Skip to main content
Engineering LibreTexts

10.3: Netiquette

  • Page ID
    79163
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Network etiquette (Netiquette) is the set of rules that determines how to properly communicate and browse the web.

    One important part of netiquette concerns your online safety. By following these basic rules and tips you will avoid most online threats such as phishing attempts, malware infections and more. Why is this important for us? Given the rise of cybercriminal activity in recent years, the need to stay safe on the Internet has never been more pronounced. Most people believe all they need to be secure online is to have an antivirus program and do frequent back-ups, but the truth is, cybercriminals know lot of ways around these. What really keeps you safe is the ability to recognize online threats and how to avoid them, and this is why netiquette is so important. A study from University of Maryland University College analyzed users’ knowledge on cyber-security and came up with a few interesting conclusions:

    ·       the more you know about cybersecurity, the likelier you are to adopt online safety measures;

    ·       cybersecurity training and education will make you more open to new online safety methods.

    Netiquette is important, so here are the 10 best internet safety tips and netiquette rules you need to be aware of when online.

    Keep your software/apps updated and delete the ones you don’t use.

    Developers and cybercriminals are almost always caught in a cat and mouse game, where cybercriminals search for exploits and developers rush to patch them before too much damage is done. Most of the times, vulnerabilities are quickly updated, but the real issue is that most users will still use an outdated version and will be vulnerable to the exploit. Keeping your software up-to-date will go a long way into keeping you safe. But an equally important step is to remove software and apps you no longer use. Many of these programs still communicate in the background with various servers, and in case of a breach, this data might fall into the wrong hands.

    Be careful when dealing with emails from unknown sources

    Have you received an email from an unknown source? Do you frequently receive -mails from people you don’t know? Just as in real life, an important rule to stay safe on the internet is to be suspicious of strangers. First, don’t trust emails from people you never met, especially those that ask you to click a link, open an attachment or send a file to the sender. It’s pretty easy to spot phishing emails. What gives most of the away is the urgency with which they ask you to do something, either because your account may be compromised or your online purchase may have encountered some issues you need to sort. To fool the potential victims, the latest trend in e-crime is to deploy spear phishing attacks, where emails appear to come from well-known individuals or banking authority. But in order for a spear phishing attack to be successful, it needs to appear as genuine and believable. So they launch an elaborate identity theft operation to target and steal your sensitive information. So when you do get a phishing email, ignore it completely and don’t reply to the e-mail, don’t click the (malicious) attachment, and don’t click the dangerous links in the e-mail that could download malware on the system

    Don’t click that link or online ad

    You found a pretty cool link on the Internet and it keeps tempting you to click it. But the source of the link (website or email) seems fishy. You ask yourself: What can the bad guys do to me if I click this link? The answer is simple: a lot of things could go wrong. Just by clicking a link in an email or a pop-up window, you could turn your PC into a botnet slave, allow cybercriminals to inject malware into your device, or expose your personal information. You may think that you are safe from all these dangers because you have a good antivirus product, but nowadays traditional antivirus protection isn’t enough anymore and you need additional weapons in the fight against online dangers.

    Just because it’s free, it doesn’t mean it’s safe

     Justbecasue.jpg

    As a rule of thumb, paid software is almost always secure and safe. It wouldn’t make sense for a cybercriminal to limit the number of victims by imposing a paywall. Double check free software using Google, especially if it’s not a well-known one, such as WinRAR. This filtering process can expose bad reviews, or reveal that the free software is actually a vehicle for malware. While the free software itself might be safe and legit, the website itself may try to compromise your security through drive-by downloads. These are secret downloads carried in the background, that target software vulnerabilities and system exploits. Make sure you use a trusted, free program that automatically updates your vulnerable software applications to close security holes in your system.

    Do not reveal sensitive information online

    donotrev.jpg 

    Social media is the first place criminals check to gather information on you. They will use any piece of information they can find, such as your name, birthdate, address, city, your spouse/partners name, what sort of pet you have, name of the pet. Literally, anything that you can think of. Improving your social media security settings is a good first step in preventing an identity theft or doxxing. So, be a bit skeptical about people you meet online and about their intentions. Many people exaggerate their Facebook lives, and depending on how you use it, social media may come back to haunt you.

     

    Keep your account information for yourself

    keepyouraccount.jpg

    Our credentials for online accounts, user names and passwords, hold the keys to a lot of important information, and for that reason they are the most sought after targets by cybercriminals. Using the same password for more than one site is a risky move, since if a malicious hacker breaks into just one account, he can then take over the others. One of the better online safety tips is to use a different password for every website you register. The downside however is the difficulty of memorizing them. One workaround is to use password managers, these will remember the login details of every site you use and can even generate some strong password for you use.

    Report illegal activities or offending content

    If you notice offending language attacks, like cyber-bullying, hate speech or any form of harassment, do not hesitate to report it. Using the “Flag as offensive” or “Flag as spam” buttons is proper internet etiquette and should be sufficient to fight back against minor online threats, but other types of content, such child pornography or arms trafficking should be immediately reported to the police. Reporting cyberbullying is takes on a different importance when children are the targets. A report on cyber bullying on 2014 gives the following troublesome conclusions:

    ·       25% of teenagers report that they have experienced repeated bullying

    ·       52% off young people report being cyber bullied

    ·       95% of teens who witnessed bullying on social media report they have ignored the behavior

    ·       cyber bullying affects everyone

    ·       the most common types of cyber bullying tactics reported are mean, hurtful comments.

     

    What you post online stays online forever

    whatyoupost.jpg

    ·       We post photos, remarks, location updates and similar content, which we think is fine because we use an anonymous username on a small niche forum. But niche forums are also indexed by search results, and if you reuse the username, other people can start to connect the dots. This is called doxxing, where people hunt for information about an internet user until they manage to figure out who they are in real life. And you may think that your posts and comments are usually ignored or don’t receive much attention, but they still remain there and you never know when they come back at you. Not to mention the fact that search engines save and classify your content on so many online servers. To keep it short, when it comes to posting personal content on forums and similar places, follow these guidelines:

    ·       is this information too personal?

    ·       delete/edit past posts which reveal too much about you

    ·       could your content affect your personal or professional life in the future?

    Use anti malware protection before you go online

    useanitmalware.jpg

    Don’t go online until you have the best anti-malware protection that money can buy. You may think that avoiding adult websites and that sort of thing will keep you safe, but did you know that hackers now hide malicious code even in legitimate websites? And sometimes not even that is enough. Some ransomware programs are so sophisticated, it is technologically impossible to decrypt them, no matter how much you try. And in this case, you really need the best tools out there.

    Create back-up copies for your important stuff

    Though you may have all the security protection in the world, disaster may still hit your system and your valuable files. It may be a system crash, a hard disk failure, a ransomware attack that encrypts your entire operating system or it may be a human mistake. There are so many reasons something can go wrong for you and your sensitive information, even if you followed all the netiquette rules in the book. To emphasize the importance of this point, we can tell you that a while ago we interviewed a series of security experts in the IT industry, and one recurring theme was the importance of backing up your information.

    Conclusion

    Common sense is vital on the internet. Most of the threats you will find online rely on human error to break into your system. Technology hasn’t made us safer because safety is not a function of technology. Real security comes from people. Technology is just a security tool. In the end, knowledge and netiquette become the two sides of the same coin: Internet protection. 


    10.3: Netiquette is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?