Visit Paul's websites:
From Computing to Computational Thinking (computize.org)
Becoming a Computational Thinker: Success in the Digital Age (computize.org/CTer)
In the digital age, our security has two aspects–in the physical space and in cyberspace. Most of us are more familiar with the former but much less with the latter. Yet both are equally important. Of course, it is essential for everyone to become more knowledgeable about cyber attacks and on-line scams, because they can cause harm, even disaster, to businesses and individuals.
Companies as well as governments must devote resources to protect themselves and people they serve. Individuals also want to be vigilant and avoid becoming victims.
We’ll look at cyber attacks and online scams, as well as how to deal with them, in simple and easy to understand terms with particular focus on online scams. Topics here can not only help individuals become better prepared but also enrich their Computational Thinking (CT).
This article is part of our ongoing CT blog published in aroundKent (aroundkent.net), an online magazine. Other cyber security and engaging CT articles can also be found in the author’s book Becoming A Computational Thinker: Success in the Digital Age. See the website computize.org/CTer for more information.
Let’s begin with cyber attacks.
In cyberspace, where communication over computer networks takes place and where our online accounts and critical private data reside, a lot of great things can happen. But, at the same time, bad things such as various attacks, by faceless characters from any part of the world, can also happen. Such things include delivering unwanted or unwelcome materials, eavesdropping, breaking and entering, information theft, datanapping, and other cyber crimes. Surely, we want to take full advantage of the web/Internet while guarding against possible downsides.
Widely publicized security breaches range from information theft to influencing democratic elections to holding computers for ransom. No wonder why many individuals feel edgy about their own security and privacy online. You are not alone if you feel unsure or even helpless.
While cybersecurity is a vast area and involves many factors and players— Internet providers, computer software and hardware companies, search engines, social media, and government agencies—here we focus only on a basic understanding of safety measures for individual users.
Let’s first take a look at some high-profile cyber attacks in the recent past.
Cybersecurity attacks can be launched by a single individual or a well- organized group. Some, the so-called advanced persistent threat groups, could be connected to industry or even governments. Generally, a cybersecurity attack exploits one or more vulnerabilities in a system or network, including the Internet as well as phone networks. Here are some types of attacks that should concern end users.
To enhance cybersecurity, let’s have a checklist for ordinary users.
General Safety Practices:
Safeguard your user ID and password; use strong, unique passwords for each account (use a password manager); enable two-factor authentication (2FA, e.g. login+texting, email, Q&A), wherever possible; keep devices and software updated (OS, browser, apps, antivirus); back up important files regularly (cloud or external drive).
Smart Behavior Habits:
Don’t click on suspicious links or attachments in emails or messages; avoid logging into sensitive services (like banks) on public/shared computers; never reuse work passwords for personal sites, and vice versa; log out of accounts after use, especially on shared devices; don’t share or lend your phone, tablet, or laptop to others.
At Work or Shared Environments:
Lock your computer when stepping away (e.g., Windows+L, or close lid); avoid entering passwords on someone else’s device; don’t plug unknown USB drives into your computer; clear browser history, cache, and cookies after using a public workstation.
Mobile Device Hygiene:
Use a PIN, fingerprint, or face unlock on your phone; install apps only from official stores (Google Play, Apple App Store); review app permissions — deny access to things apps don’t need; turn off Bluetooth and Wi-Fi when not in use, especially in public places.
Network Usage:
Avoid accessing banking or sensitive info on public Wi-Fi; use a VPN when using public networks, if possible; disable auto-connect to Wi-Fi networks; avoid entering personal information on sites without HTTPS.
Extra Protection for Financial & Critical Accounts:
Use a separate device (or browser) dedicated to banking and sensitive accounts; monitor your bank and credit activity regularly for any strange behavior; use credit over debit for online purchases —better fraud protection.
Privacy and Personal Data:
Limit how much personal info you share online (birthdate, location, etc.); be cautious with social media posts that can hint at passwords (pet names, school names); review privacy settings on your accounts regularly; be skeptical of unknown friend requests and messages.
While many attacks involve breaking into computer systems, networks, cellphone systems and online accounts without alerting the victims, other attacks known as online scams actively involve the victims by tricking them into evil plots designed to steal their money, information, or worse (kidnapping, human trafficking).
Here is our top-ten online scam list.
The most common tell-tale signs of an online scam include suspicious requests for personal information, urgency and threats, unrealistic offers, requests for unusual payment methods, poorly written communications, unverified websites or social media profiles, scammers who won’t meet in person, promises that are too good to be true, requests for payment before shipping, and a lack of detail in their statements.More details about these tell-tale signs:
An Actual Scam
Here is an email the author received recently. See if it fits some of the preceding patterns.
Alerted by tell-tale signs, you can simply dismiss the attempted scam and move on. Better yet, you can report it to relevant authorities. Let’s list where you can report scams and attacks in the US:
General Online Fraud or Scams—Federal Trade Commission (FTC)
reportfraud.ftc.gov; Better Business Bureau www.bbb.org/scamtracker.
Internet and Cyber crime—FBI (IC3) www.ic3.gov Internet Crime Complaint Center; US-CERT phishing-report@us-cert.gov.
Reporting a scam takes time and energy. But, we all should chip in to make cyberspace safer, to prevent others from falling victim, and to help isolate/arrest the devious scammers.
Today cyber scammers can hide behind the vast worldwide networks, yet their main scheme and technique is rather simple and centuries old—exploiting human vulnerabilities: wishes for good fortune, romance, getting goods/services for free, greed, desperation, gullibility, and desire for grandeur. History is filled with emperors who fell for eternal-life-on-earth scams!
Furthermore, cyber attackers count on people’s habitual/compulsive clicking, lack of understanding of communication protocols, and blind trust in authentic looking messages/websites.
As we know, Computational Thinking promotes familiarity with the digital world, logical thinking, and paying attention to facts and details. In addition, CT trains us to follow well-designed procedures precisely and to anticipate forks in the road with pre-planned reactions. Therefore, CT can be the perfect antidote to defeat all kinds of scams, especially the online variety. Thus, CT should be part of literacy in the digital age. Would you agree?
ABOUT PAUL
A Ph.D. and faculty member from MIT, Paul Wang (王 士 弘) became a Computer Science professor (Kent State University) in 1981, and served as a Director at the Institute for Computational Mathematics at Kent from 1986 to 2011. He retired in 2012 and is now professor emeritus at Kent State University.
Paul is a leading expert in Symbolic and Algebraic Computation (SAC). He has conducted over forty research projects funded by government and industry, authored many well-regarded Computer Science textbooks, most also translated into foreign languages, and released many software tools. He received the Ohio Governor's Award for University Faculty Entrepreneurship (2001). Paul supervised 14 Ph.D. and over 26 Master-degree students.
His Ph.D. dissertation, advised by Joel Moses, was on Evaluation of Definite Integrals by Symbolic Manipulation. Paul's main research interests include Symbolic and Algebraic Computation (SAC), polynomial factoring and GCD algorithms, automatic code generation, Internet Accessible Mathematical Computation (IAMC), enabling technologies for and classroom delivery of Web-based Mathematics Education (WME), as well as parallel and distributed SAC. Paul has made significant contributions to many parts of the MAXIMA computer algebra system. See these online demos for an experience with MAXIMA.
Paul continues to work jointly with others nationally and internationally in computer science teaching and research, write textbooks, IT consult as sofpower.com, and manage his Web development business webtong.com