Transcript for:
Understanding Data Protection and Malware

hello everyone welcome to Geotech mhm Geotech in this video we're going to be learning chapter 5 of the Cambridge as/ levs e security okay and in this video you will be learning the following um what personal data is um why personal data should be kept confidential how personal data can be kept confidential the method used by unauthorized persons to gather personal datas how to evaluate the method of prevention um the types and uses of marwel the consequences of marel for organizations and individuals and finally how to prevent marrow from entering computers so stick with me on this the first thing we look at is personal datails and and we talk about personal data these are data that are unique to you but let's put a definition to it so right here on on your screen personal data is any information that relates to an an identified able living human being yeah it's any information that can relate to an identified individual something that you can relate to a person that they can be identify by and there are different pieces of information which are collected together and can lead to the identification of a particular person which we're going to see in this video it also means that any data that can be used to identify or recognize somebody is termed as personal data any of course these data has been manipulated so that it does not allow an individual to be identified we see that most of the time you look at a DNA that has been manipulated and it should be bearing this name but for some reason it's being um is is showing the identity of somebody else okay so this is very very important even if this personal data is deidentified encrypted okay it is still seen as a personal data so please let's take note of that okay the identification deidentification what does it mean now deidentification is a common strategy when trying to prevent a person's identity from being revealed okay is a common strategy when trying to prevent the person identity from being revealed items of personal data might be removed from a record such as individual name if the person could still be recognize from the remaining data it will be possible to re-identify the data and add the removed data for example the name and backend okay so in this case these items are being manipulated so that it does not reveal or um it prevents a person from identifying um this individual we looked at it um in chapter one when we talked about encryption and we said that data can be encrypted um data can be decrypted okay so even if these personal datas are encrypted it's still personal datas okay it's still personal data so we need to we need to get this fact straight okay seize data iniz data is when instead of removing the personal items of data okay instead of removing the personal items of data they replace it with a temporary ID okay this is what most teenagers do okay yes I have to say yes it is and most people who are trying to fake that they call it IL uses okay so you're removing personal and you're replacing with a tempor ID you're just manipulating it to you have a picture it shows your picture but different items in that particular word um data such as your name your date of birth your Ain all those things are being manipulated in your ID this means instead of seeing the person's name you will see an ID which will mean nothing to you the problem is it is similar to deidentification somebody can recognize that individual from the rest of the record they can replace the ID with the individual's name why the the identification prevents a person ident from being reviewed such as encryption but in sise data we see that this is removing personal items of data and you replace it with a temporary one okay you have an ID that shows your picture but a different name so in Ukraine you known as slaf in France you know know as Lo in Spain you're known as Ramos okay in Nigeria you're known as chinu okay all right okay even in the US you're known as Michael or you're known as um Boston okay that's what we're talking about now another thing I want to talk about is the general the general data protection regulation gdpr okay General data protection regulation now the data that has been amended to make it appear Anonymous in such a way that it becomes impossible to recognize the individual then it's no longer classed a personal data okay so for this case the um the anority of the record must be irreversible now we talked about the EU talking about the European Union like many areas of the world they have a set of rules governing protection of data together they are called that's right the general data protection what regulation now this promotes sodomization and anization of personal data now organizations with personal data should use one or the other method to reduce the risk what are the risks what are those things and you see this in your passport and other areas of IDs as well and other IDs one your name and soul name a home address an email address now the email address could be um the public Ming address like your Gmail Yahoo or your organization mail address okay which um in my case I have um a. ndi at Ed col.org.il name with the organization you're working with another one is an identification card number okay every ID has a number the next thing could be the location data okay that is location data from a mobile phone your location another one is an IP address okay it could be um an advertising identifier of your phone okay it could also be head at hospitals or or by by doctors okay this also symbolizes that they are unique to identifying a person like your DNA your gender keeping personal data confidential how can we keep personal details confidential okay now there are companies organization that sto large amount of personal information they have databases for companies that stores this information even your Banks they keep your personal dats that is the truth okay you open an account with every important details including to your home address so it simply means that if they don't have um a security measure in place those informations can be laked out