INTERNET BETWEEN & OPPORTUNITIES
اإلنترنت بين المخاطر والفرص
THIS PRODUCT WAS REALIZED UNDER THE PROJECT « EDUCAZIONE, CUTURA e SPORT PER TUTTI : OBIETTIVI SOSTENIBILI PER UN FUTURO DI PACE- CAMPI RIFUGIATI SAHRAWI » CUP n. E16G17000030002 SUPPORTED AND CO-FUNDED BY THE EMILIA-ROMAGNA REGION
THIS PRODUCT WAS REALIZED UNDER THE PROJECT « EDUCAZIONE, CUTURA e SPORT PER TUTTI : OBIETTIVI SOSTENIBILI PER UN FUTURO DI PACECAMPI RIFUGIATI SAHRAWI » CUP n. E16G17000030002 SUPPORTED AND CO-FUNDED BY THE EMILIAROMAGNA REGION
08 ....................................................................................................................................................................................................................................... 10 ...................................................................................................................................................................................................................... 12 .............................................................................................................................................................................................................................. 14 .......................................................................................................................................................... 16 ..................................................................................................................................................................................................................................... 18 ................................................................................................................................................................. 21 ...................................................................................................................................................... 22 ....................................................................................................................................................................................................................... 24 ...................................................................................................................................................................................................................................... 26 ............................................................................................................................................................................................................ 28 .................................................................................................................................................................................................................. 30 .......................................................................................................................................................................................................................................... 32 .......................................................................................................................................................................................................... 34 ................................................................................................................................................................................................................ 37 ....................................................................................................................................................................... 38 ......................................................................................................................................................... 40 .............................................................................................................................................. Firewall 42 ........................................................................................................................................ 44 ........................................................................................................................................................................... 46 ............................................................................................................................................................................................ 48 ............................................................................................................................................................................. 50 ....................................................................................................................................................................................................... 52 .......................................................................................................................................................................................................................... 54 ............................................................................................................................................................................................................... 56 ............................................................................................................................................................................................................ 58 .......................................................................................................................................................................................................... 60 ...................................................................................................................................................................................................................................... 62 ............................................................................................................................................................................................................. 64 ............................................................................................................................................................................................................... 67 ............................................................................................................................................................................................................ 68 ........................................................................................................................................................................................... 70 ................................................................................................................................................................. 72 .............................................................................................................................................................................. 4
74 ......................................................
Contents Introduction ...................................................................................................................................................................... 09 Malware .............................................................................................................................................................................. 11 Viruses ................................................................................................................................................................................. 13 The types of files that can be infected by a Virus ............................................................................................... 15 Damages .............................................................................................................................................................................. 17 How to know that your computer is infected with a virus ........................................................................... 19 Different types of Malwares and how They Work ............................................................................................. 21 Trojans................................................................................................................................................................................. 23 Worms ................................................................................................................................................................................. 25 Keylogger ............................................................................................................................................................................ 27 Spyware............................................................................................................................................................................... 29 Adware ................................................................................................................................................................................ 31 Electronic piracy.............................................................................................................................................................. 33 Electronic phishing ......................................................................................................................................................... 34 Important tips to protect your computer ............................................................................................................. 37 Install an appropriate anti-virus program............................................................................................................ 39 firewall software ............................................................................................................................................................. 41 Be careful when opening attachments in emails ............................................................................................... 43 How to deal with phishing attacks .......................................................................................................................... 45 Psychological and physical Dangers........................................................................................................................ 46 Harassment through the Internet ............................................................................................................................ 49 Online Exploitation ......................................................................................................................................................... 51 Steal of identity ................................................................................................................................................................ 53 Inappropriate contents ................................................................................................................................................. 55 Internet addiction ........................................................................................................................................................... 57 Behavioral Disorder ....................................................................................................................................................... 59 Isolation ............................................................................................................................................................................. 61 Privacy Violation ............................................................................................................................................................. 63 Fake News .......................................................................................................................................................................... 65 Solutions and protection Methods ........................................................................................................................... 67 Username and Password ............................................................................................................................................. 69 Select the appropriate time to use Internet ......................................................................................................... 71 Check the rumors online ............................................................................................................................................. 73 5 Some tips to secure most of social network accounts used by Sahrawis ................................................ 74
توعية حول مخاطر االنترنت لتالميذ الطور المتوسط بمخيمات الالجئين الصحراويين Sensitization Campaign about the dangers of the Internet for middlestage students in Sahrawi refugee camps
جوان9 توعية حول مخاطر االنترنت لألساتذة المتكونين بالمعهد البيداغوجي Sensitization campaign about the dangers of the Internet for the teachers of the Pedagogical Institute 9 June
6
توعية حول مخاطر االنترنت ألعضاء من المجتمع المدني Sensitization Campaign about the dangers of the Internet to members of civil society
توعية حول مخاطر االنترنت ألساتذة الطور االبتدائي Sensitization Campaign for primary stage teachers about the dangers of the Internet
7
.
