Wednesday, 7 February 2018

RULES OF NETIQUETTE

Netiquette is a combination of the words network and etiquette, and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment.
Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’ which itself is a contraction of the words internet and citizen and refers to both a person who uses the internet to participate in society, and an individual who has accepted the responsibility of using the internet in productive and socially responsible ways.
Underlying this overall concept of socially responsible internet use are a few core pillars, though the details underneath each pillar are still subject to debate.

At a high level using netiquette, applying online ethics, or being a good netizen means:
  • Recognizing that the internet is not some new world in which anything goes, but rather a new dimension or extension of our existing society.
  • Applying the same standards and values online as we are accustomed to applying in the rest of our lives. In simple terms this means that the values society has in place against such things as hate speech and bigotry, copyright violations and other forms of theft, child exploitation and child pornography, remain intact. As do the values around courtesy, kindness, openness, and treating others with the same respect we wish to receive.
  • Accepting that the laws which are currently in place to protect the rights and dignity of citizens apply online, and that where needed, laws are updated to reflect these rights in the extended environment. Theft online is still theft, stalking, bullying, harassing, tormenting online is still abusive, and so on.
  • Acknowledging that cultural differences remain, even when national boundaries no longer apply. This requires finding a way to accept that the social values and norms of some netizens will not be the social values and norms of all netizens.
  • For companies, being a good netizen, applying online ethics, or using netiquette also includes
    1. Respecting the rights to privacy assumed and possessed by citizens in their offline interactions.
    2. Maintaining transparency in their policies and actions so that consumers can easily and quickly understand how that company is using their information, protecting them from harm, and giving users a clear means of ownership and self-determination as to what is, and isn’t shared about them.
Most internet users automatically apply the same responsible respectful behavior online as they do in every other environment and by nature apply netiquette an online ethics, and are good netizens. The minority that fail to apply societal values in some or any environment - including the internet - are quickly identified as exceptions to be dealt with on a social, or criminal level.



RULES OF BEHAVIOR ON THE INTERNET
  • Identify yourself:
    • Begin messages with a salutation and end them with your name.
    • Use a signature (a footer with your identifying information) at the end of a message
  • Include a subject line. Give a descriptive phrase in the subject line of the message header that tells the topic of the message (not just "Hi, there!").
  • Avoid sarcasm. People who don't know you may misinterpret its meaning.
  • Respect others' privacy. Do not quote or forward personal email without the original author's permission.
  • Acknowledge and return messages promptly.
  • Copy with caution. Don't copy everyone you know on each message.
  • No spam (a.k.a. junk mail). Don't contribute to worthless information on the Internet by sending or responding to mass postings of chain letters, rumors, etc.
  • Be concise. Keep messages concise—about one screen, as a rule of thumb.
  • Use appropriate language:
    • Avoid coarse, rough, or rude language.
    • Observe good grammar and spelling.
  • Use appropriate emoticons (emotion icons) to help convey meaning. Use "smiley's" or punctuation such as :-) to convey emotions. See website list of emoticons at http://netlingo.com/smiley.cfm and http://www.robelle.com/smugbook/smiley.html.
  • Use appropriate intensifiers to help convey meaning.
    • Avoid "flaming" (online "screaming") or sentences typed in all caps.
    • Use asterisks surrounding words to indicate italics used for emphasis (*at last*).
    • Use words in brackets, such as (grin), to show a state of mind.
    • Use common acronyms (e.g., LOL for "laugh out loud").
 1. Keep your software/apps updated and delete the ones you don’t use.

Developers and cybercriminals are almost always caught in a cat and mouse game, where cybercriminals search for exploits and developers rush to patch them before too much damage is done.

Most of the times, vulnerabilities are quickly updated, but the real issue is that most users will still use an outdated version and will be vulnerable to the exploit.

Keeping your software up-to-date will go a long way into keeping you safe. But an equally important step is to remove software and apps you no longer use.

Many of these programs still communicate in the bAckground with various servers, and in case of a breach, this data might fall into the wrong hands.

2. Be careful when dealing with emails from unknown sources

Have you received an email from an unknown source? Do you frequently receive -mails from people you don’t know?

Just as in real life, an important rule to stay safe on the internet is to be suspicious of strangers. First, don’t trust emails from people you never met, especially those that ask you to click a link, open an attachment or send a file to the sender.

It’s pretty easy to spot phishing emails. What gives most of the away is the urgency with which they ask you to do something, either because your account may be compromised or your online purchase may have encountered some issue  you need to sort.

To fool the potential victims, the latest trend in e-crime is to deploy spear phishing attacks, where emails appear to come from well-known individuals or banking authority.

But in order for a spear phishing attack to be successful, it needs to appear as genuine and believable. So they launch an elaborate identity theft operation to target and steal your sensitive information.
So when you do get a phishing email, ignore it completely and:
  • ·         don’t reply to the e-mail
  • ·         don’t click the (malicious) attachment
  • ·         don’t click the dangerous links in the e-mail that could download malware on the system


 3. Don’t click that link or online ad

You found a pretty cool link on the Internet and it keeps tempting you to click it. But the source of the link (website or email) seems fishy. You ask yourself: What can the bad guys do to me if I click this link?
The answer is simple: a lot of things could go wrong.

