The document discusses professional and ethical responsibilities of IT professionals regarding computer-related mistakes, waste, and crimes. It covers types of computer waste and mistakes like discarding working systems, personal use of work technology, and program errors. Computer crimes are increasing due to technology advances and include viruses, stolen credit cards, and hacked websites. Computers can be used to commit identity theft and fraud. The document provides ways to prevent issues like policies and procedures, firewalls, passwords, and updates.
Separation of Lanthanides/ Lanthanides and Actinides
Professional and Ethical Responsibilities as IT Professionals to be aware of the Computer-Related Mistakes and Computer Crime
1. INFO-SHEET 1:
PROFESSIONAL AND ETHICAL
RESPONSIBILITIES AS IT
PROFESSIONALS TO BE
AWARE OF THE COMPUTER-
RELATED MISTAKES AND
COMPUTER CRIME
IS PQS 213 - PROFESSIONAL ETHICS, QUALITY
CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
2. IS-PQS 213.1.1 Computer Waste and Mistakes
IS-PQS 213.1.2 Preventing Computer-related
Waste and Mistakes
IS-PQS 213.1.3 Computer Crime
IS-PQS 213.1.4 Computer as a tool to commit a crime
IS-PQS 213.1.5 Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS, QUALITY
CONSCIOUSNESS AND SOCIAL ISSUES
IN COMPUTING
3. Computer Waste
Inappropriate use of
computer technology and
resources
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
4. Computer Waste
1. Discarding old software and even complete
computer systems when they still have value
2. Building and maintaining complex systems that
are never used to their fullest extent
3. Using corporate time and technology for
personal use
4. Spam
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
5. Computer-Related Mistake
Errors, failures, and other
computer problems that make
computer output incorrect or
not useful.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
6. Computer-Related Mistake
a. Failure by users to follow
proper procedures
b. Unclear expectations and a
lack of feedback
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
7. Computer-Related Mistake
c. Program development that
contains errors
d. Incorrect data entry by the
data-entry clerk
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
8. Computer-Related Mistake
Data-entry or data-capture errors
Errors in computer programs
TYPES:
Errors in handling files
Mishandling of computer
output
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
9. MCT: IS-PQS 213.1.2 Preventing Computer-related
Waste and Mistakes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
10. Preventing Computer-related Waste and Mistakes
1. Policies and procedures
must be established to
avoid computer waste and
mistakes.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
11. Preventing Computer-related Waste and Mistakes
2. Preventive policies and
procedures typically
address the issues listed
above
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
13. Computer Crime
rapidly increasing
throughout the world due to
the advancement in the IT
industry
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
14. Computer Crime
relatively risk-free,
compared to crimes such as
bank robbery
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
15. Computer Crime
Viruses, Stealing Credit Card
Numbers from online
systems, and crashing
Websites
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
16. Computer Crime
Computers can be used to
access valuable information
or steal funds.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
17. Computer Crime
criminals gain critical
computer passwords or
access codes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Social Engineering
18. How to prevent Computer Crime
firewall can help secure an
organization’s information
system from unauthorized
external access.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
19. Privacy
the right to be out of public
view or to be left alone
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
20. Right to Privacy
Privacy Act 1988
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Republic Act 10173 –
Data Privacy Act of 2012
21. Categorizing Computer-related Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
A computer can also be the target
of criminal activity, as seen when
hackers obtain unauthorized
access to the Department of
Defense sites.
22. Categorizing Computer-related Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The perpetrator of a computer
crime could easily be a juvenile
hacker, sophisticated business
person, or terrorist.
23. MCT: IS-PQS 213.1.4 Computer as
a tool to commit a crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
24. Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
1. Improperly accessing a computer, system, or
network;
2. Modifying, damaging, using, disclosing, copying,
or taking programs or data;
3. Introducing a virus or other contaminant into a
computer system;
4. Using a computer in a scheme to defraud;
25. Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
5. Interfering with someone else's
computer access or use;
6. Using encryption in aid of a crime;
7. Falsifying email source information; and
8. Stealing an information service from a
provider.
26. Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Social Network, Cybercrime, and Internet
Sex Crimes
Cyberbullying
Child Pornography and Preying
on Minors
27. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
28. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
2.Protect Your Personal Information
1.Keep the Computer System Up-To-
Date
29. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
4. Secure Configuration of the System
3. Install or Update Your Antivirus
Software
30. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
6. Keep Your Firewall Turned On
5. Choose a Strong Password and
Protect It
31. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
8. Review Financial Statements Regularly
7. Read the Fine Print On Website
Privacy Policies
32. MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
10. Turn Off Your Computer
9. If It Seems Too Good to Be True,
It Is!
33. DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Editor's Notes
NOTE: Want a different image on this slide? Select the picture and delete it. Now click the Pictures icon in the placeholder to insert your own image.
Computer waste refers to the inappropriate use of computer technology and services in an organization or community. Many employees inside the organization have no idea what is computer waste.
Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful
Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful
Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful.
Computer mistakes include errors, failures, and related problems that cause computer output to be incorrect or not useful. Most of the computer-related mistakes are caused by human error. There are few common mistakes that employees or normal households will involve such as clicking on advertisements.
Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful
PREVENTING COMPUTER-RELATED WASTE AND MISTAKES Types of computer-related mistakes include the following: Data-entry or data-capture errors Errors in computer programs Errors in handling files, including formatting a disk by mistake, copying an old file over a newer one, and deleting a file by mistake Mishandling of computer output Inadequate planning for and control of equipment malfunctions Inadequate planning for and control of environmental difficulties (e.g., electrical and humidity problems) Installing computing capacity inadequate for the level of activity Failure to provide access to the most current information by not adding new Web links and not deleting old links Implementing Policies and Procedures: Some useful policies to minimize waste and mistakes include the following: Changes to critical tables, HTML, and URLs should be tightly controlled, with all changes documented and authorized by responsible owners. A user manual should be available covering operating procedures and documenting the management and control of the application. Each system report should indicate its general content in its title and specify the time period covered. The system should have controls to prevent invalid and unreasonable data entry. Controls should exist to ensure that data input, HTML, and URLs are valid, applicable, and posted in the right time frame. Users should implement proper procedures to ensure correct input data. Reviewing Policies and Procedures During review, people should ask the following questions: Do current policies cover existing practices adequately? Were any problems or opportunities uncovered during monitoring?
How to avoid and prevent computer waste and mistakes?
1. Policies and procedures must be established to avoid computer waste and mistakes. Although often unintentional, computer waste and a mistake can be costly. Organizational policies and procedures can help to avoid losses. Many employees tend to make unintentional computer waste and mistakes that caused the organization to pay a high amount to settle and repair the waste and mistake.
2. Preventive policies and procedures typically address the issues listed above. Procedures relating to the acquisition and use of computers can avoid both waste and mistakes. For example, procedures could ensure that computers no longer needed in one part of the organization would be used in another part of the organization, rather than discarded the computers.
Computer crime is a serious and rapidly growing area of concern requiring management attention (Chiu, 2000). Intentional computer crime is rapidly increasing throughout the world due to the advancement in the IT industry especially the IT Finance industry. Many hackers intentionally create a crime to steal information from the IT Finance industry and sell to others to make a high amount of profits. Intentional computer crime requires the attention of management and security specialists to prevent the loss of important data and privacy of the clients.
Computer crime is relatively risk-free, compared to crimes such as bank robbery which might involve the murder of humans. And yet it can often escape detection. Furthermore, due to computer processing speed and data communications, large amounts of money can be quickly stolen or diverted with the right know-how and equipment. Computer Crime in the recent world involves a wide range of categories, such as introducing Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites. Computer crimes have caused more than 10 Billion USD lost in European countries. Even with policies in place, computer crimes can occur in an organization.
Computer Crime in the recent world involves a wide range of categories, such as introducing Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites. Computer crimes have caused more than 10 Billion USD lost in European countries. Even with policies in place, computer crimes can occur in an organization.