.
.
. .
8
Introduction In our days, the internet have a very important place in our daily life, most of our activities are related to the network, and also our children’s activities. The fact that they are using the internet is not a bad thing in itself, but we have to careful about the way they are using it. Lot of factors are responsible of the bad use of the internet, like an unsafe machine or network, an inappropriate age, an excessive use and other factors that can turn this wonderful tool of knowledge and entertainment into a potential danger. This guide is designed to inform and show some tips to users about a safe use of the internet. By showing them the dangers and some advices that must be followed to avoid these dangers or at least to reduce them consecutively. This guide is the result of sensitizations campaign made about dangers of an unsafe use of the internet. They were designed in Sahrawi’s Refugees Camps in Tindouf, Algeria, by a young IT Sahrawi Named Mohamed fadel Taleb Abdellahi. This activity was realized and supported by CISP (Comitato internazionale per lo Sviluppo Dei Popoli). And financed by the region Emilia Romagna.
Benmerouane Abdelmalek Coordinator of Educational programs, CISP
9
.
10
Malware Malicious software or also sometimes called malware, is a software that is intentionally infiltrated into a computer system or smartphone for malicious purposes without the consent of the owner. It may be used to block computer operation, gather sensitive information, or access computer systems. When malware is installed, it might be very difficult to remove . Depending on the severity of the software, it can range from minor annoyance (some unwanted ad windows, while the user is working on the computer, whether connected or not connected to a computer network) to irreparable harm that requires for example hard drive formatting.
11
12
Viruses A Virus is a kind of external destructive software, deliberately designed to change the properties of system files.
Hidden Viruses
Multitask viruses
Phishing viruses
BootSector Viruses
Macro Viruses
Multiple Files Viruses
13
•
EXE , COM ELF
•
VOLUME BOOT RECORD MASTER BOOT
• •
•
HTML
•
• •
RAR ZIP MP3
14
Types of files that can be infected by A virus In general, the virus affects executables or nonscripted encrypted files such as the following: • Self-executing files such as EXE, .COM files within DOS, Microsoft Windows, or ELF systems in Linux. • Log files and data VOLUME BOOT RECORD in floppy and solid disks and record (0) in the MASTER BOOT hard drive. • General purpose files such as patches and scripts in Windows and shell files in Linux. • Office usage files in the Microsoft Windows operating system containing a macro such as Microsoft Word, Microsoft Excel and Microsoft Access. • Database and Outlook files have a major role in infection and spread the infection to others because they contain email addresses. • Files of type PDF and some HTML texts may contain malicious code. • Zip files such as ZIP and RAR • MP3 files
15
16
Damages
Viruses are known to cause destruction of data and programs. But the most serious damage can impact the personal life of the user, where the virus can violate the privacy of the user or use his device for bad purposes or stole his money, so caution is very important.
17
•
• • •
•
•
18
How to know that your computer is infected with a virus • Device slowness is one of the common symptoms of a virus infection or a signal that there is a spyware on the device. • The device sends unexpected messages or programs that open up alone. • Freezes your computer, hangs or does not respond, there are new icons you can not recognize. • The device closes and reopens itself alone and not because of system updates ,programs which don’t allow you to access to the Control Panel, Task Manager, Registry Editor or Command Prompt, strange or unexpected toolbars appear in the top of your web browser or you receive many messages from Internet browser. • The firewall or the antivirus program Stops working alone without reason .Side windows that contain advertising appears frequently, those are clear evidences that the device is infected with a virus. • Having problems installing new programs, hiding data or information from inside folders.
