How to prevent the unethical use of computers
How to prevent the unethical use of computers by: Kevin Qi
Why should we be concerned?
We all know that the internet allows us to be connected. We share information thorugh the internet daily,
even hourly. Whether that's thorough e-mail, WiFi, or data, you can't deny that our society is very connected.
However, that does come with certain dangers, as not all people use their electronic devices with responsibility. Of course, there are ways to protect yourself from these dangers.
Some of those dangers (and their respective counters in brackets) include:
- Malware (Anti-virus)
- Phishing/Idenity Theft (Common sense, inspection, biometric data, two-step authorization)
What is malware, and how do you prevent malware from infecting your computer?
Malware is any kind of software that damages a computer or a network. It is similar to when humans get sick.
(1)
There are many types of malware (also analogous to the fact that there are many different types of diseases humans can be infected with),
ranging from applictions that spy on you (spyware), to ones that slow your computer down, and to ones that can lock you out of your own computer (ransomware).
Unlike a disease however, malware is artificially created by malicious humans to harm other people. If you wonder "Why would a person create malware?", then
the answer is the same to this question: "Why do people commit crimes?". The perpetrator either gains something like money, fame, or valuable personal
information, or they just do it for the sake of harming other people. (3)
Obviously, harming other people's electronic devices through malware is illegal and unethical.
A great way to prevent malware from infecting your computer is investing in an antivirus program. Antivirus helps scan your computer for malware and remove it. To help your antivirus
detect and eliminate harmful software, you should update your antivirus as often as possible, at least daily. Doing so helps prevent newly created malware
from infecting your PC because the antivirus program will be able to recognize and eliminate them. Some great antivirus software on the market are (02):
- Bitdefender Antivirus Plus
- Norton AntiVirus Plus
- Webroot SecureAnywhere Antivirus
- ESET NOD32 Antivirus
- F-Secure Antivirus SAFE
But how does antivirus actually work?
Antivirus scans your computer for viruses. There are 3 ways antivirus can detect malware on your computer. (4)
- Virus definitions
- On-access scanning
- Heuristics
Virus definitions help your antivirus software detect malware by letting it know if it matches with a known file that is known to be malicious. It's basically a giant database of known malware.
It gets these definitions every time you update your antivirus software, which is why it's crucial to update your antivirus as often as possible. On-access scanning refers
to the way most antivirus programs scan any file that is being downloaded or executed. It then sees if it's malware by checking it against the database of known
viruses. As you can see, downloading the latest virus definitions goes hand in hand with scanning.
Of course, antivirus programs also have a way to detect new viruses that are not in the database of known malware; it is called heuristics. In essence, antivirus programs
look for traits of malware in files/applications. For example, if a file starts replacing your files with itself, then your antivirus will know it is malware.
Unfortunately, this type of detection can lead to false postitves and scare you when there's no cause for alarm. A few real life examples are: when Microsoft
Security Essentials thought that Google Chrome was malicious, AVG identified Windows system files as viruses, and when "Sophos identified itself as a virus"
(Hoffman 14). To clarify, these are all different types of antivirus programs.
However, these types of false positives are rare so you can mostly believe your antivirus software when it says it has detected malware on your system (Hoffman 16).
I should point out that different antivirus programs have different detection rates and different false positive rates. The malware I have listed in the above list have
high detection rates and low false positive rates. After all, they are the "best" antivirus software for 2020.
Once your antivirus program detects a malicious file, it will delete it from your system, keeping your PC running smoothly.
What's phishing or identity theft?
Phishing refers to the act of fishing online for personal and sensitive information like your Social Security Number, PIN's, bank account passwords etc. (5)
Essentially, phishing is an online scam. Scammers online try and nab your sensitive information by posing as legitimate companies like your bank. After they obtain said sensitive information, they can now commit identity theft
which is when someone else "steals" your identity online. For example, after nabbing your credit card number and PIN, they can make purchases on your account, which you have to pay back.
How do you prevent this horrifying scenario from happening?
There are many ways to foil attempts to steal your identity. Some ways are:
- Common Sense
- Inspection
- Biometric Data
- Two-step authorization
Common Sense
Some things just sound too good to be true. For example, if you got an email out of the blue saying that you won a million dollars in a jackpot and all you have to do is type in
your credit card number and PIN to claim it, then it should be obvious to you that this is a blatant attempt to attain your personal information. Of course,
not all scams are this easy to spot.
Inspection
Scammers sometimes try and direct you to fake websites that resemble their real, legal counterparts. However, any information typed in the fake website is
visible to the scammer, like your username and passwards, PIN etc. Fortunately, there are ways you can tell if a site is fake. Firstly, if there are numerous
messages designed to make you panic and make rash decisions, then it is probably not real. To illustrate, a real bank will not tell you will be deported in 2 weeks
if you don't change your password (this is just an example). Secondly, look at the website itself. If it doesn't look professional and polished,
then that's a red flag. Unfortunately, scammers can make fake websites look very real. See image below for an example.
Thirdly, if the site in question has multiple spelling and grammatical mistakes, then that's also a red flag. Professional websites should not have these kinds of errors.
Biometric Data
(6)
Biometric data is any human charateristic that can be measured/recorded, e.g fingerprints, appearance of your retina, or even your gait. This can be used to
gain access to certain devices and networks. A great example is Finger ID which is available on IOS. This method makes sure that your "password" can't be stolen, unless they
steal your fingerprint which is much harder to steal than a password. A hypothetical example is: Imagine you're logging into your bank account. It asks for your
password. You then put your finger on a special spot on your device and it reads your fingerprint. You are then signed in to your account. As you can see, it is very
hard for anyone to steal your "password". Of course, if your fingers are involved in an unfortunate accident, then be prepared to be locked out of your account(s).
Two-factor authorization
(7)
This means that every time you log in, there will be another "password" you have to enter, in addition to whatever form of authentication you have.
That "password" can be your fingerprint, a response to a security question ("What was your mother's maiden name?" or "What was the name of your favourite teacher?" are examples of security questions).
This makes it much harder to gain access through phishing because they need two(or more) pieces of authentication to log in.
Questions
Question #1: What are three methods that antivirus can use to detect malware?
Question #2: Why is it so crucial that you update your antivirus software as often as possible?
Question #3: An arms race is when two entities try to increase their military power faster than the other. Describe how there is an arms race between antivirus
companies and creators of malware.
Click here for the answers.
Citations
- "What Is Malware?" Malwarebytes, https://www.malwarebytes.com/malware/.
- Williams, Mike. "The Best Antivirus Software for 2020." TechRadar, TechRadar, 8 Jan. 2020,
https://www.techradar.com/best/best-antivirus
- "Why People Create Computer Viruses?" Norton LifeLock, Norton Security, www.nortonsecurityonline.com/security-center/why-people-create-computer-viruses.html
- Hoffman, Chris. "How Antivirus Software Works." How-to Geek, How-To Geek, 26 Sept. 2016, www.howtogeek.com/125650/htg-explains-how-antivirus-software-works/
- "Phishing And Identity Theft." Phishing.org, Phishing.org, www.phishing.org/phishing-and-identity-theft
- Stroup, Jake. "Why Biometric Identification May Not Be All It's Cracked Up to Be." The Balance, The Balance, 11 Dec. 2019, www.thebalance.com/biometric-identification-and-identity-theft-1947595
- Rouse, Margaret. "What Is Two-Factor Authentication (2FA) and How Does It Work?" SearchSecurity, SearchSecurity, 31 Jan. 2020, searchsecurity.techtarget.com/definition/two-factor-authentication.