How is the computer being a Tool to Commit Crime? Computers can be used to access valuable information or steal funds
Individuals need to know how to gain access to the target computer system and know what to do to the system to achieve their objectives. Often, criminals gain critical computer passwords or access codes needed simply by talking to employees. This is what we called “Social Engineering
How to Prevent Computer Crime? Installed Firewalls on the computer. A firewall can help secure an organization’s information system from unauthorized external access. Organizations need to develop and enforce effective Internet Security policies for all employees. Many companies have taken steps to fight computer crime such as BERJAYA University College of Hospitality (BERJAYA UCH) has banned some unauthorized websites such as high potential forums (Crack Code Forum USA). Since preventing computer crime requires additional controls on information systems, organizations must identify potential computer-related crime, the consequences of that crime, and the cost and complexity of the controls needed to protect against loss from the crime. Sometimes, the cost of the controls may outweigh the potential for loss.
What is Privacy? Privacy is the right to be out of public view or to be left alone. With today’s information systems and networks, the right to privacy has become a challenge (IBM, 2013). Data is continually collected and stored about personal details Associate in Computer Technology IS-PQS 213 Professional ethics, quality consciousness and social issues in computing Bulacan Polytechnic College Date Developed: June 2020 Date Revised: July 2020 Page 6 of 12 Document No. 00-IS-PQS 213 Developed by: Mauro C. Tolentino Revision # 02 and often transmitted over networks without user knowledge. Data collected normally will store inside countless databases throughout the world.
Privacy Act 1988
The objects of this Act are:
(a) to promote the protection of the privacy of individuals; and
(b) to recognise that the protection of the privacy of individuals is balanced with the interests of entities in carrying out their functions or activities; and
(c) to provide the basis for nationally consistent regulation of privacy and the handling of personal information; and
(d) to promote responsible and transparent handling of personal information by entities; and
(e) to facilitate an efficient credit reporting system while ensuring that the privacy of individuals is respected; and
(f) to facilitate the free flow of information across national borders while ensuring that the privacy of individuals is respected; and
(g) to provide a means for individuals to complain about an alleged interference with their privacy; and
(h) to implement Australia’s international obligation in relation to privacy.
Republic Act 10173 – Data Privacy Act of 2012
AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES
The theft of information stored on a computer also falls within this category. The unauthorized procuring of trade secrets for economic gain from a computer system places the computer in the role of being a target of criminal activity.
computer crimes do not fit a specific category in that the spectrum of possible victims includes individuals, financial institutions, government agencies, corporations, and foreign governments
Examples of Computer Crimes Computer crime laws prohibit a person from performing certain acts without authorization, including:
1. Improperly accessing a computer, system, or network;
2. Modifying, damaging, using, disclosing, copying, or taking programs or data;
3. Introducing a virus or other contaminant into a computer system;
4. Using a computer in a scheme to defraud;
5. Interfering with someone else's computer access or use; 6. Using encryption in aid of a crime;
7. Falsifying email source information; and
8. Stealing an information service from a provider.
Examples of Computer Crimes Computer crime laws prohibit a person from performing certain acts without authorization, including:
1. Improperly accessing a computer, system, or network;
2. Modifying, damaging, using, disclosing, copying, or taking programs or data;
3. Introducing a virus or other contaminant into a computer system;
4. Using a computer in a scheme to defraud;
5. Interfering with someone else's computer access or use; 6. Using encryption in aid of a crime;
7. Falsifying email source information; and
8. Stealing an information service from a provider.
Social Network, Cybercrime, and Internet Sex Crimes
While bullying, sexual harassment, and child pornography are long-standing crimes and societal problems, the Internet and social network sites have introduced a whole new arena for predators to practice their trade.
Cyberbullying
Cyberbullying is aggressive harassment that occurs using electronic technology, including cell phones, tablets, and computers using social media sites and chats sites. Cyberbullying includes the sending of unwanted, abusive text messages, photographs, personal information, defamatory and libelous allegations and rumors, and the creation of fake profiles intended to harm victims.