19
20
Different types of Malwares and how They Work
21
22
Trojans Trojan is a type of malicious software that hides itself as legitimate or useful program. The main purpose of a Trojan horse is to gain user trust from the front end, so that it gets permission to install. But, from the back end, it is designed to give unauthorized control of the computer to hackers. Damage: Trojans are known to cause a wide range of damage such as stealing passwords and login details, stealing money from electronic cards, recording keystrokes, modifying / deleting files and monitoring user activities ... etc.
23
Worms
24
Worms Worms are independent computer programs with malicious intent that spread from one computer to another. Unlike viruses, worms have the ability to work independently and thus do not stick to another program. Damage: Unlike viruses, worms do not cause damage to system files and other important programs. However, they are responsible for bandwidth consumption and thus lower network performance.
25
راصد لوحة المفاتيح
26
Keylogger A keylogger is a hidden program that is sent by mail or downloaded from an untrusted site or is included in free software. Damage: The spyware program transfers all what is written on the keyboard to remote parties usually to the owner of the spy or the sender of the program, and this is the most dangerous of these objects, it is similar to a Trojan horse in his way of working.
27
spyware
28
Spyware A spyware is a computer program that steals computers to spy on users or partially control the PC without the user's knowledge. While the name (spyware) refers to the secret programs that monitor the behavior of users, their functions far exceed mere monitoring. Damage: Spyware can collect various personal information, such as the way that we are surfing in the Internet. These programs can also control and perform multiple tasks, such as installing additional software, converting third-party advertising revenue, changing the web browser's home page, redirecting a web browser, directing malicious and booby-trapped websites that would cause installation of more viruses.
29
adware
30
Adware Adware is the name given to programs designed to show ads on a computer, redirect queries to ad sites, and collect user data. In other words, it is the software or tools that will be installed on your computer along with your web browser. Damage: Adware usually requires an Internet connection to work. Most adware are safe to use, and some can act as spyware programs and collect information about you from your hard drive, websites you visit, or your keystrokes. These spyware programs can send information over the Internet to another computer.
31
32
Electronic piracy
When we hear the word piracy, we can imagine the gangs of robbery, which is exactly what the pirates of electronic systems do, but with modern means and without endangering themselves. Electronic hacking or computerization is a process of computer that takes place over the Internet often because most computers in the world are connected via this network or even through internal networks connected to more than one computer. This process is carried out by one or several people who are proficient in computer programs and ways of managing them; they are high-level programmers who can, by means of software, help penetrate a computer and identify its contents, through which the other connected devices are hacked into the same network,
33
Electronic phishing
Electronic phishing is a form of electronic fraud on others to obtain some confidential information about victims, such as user name, password, credit card data, or indirectly access to money.
34
36
Important tips to protect your computer
نصائح مهمة لحماية جهاز الكمبيوتر
•
:
•
:
Kaspersky malware bytes ESET AVAST
38
• • • •
Install an appropriate antivirus program This program is one of the most important defenses to protect your PC from viruses, including worms and trojan horses. • Scope of protection: These programs vary in scope of their protection, including the local viruses on the device, and worms, and beyond them to protect the e-mail and Internet sites, greater are the options, better is the protection. • Effectiveness: It is the ability of the antivirus to capture the largest number of different types of viruses, and thus more effective, you can buy antivirus they are more effective of the free, some examples: • • • •
Kaspersky Malwarebytes ESET Avast
39
Firewall
.
40
firewall software
Firewall software, aim to control data traffic over the network, examining packets that pass through the network and choosing between allowing these packets to pass to a device.
The basic firewall function is to regulate some network packet flow between computer networks composed of multiple trust zones. An example of this type is the Internet - which is an unreliable area - as well as an internal network of higher confidence, and a medium-trust zone, located between the Internet and the trusted intranet.
41
42
Be careful when opening attachments in emails Be careful when opening attachments on your device, especially when attachments is sent by an unknown person.
Permanently delete files You must configure your computer, delete data correctly from your computer, and use data encryption programs.
Do not download files from unauthorized sites Be careful when downloading programs or files from unknown websites. In some cases, these files may contain viruses or spy files, and may sneak into your device without your knowledge.
43
.
