensure that she was protected
 Pornographic Websites  from new, recently discovered threats.
                       These tasks were time-consuming, so
 Pornography  can  be  defined as visual  or printed materials that  contain  explicit  displays
                       Maddie put them off. The night before
 or descriptions of sexual organs or activities intended to stimulate erotic feelings or sexual
                       a paper was due in one of her online
 excitement. Because the Internet is international, no one set of laws applies everywhere to
                       classes, she  downloaded information
 the publication, distribution, purchase, or possession of Internet pornography. In the United
                       from the web that  contained a  nasty
 States, the public, lawmakers, and the courts have battled for decades over clearly defining
                       computer virus. The virus infected
 what is pornographic and whether pornography is protected by the First Amendment to the
                       her computer system, and her word
 U.S. Constitution as free speech or is obscene and not protected.
                       processing  software would  not  work.
                       Luckily,  Maddie had made a  backup
 Child pornography, however, is treated severely under both federal and state laws and is not
                       version of her paper a few days before,
 protected under First Amendment rights. Federal laws consider child pornography to be a
                       and a  friend  let  her borrow  a  com-                             J.r. Bale/Hemera/Thinkstock
 form of child sexual exploitation and define it as any visual depiction of sexually explicit con-
                       puter for the evening. However, Mad-   Installing security software isn’t enough to protect
 duct involving a minor (someone younger than 18 years old). Federal law prohibits any per-
                       die pulled  an  all-nighter to re-create    your computer. You have to take the time to update
 son from producing, distributing, importing, receiving, or possessing any image of child por-
                       3 days’ worth  of  work she  had done   the software and scan it regularly.
 nography. Violation of these laws is punishable by fines and a prison sentence that can range
                       on the paper so she could submit it on
 from a minimum of 5 years to life imprisonment (U.S. Department of Justice, 2015).
                       time. Maddie learned the hard way about the importance of performing regular maintenance
                       on her computer to reduce her vulnerability to threats.
 To control access to pornographic material on your computer, you can purchase software
 applications called antipornography filters. Examples include NetDogSoft’s Anti-Porn Filter,
                       Luckily, as fast as clever computer hackers and other malicious people devise ways to threaten
 which attempts to block sites of this nature from appearing on your computer. Some safety
                       your online safety and security, equally clever people find ways to combat these threats. Let’s
 and security software also allow you to set parental controls on your computers and phone
                       examine the types of electronic threats that exist and ways you can prevent them or mini-
 to control access to certain material, and computer operating systems have privacy settings
                       mize your risk of exposure to them. In this section we refer primarily to computers, but it is
 and parental control features that can help. However, it is important to realize that no filter is
                       important to remember that you are vulnerable to the same threats we discuss here when
 100% effective in blocking pornography.
                       you download applications, or apps, for any of your mobile electronic devices.
 Computer Threats      Malware/Spyware
 As a public space, the web can be a very useful way to find information, shop, find enter-  Malware, also called spyware, is a secret program that runs in the background when you
 tainment, and stay connected with family and friends. However, it can also be a minefield   are on your computer. It gathers information about you and then shares it with others with-
 with hidden dangers you must be aware of and protect yourself against. In addition to pri-  out your permission. Tracking cookies, which we discussed earlier in this module, might be
 vacy issues and the dangers of identity theft, other safety and security threats are common   considered a type of spyware because they monitor your activity. The information spyware
 in today’s electronic world. In this section, we discuss other types of threats that exist when   collects about you might be used to track your movements on the web and then used later to
 you use digital devices and actions you can take to protect yourself and your data to minimize   decide what type of pop-up ads to send to you. However, it can go beyond simple monitoring
 your chances of becoming a victim.  and be dangerous to your personal and computer safety and security. Some spyware or mal-
                       ware can change your computer settings, interfere with your ability to control your computer,
 Some of the hazards you encounter might simply result in inconvenience or temporarily crash   or install new software on your computer that you have not authorized. Spyware can also
 your computer or mobile device. Others, however, can permanently damage your computing   redirect your browser’s home page and adjust the settings so it is difficult for you to change it
 devices or seriously harm you,  your family,  your reputation,  or your finances. The best   back. It can also cause computer crashes.
 defenses are knowledge and preventive action.






                                                                 111
                        © 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.



       sol82612_06_m06_097-120.indd   111                                                                            6/29/16   5:14 PM
   122   123   124   125   126   127   128   129   130   131   132