now the question might arise why do we need to keep data confidential why why do we need to keep it now the the answer is very very simple it's right there on your screen so we don't fall into the wrong hands or we don't fall into what we call identity te people stealing your identity fors and carrying out devious act that's what it means they can go with your identity to commit so many mous acts and you get arrested for doing nothing please don't get surprised please because you've seen this in movies enough to believe that this is real and the essence why I'm coming this way is because I want to be able to put down a lot of scenarios so that you can actually understand why person details are confidential and it's not and also as Learners who are watching this and maybe teachers you can also know that personal details are very very very sensitive and they should be kept confidential people can even go as far as with Lar amount of money from your bank and it will look as if you were the one doing it identity is when the Foster pretends to be another person online by using that individual personal information and there there's a popular name for it tell me in the comment section just type it in the comment section we call it scam you've been scammed you've been scammed that's the truth in they call it y something or something okay so yeah okay okay so this is very very important Fosters who have access to an individual personal data can use their login um details to access their back account or commit other types of fraud I I'm also a victim of this I've been robbed up of and you're shocked you're like oh but is is is the IC go but most time there appear to be people that um or accounts have been hacked that look like your relatives account and they they use those account to chat you up and you feel that it's your relative not knowing that is a ha account and you have to be careful and it got to the point where um I was still to send money um to my um relative and I had to do that thinking she was the one not knowing she wasn't probably I should have called was a long time ago I've also seen my Facebook account been hacked that's why I don't put my Facebook there because it's hacked my LinkedIn account was hacked one time it took me a whole lot process communica with Microsoft to get it back so these things are real okay so they can make large on your account transfer between accounts and the bank is thinking maybe it's you so you have to be careful okay now if a b obtains personal data such as your address and information about when a person is at work what do they do they can Boggle the person's house they can come to steal because they've obtained information about the person so this is why organizations and businesses can take certain measures to ensure the confidentiality of data to ensure that the datas are strictly confidential okay and also another key point it is essential that personal information should only be seen by those people who are authorized to see it keeping data confidential is an essential part of organization responsibilities these are key points I'm telling you right now and one way to ensure that keeping data confid is an essential part of organization responsibility is encryption which is the main it technique used to ensure um datas are confidential in an online system and anybody illegally accessing data will not be able to understand that data okay they can still perform malal activities like delting data but they cannot gain any information from it and this is why this data protection act that has been set which are rules organization must stick to to to ensure that your datas are protected and they exist in most countries now let's talk about those datas those data protection act okay now here you see that a number of workers in organization still need to look at personal data of of other individuals as part of their job is important that this data this workers maintain that um confidentiality of okay is important now um recently I I I became a kyc validator to Pi okay simp means I get to validate some people in P but I see these details I see their passport I see their n and all these datas and I have a rule because I've signed that I don't have to share it yes I'm I'm working with personal datas but I don't have to share it I don't have to do anything with it I don't have to you take a screenshot of it for no reason okay now organizations can encourage workers to be aware of their responsibilities it is very important for them to go to the terms and conditions for them to ensure that all the things are put in place workers who deal with confidential information about other individuals have a duty of confidence yes they do have a duty of confidence okay both the individual and also to their employers it simply means that in the they must not they must not use the information for any reason except with permission of the person who gave it okay okay um so a duty of confidence can exist a worker must treat the information as confidential or it must be obvious to them that information is given in confidence okay um in order for this happen workers are often asked by the employers to sign an agreement to this of course this is called a confidentiality agreement which is what I sign with pi organization must be held responsible for their decision to pass on information okay good practice is making sure that only the least amount of information that could identify an individual is passed on online services particularly online banking and shopping allows organization to have access to private datas such as name addresses phone numbers Financial records and so on so this information should not be passed on from organization to organization that is to TD parties we call them third parties without due authorization from the individual so this is very very important organization should live out as many personal details as possible okay if you're going to pass on that now we talk about aggregated information it's another way of preventing individual from being identified now this is where the personal details of a number of people are combined