44
How to deal with phishing attacks The user must check the sender's link carefully if it is a trusted link. Also, do not click on the link before dropping the mouse on it and verify that the link will send you to the site itself. If there is confusion and doubt, visit The site personally by using the search engines and follow the site regulations and instructions to go to the page that you are asked to go to, or access your bank account from the bank itself without using the link in the mail. If there is conclusive evidence that the mail is spam, please delete the message and forward it to any concerned party to verify the sender's credibility and content and record the event to be considered a phishing attempt. Delete the person who is sending this type of link from your account.
45
Psychological and physical Dangers
There is a consensus among many researchers that modern communication technology, especially the Internet, has opened a new era of communication and interaction between humans and the abundance of information and knowledge it provides to its users. But on the other side there are also legitimate concerns of the negative physical, psychological, social and cultural effects that may occur. Increasingly, Internet traffic and abuse have become a phenomenon that cannot be ignored by researchers. Therefore, there are today many studies and scientific conferences and specialized periodicals, to examine and study the psychological, social and physical effects of misuse of the Internet. 47
48
Harassment through the Internet
Acts of intentional hostility by a person or group through the use of various forms of repeated electronic communication for a time, against a victim who is unable to defend herself, male or female. In the past, harassment could have stopped only in schools and streets by close people. Now he is being done by people who have no connection with you even at home, which could cause more damage and deeper psychological problems.
49
:
50
Online Exploitation Online exploitation is the misuse of social media, such as chat rooms or other IT means, to manipulate individuals or illegally exploit their personal information for the purpose of personal gain. Children’s Exploitation: The child can be approached by a Criminal in the Internet to engage in immoral activity, for example, to ask the young person to send an image for example or to ask him to photograph himself. This may be done with the consent of the minor or against his will, but both cases are considered immoral and illegal because of the minor's age.
51
52
Steal of identity There are many ways to get someone's information including: Search for abandoned computers by restoring information to access previously saved personal information. Stealing information from personal computers using spyware.
53
54
Inappropriate contents
The Internet is filled with inappropriate content for children. The parental operating systems provide child protection, but they do not diminish dialogue with the child and build bridges of trust with him and help him to be careful. Windows and Mac OS offer many options for parents, allow them to set technical limitations for using the computer and the Internet and viewing content. For example: User account Parental protection
55
56
Internet addiction Online addiction is a new type of addiction, in which the addicted person uses the Internet on a daily and excessive basis. It interferes with his daily life and with the duties and functions he has to perform. This addiction controls the addict's life and make the internet more important than his Friends, and work, which negatively affects him and creates a kind of tension and anxiety.
57
58
Behavioral Disorder
Is a theoretical case of the pathological use of the Internet, which may lead to behavioral disorders. This phenomenon may be widespread in almost all societies in the world because of the availability of networked devices. This addiction is due to several reasons: emptiness, loneliness, the temptations that the internet provides to the individual and many more according to the individual's tendencies. Scientists have discovered that using the Internet at an early age can cause also: Linguistic disorder. Social disorder.
59
60
Isolation Recently, there has been talk about the dangerous role played by the computer in isolating individuals socially and breaking up relations between individuals in society. Most people spend a lot of time dealing with computers and the Internet, which leads to isolation from others during the period of use, it lead to some Social disintegration.
61
62
Privacy Violation
Some of the risks to Internet privacy are caused by server logs that retain the IP numbers of users and cookies who have contacted this server; which Web sites normally maintain to facilitate browsing and saving user preferences and information, which in turn may pose a threat to the privacy of the user; / Or tapping user data or contacts Many social networking sites provide users with tools to measure the privacy level to protect their personal data. Facebook, for example, provides all its users with a page of privacy settings. These settings allow users to prevent specific users from seeing their profile or the profiles of their friends
63
64
Fake News With the widespread use of social media and individual chat programs such as Facebook, it is natural for people to use them as a means of sharing information and news rather than simply communicating directly. But one of the side effects of such a development is the ease of using these means to spread rumors, false information and fake news
65
66
Solutions and protection Methods
67
• . •
•
A–Z a–z 0123456789
Zeus25 @lexkid.357951
• • •
68
Username and Password
In order to protect data, a long and complex password of letters and numbers should be created and kept in a safe place, making it impossible for hackers to steal it. • ID: To protect your identity on the Internet, it is important to choose your username by avoiding placing your name or nickname and choosing an alias that is not male or female. • Password: The password is the key to enter a special account. The more complex it is, the more difficult it will be to access your account. For this you must choose your password using: - Capital letters A - Z - Small letters a – z - Special symbols (@ # *.! .......) - Numbers 0123456789 Never put your name or date of birth as a password and you should know that the longer the password is, the more difficult it will be to Hack. Example : • Username: Zeus25 • Password: @lexkid.357951
69
70
Select the appropriate time to use Internet If your child spends ten hours a day on the Internet, whatever you do and whatever he wants to get to useful sites, he will be bored a lot of times and wants to do some bad experiences and you will not be able to control child protection properly or try to get to know some things And in any case will increase the chance of exploitation of others, so it is best to make a specific time for your child to use the Internet in proportion to the child's study and activities, and in general this is better for the health of the child and related to technology in particular in the future .
