Page 127 - digitalliteracy
P. 127
6.2 Remaining Safe and Secure Online
Also, be especially cautious of financial loss or theft when purchasing game elements using Maddie knew about the possibility of
real cash. The cost of buying “extras” with online games can add up quickly and substantially. some of the threats we discuss here. So
Last, but certainly not least, be careful of developing an online gaming addiction. One of the she purchased security software when
biggest dangers of these games is that you can waste many hours playing and actually become she bought her computer. However, the
addicted to them and avoid other important aspects of your life (Get Safe Online, 2015). software recommended that she regu-
larly install updates and scan her com-
puter to ensure that she was protected
Pornographic Websites from new, recently discovered threats.
These tasks were time-consuming, so
Pornography can be defined as visual or printed materials that contain explicit displays
Maddie put them off. The night before
or descriptions of sexual organs or activities intended to stimulate erotic feelings or sexual
a paper was due in one of her online
excitement. Because the Internet is international, no one set of laws applies everywhere to
classes, she downloaded information
the publication, distribution, purchase, or possession of Internet pornography. In the United
from the web that contained a nasty
States, the public, lawmakers, and the courts have battled for decades over clearly defining
computer virus. The virus infected
what is pornographic and whether pornography is protected by the First Amendment to the
her computer system, and her word
U.S. Constitution as free speech or is obscene and not protected.
processing software would not work.
Luckily, Maddie had made a backup
Child pornography, however, is treated severely under both federal and state laws and is not
version of her paper a few days before,
protected under First Amendment rights. Federal laws consider child pornography to be a
and a friend let her borrow a com- J.r. Bale/Hemera/Thinkstock
form of child sexual exploitation and define it as any visual depiction of sexually explicit con-
puter for the evening. However, Mad- Installing security software isn’t enough to protect
duct involving a minor (someone younger than 18 years old). Federal law prohibits any per-
die pulled an all-nighter to re-create your computer. You have to take the time to update
son from producing, distributing, importing, receiving, or possessing any image of child por-
3 days’ worth of work she had done the software and scan it regularly.
nography. Violation of these laws is punishable by fines and a prison sentence that can range
on the paper so she could submit it on
from a minimum of 5 years to life imprisonment (U.S. Department of Justice, 2015).
time. Maddie learned the hard way about the importance of performing regular maintenance
on her computer to reduce her vulnerability to threats.
To control access to pornographic material on your computer, you can purchase software
applications called antipornography filters. Examples include NetDogSoft’s Anti-Porn Filter,
Luckily, as fast as clever computer hackers and other malicious people devise ways to threaten
which attempts to block sites of this nature from appearing on your computer. Some safety
your online safety and security, equally clever people find ways to combat these threats. Let’s
and security software also allow you to set parental controls on your computers and phone
examine the types of electronic threats that exist and ways you can prevent them or mini-
to control access to certain material, and computer operating systems have privacy settings
mize your risk of exposure to them. In this section we refer primarily to computers, but it is
and parental control features that can help. However, it is important to realize that no filter is
important to remember that you are vulnerable to the same threats we discuss here when
100% effective in blocking pornography.
you download applications, or apps, for any of your mobile electronic devices.
Computer Threats Malware/Spyware
As a public space, the web can be a very useful way to find information, shop, find enter- Malware, also called spyware, is a secret program that runs in the background when you
tainment, and stay connected with family and friends. However, it can also be a minefield are on your computer. It gathers information about you and then shares it with others with-
with hidden dangers you must be aware of and protect yourself against. In addition to pri- out your permission. Tracking cookies, which we discussed earlier in this module, might be
vacy issues and the dangers of identity theft, other safety and security threats are common considered a type of spyware because they monitor your activity. The information spyware
in today’s electronic world. In this section, we discuss other types of threats that exist when collects about you might be used to track your movements on the web and then used later to
you use digital devices and actions you can take to protect yourself and your data to minimize decide what type of pop-up ads to send to you. However, it can go beyond simple monitoring
your chances of becoming a victim. and be dangerous to your personal and computer safety and security. Some spyware or mal-
ware can change your computer settings, interfere with your ability to control your computer,
Some of the hazards you encounter might simply result in inconvenience or temporarily crash or install new software on your computer that you have not authorized. Spyware can also
your computer or mobile device. Others, however, can permanently damage your computing redirect your browser’s home page and adjust the settings so it is difficult for you to change it
devices or seriously harm you, your family, your reputation, or your finances. The best back. It can also cause computer crashes.
defenses are knowledge and preventive action.
111
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
sol82612_06_m06_097-120.indd 111 6/29/16 5:14 PM