Just by clicking a link in an email or a pop-up window, you could turn your PC into a botnet slave, allow cybercriminals to inject malware into your device, or expose your personal information.

You may think that you are safe from all these dangers because you have a good antivirus product, but nowadays traditional antivirus protection isn’t enough anymore and you need additional weapons in the fight against online dangers.

 4. Just because it’s free, it doesn’t mean it’s safe

As a rule of thumb, paid software is almost always secure and safe. It wouldn’t make sense for a cybercriminal to limit the number of victims by imposing a paywall.

Double check free software using Google, especially if it’s not a well-known one, such as WinRAR.
This filtering process can expose bad reviews, or reveal that the free software is actually a vehicle for malware.

While the free software itself might be safe and legit, the website itself may try to compromise your security through drive-by downloads. These are secret downloads carried in the background, that target software vulnerabilities and system exploits.

Make sure you use a trusted, free program that automatically updates your vulnerable software applications to close security holes in your system.

5. Do not reveal sensitive information online

Social media is the first place criminals check to gather information on you. They will use any piece of information they can find, such as your name, birthdate, address, city, your spouse/partners name, what sort of pet you have, name of the pet. Literally, anything that you can think of.

Improving your social media security settings is a good first step in preventing an identity theft or doxxing.

So, be a bit skeptical about people you meet online and about their intentions. Many people exaggerate their Facebook lives, and depending on how you use it, social media may come back to haunt you.

6. Keep your account information for yourself

Our credentials for online accounts, user names and passwords, hold the keys to a lot of important information, and for that reason they are the most sought after targets by cybercriminals.
Using the same password for more than one site is a risky move, since if a malicious hacker breaks into just one account, he can then take over the others.

One of the better online safety tips is to use a different password for every website you register. The downside however is the difficulty of memorizing them. One workaround is to use password managers, these will remember the login details of every site you use and can even generate some strong password for you use.

The one we recommend the most, both for its features and ease of use, is LastPass. You will only need to remember the master password for LastPass itself.

7. Report illegal activities or offending content

If you notice offending language attacks, like cyber-bullying, hate speech or any form of harassment, do not hesitate to report it.

Using the “Flag as offensive” or “Flag as spam” buttons is proper internet etiquette and should be sufficient to fight back against minor online threats, but other types of content, such child pornography or arms trafficking should be immediately reported to the police.

Reporting cyberbullying is takes on a different importance when children are the targets.

A report on cyber bullying on 2014 gives the following troublesome conclusions:
  • ·         25% of teenagers report that they have experienced repeated bullying
  • ·         52% off young people report being cyber bullied
  • ·         95% of teens who witnessed bullying on social media report they have ignored the behavior
  • ·         cyber bullying affects everyone
  • ·         the most common types of cyber bullying tactics reported are mean, hurtful comments.

So, if you see it, report it. The consequences for cyberbullying can be quite severe, depending on the victim. In rare cases, cyberbullying has been known to push peole into suicide. That’s why it’s so important to report it when children are involved.

8. What you post online stays online forever

We post photos, remarks, location updates and similar content, which we think is fine because we use an anonymous username on a small niche forum.

But niche forums are also indexed by search results, and if you reuse the username, other people can start to connect the dots.

This is called doxxing, where people hunt for information about an internet user until they manage to figure out who they are in real life.

And you may think that your posts and comments are usually ignored or don’t receive much attention, but they still remain there and you never know when they come back at you. Not to mention the fact that search engines save and classify your content on so many online servers.

But if you live in the EU, you benefit from a so called “right to be forgotten”, which will prevent search engines from showing things about your past. Here’s how you can benefit from this right.

To keep it short, when it comes to posting personal content on forums and similar places, follow these guidelines:
  • ·         is this information too personal?
  • ·         delete/edit past posts which reveal too much about you
  • ·         could your content affect your personal or professional life in the future?


9.  Use antivirus protection before you go online

Don’t go online until you have the best antivirus protection that money can buy.

You may think that avoiding adult websites and that sort of thing will keep you safe, but did you know that hackers now hide malicious code even in legitimate websites?

And sometimes not even that is enough. Some ransomware programs are so sophisticated, it is technologically impossible to decrypt them, no matter how much you try.

And in this case, you really need the best tools out there. Heck, some of them are even free.

Though antivirus is still important for our online safety, as Brian Krebs said it:
“Anti-virus is a poor substitute for common sense.”

      10.  Create back-up copies for your important stuff

Though you may have all the security protection in the world, disaster may still hit your system and your valuable files.

It may be a system crash, a hard disk failure, a ransomware attack that encrypts your entire operating system or it may be a human mistake.

There are so many reasons something can go wrong for you and your sensitive information, even if you followed all the netiquette rules in the book.

To emphasize the importance of this point, we can tell you that a while ago we interviewed a series of security experts in the IT industry, and one recurring theme was the importance of backing up your information.

No comments:

Post a Comment