71
72
Check the rumors online Researchers from several universities, including the British University of Sheffield, are working on building a system capable of automatically checking rumors spreading to social networking sites. The European Union funds this research project. The system classifies the sources of rumors to verify their validity, as well as the background of the source and history of the rumor, where the use of newly established accounts on social networks to spread rumors and incorrect news
73
Some tips to secure most of social network accounts used by Sahrawis
74
Launch a browser window and type www.youtube.com in the web address bar.
www.youtube.com
76
Click the blue Sign In button in the top right corner of the screen and follow the prompts to sign in. Once YouTube loads, scroll down to the bottom of the page and click the Safety button.
YouTube
77
Click On and then click the Save button. To lock these changes so no one can change them without your password, click “Lock safety mode on this browser.” You’ll be prompted to enter your password. Once that information is entered, the feature is locked and can only be unlocked by entering your password again.
78
On Android Smartphone Android Launch the Android YouTube app and tap the YouTube icon in the top left corner of the screen and tap Sign in. Then follow the prompts to enter your YouTube account information.
Android YouTube YouTube
YouTube.
79
Tap the three vertical dots in the top right corner of the screen and tap Settings.
80
Tap General
81
Tap Safe Search filtering and tap “Strict.”
82
In general, the application is sure, but there is a choice called Whatsapp Web, which has the role of transferring the hand from phone to computer. This choice is not dangerous in itself but if someone takes your phone and makes a choice on his computer he can see what is written on the phone.
84
And What We Have to do about it? Go to whatsapp web in your smartphone and check for if he is connected or not. If not it’s ok if he is connected and you didn’t connected it yourself you can disconnect it from your smartphone.
whatsapp web
85
Important tips about whatsapp
whatsapp There is two important information about whatsapp that we have to know: - Always download the official application. - You can erase the Pictures You send if you want it.
-
86
No one wants to deal with the stress and potential damages of having their Facebook account hacked. To decrease the likelihood of hacks, as well as the time it takes account holders to find suspicious activity that could be a precursor, Facebook has just launched a handy check-list that all users should take the time to walk through.
88
Because Facebook just launched security check-up, you'll see it at the top of your profile. You can also find it anytime by clicking here.
89
Enhancing your security is super easy there are only three steps! so all users should take the time to walk through the list
90
First thing you can do is log-out of all the browsers and apps (including those that use your account information as a "social login") that you haven't used recently
91
Next, set up "login alerts" so that you'll know whenever someone logs into your account from a new device or browser. You can choose to receive email or text notifications
92
Take the time to carefully read all the bestpractices for a good password. Take a moment to think of something better and make the change
93
And you're all set! In less than ten minutes, your Facebook account is successfully more secure
94
95
"This publication is the final result of an action aimed at young people, students, Saharawi teachers planned in a project to strengthen education in the Saharawi camps. The intervention strategy is shared with the Ministry of Education and aims to strengthen the skills of staff involved in education. Among the actions undertaken and conducted continuously since 2007, workshops
on the use of the internet have been carried out. As in all parts of the world, internet is an important resource, especially for isolated areas such as the desert where the Saharawi refugee population lives. This instrument is well known for the opportunities it offers and for the dangers it hides ... “ Giulia Olmi Head of CISP Projects Algeria
96
• THIS PRODUCT WAS REALIZED UNDER THE PROJECT « EDUCAZIONE, CUTURA e SPORT PER TUTTI : OBIETTIVI SOSTENIBILI PER UN FUTURO DI PACECAMPI RIFUGIATI SAHRAWI » • CUP n. E16G17000030002 SUPPORTED AND CO-FUNDED BY THE EMILIA-ROMAGNA REGION