Child Pornography and Preying on Minors
Child pornographers and child molesters have unfortunately found the Internet to be a useful tool to prey on children as well. The Department of Justice (DOJ) has a special task force devoted to catching these predators, and if your child has been targeted, you should contact law enforcement right away. The DOJ has published a Citizen's Guide on Child Pornography to outline the applicable laws. The Department of Justice also provides additional resources on Internet safety for children and the rights of child victims.
Keep the Computer System Up-To-Date
Cybercriminals will use software flaws to attack computer systems frequently and anonymously. Most Windows-based systems can be configured to download software patches and updates automatically. By doing this they will monitor all online activity with the intent to protect the system from viruses and other malicious programs. They will also be upgraded to protect against Spyware and Adware. To be safe on the Internet, the antivirus software should be configured to update itself every time the system connects to the Internet.
2. Protect Your Personal Information
Using many of the online services today involves sharing basic personal information to include name, home address, phone number, and email address. Using common-sense is the best way to protect against and prevent Cyber Crime. Do not respond to email messages that contain misspellings, poor grammar, odd phrases, or web sites with strange extensions. When in doubt about responding to an email, consider a telephone call to the organization to verify authenticity. Type the address for the website in the browser instead of clicking on a link. Any financial transaction website should have an “s” after the letters “http” (e.g., https://www.mystore.com AND NOT http://www.mystore.com). The “s” stands for secure and should appear when you are in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon at the bottom of your web browser (usually the righthand corner). Hackers might try to gain access to crash it, delete information, or steal passwords and other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
3. Install or Update Your Antivirus Software
Cybercriminals will use software flaws to attack computer systems frequently and anonymously. Most Windows-based systems can be configured to download software patches and updates automatically. By doing this they will monitor all online activity with the intent to protect the system from viruses and other malicious programs. They will also be upgraded to protect against Spyware and Adware. To be safe on the Internet, the antivirus software should be configured to update itself every time the system connects to the Internet.
4. Protect Your Personal Information
Computers must be configured to the security level that is appropriate and comfortable for the user. Too much security can have the adverse effect of frustrating the user and possibly preventing them from accessing certain web content. Using the “help” feature of the operating system can often address many of the questions in this area.
5. Choose a Strong Password and Protect It
Usernames, passwords, and personal identification numbers (PIN) are used for almost every online transaction today. A strong password should be at least eight characters in length with a mixture of letters and numbers. Using the same password for various sites or systems increases the risk of discovery and possible exploitation. It is never a good practice to write a password down and leave it near the system it is intended to be used on. Changing a password every 90 days is a good practice to limit the amount of time it can be used to access sensitive information.
6. Keep Your Firewall Turned On
A firewall helps to protect your computer from hackers who might try to gain access to crash it, delete information, or steal passwords and other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
7. Read the Fine Print On Website Privacy Policies
On many social networking and photo sharing sites, there is the wording on the privacy policies that allow the website to keep information and photos posted to the site, sometimes indefinitely, even after the original has been deleted by the user. While this may not discourage one from posting images or messages, an awareness that this can be later retrieved and disseminated may be a consideration as to what information or photos are posted. What today may seem to be a harmless prank can have a devastating effect on one’s reputation several years later when applying for a job or other opportunity.
8. Review Financial Statements Regularly
Reviewing credit card and bank statements regularly will often reduce the impact of identity theft and credit fraud by discovering the problem shortly after the data has been stolen or when the first use of the information is attempted. Credit card protection services can often alert a person when there is unusual activity occurring on his or her account, for example, purchases in a geographically distant location or a high volume of purchases. These alerts should not be taken lightly and could be the first indicator a targeted victim receives that something is wrong.
9. If It Seems Too Good to Be True, It Is!
No one is going to receive a large sum of money from a dead Nigerian politician, win a huge lottery from being “randomly selected from a database of email addresses,” or make big money from “passive residual income a few hours each day working out of your home.” Many of these crimes go unreported because the victim is too embarrassed to admit to law enforcement that they were duped.
10. Turn Off Your Computer
With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always-on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users