to provide information without individually identifying anybody okay so we have the personal D of numbers of people are combined to provide so these details are combined together okay without you with this information you canot really um identify anyone with it okay so please it's very very important keeping personal data secured okay uh before we talk about that let's talk about uh metad datas it's very very important now the photos and videos people take with their smartphone contains information known as metadatas incl the time the place they were taken if these photos are intercepted the individual address or where the work can be discovered however smartphone do have softwares which can be used to either delete the geot tag from images or disabl them so that they are not targed so please let's also take it's not like you just going around taking pictures I know it's the festive season you want to goow around taking pictures but you have to be careful okay so keeping p personal data secured um there are numbers of ways in order to keep personal data secured we talk about firewall now we will talk about firewall firewall are designed to prevent unauthorized network access okay they're just designed to PR prevent unauthorized network access organization might store personal datas okay that tend to have several computers that form networks many of which okay many of which are connected to the internet now without a firewall these computers can be accessed by unauthorized users through the internet so what the firework does okay is to examine datas coming into the network and to see if it's what allowable the the data coming into the network is it something that we can identify or is it just Anonymous and if it's anonymous please reject it also examine data packet okay something you see in i o level in chapter 4 of your testbook talking about the networks and effects of using them and we talk about data packet these are chunks of data that are broken down into smaller pieces of information that's what data packet is okay smaller pieces or data that been broken down smaller piece of information such as your IP address you see that's why you have um can I have a um okay yes com yeah so you have for example you have 1 2 0. 48. 68 etc etc okay so please let's take note of that an IP address talking about Internet Protocol is a combination of numbers that can identify each computer in the network so if it's an IP address that is not allowed the firework can bring block the traffic it also prevents certain computers from Gaining access to the network now okay finally on firewall yes firewall do prevent Hackers from assessing networks however however a hacker computers is prevented from assessing the network the hacker could physically steal a computer that is permitted to access the network so that does not even stop people from accessing the network they could gain access to a computer that have access to the network so it is one way to prevent but still not the only method that is reliable in ensuring that um those informations are safe penetration testing a penetra testing is also refer to as a pentest now this is when um companies employ somebody to deliberately attack their computer network we call it ethical hacking okay so they do this so that the authorized hackers will identify the weakness in their system security and the computer can then take measures to improve it if necessary this is what LinkedIn is doing this is what Microsoft is doing this is what Facebook is doing this is what x is doing talking about Twitter ELO Mo yeah it's old news okay so if you're watching this for the first time like oh what's X is formally known as Twitter mhm okay okay so we call it a p penetration test the employed people this hackers I'm going to pay you money try to hack into our system even Banks they do that try to hack into a system and okay you did that okay and they try to improve it they tell you try to hack hack to it again so all these things into ensure that the the computer network is um the computer network is um powerful enough to withstand any form of penetration what from hackers okay now the whole purpose of doing this is to enable company to secure data from illegal hackers who will attempt to gain unauthorized access to the system okay authentication technique now authentication technique is also to prevent accessing a computer network and for you to do that users are usually required to log on yes not log in log on okay so this means that they have to identify themselves to the system and so that it can be sure it is not a hacker trying to gain access it is called authorization because it's a way to um validating a person okay and one way to do that is with with what we call a user ID and a password which the user knows another way is swiping a smart card which belongs to the user it can be um a magnetic stripe card it could be it could be an if ID card okay so yes but you have to swipe it okay and this information are stored in the card the next one is using Bome datas B datas are unique to the user they have a unique physical characteristics of that user and bies involves the following um your fingerprint your iris your retina your voice okay recognition as much as there are something that they have that unique physical characteristics of the user okay which is the most or the best way of providing or preventing people from accessing certain networks or certain information in that Network it's quite expensive but it's one of the best methods so far okay now it also um if only one of this method is used it will suggest that the system is not toally secure so we have what we call factors authentication or multiple Factor authentication why we looked at here as authentication Technique we also have multiple Factor authentication that simply means using more than one authentication method to ensuring that the datas are secured I've been seeing a lot of things I hope this makes sense okay now at least two should be used when accessing personal data for example when somebody withdraws money from an ATM they have to use something that belongs to them their bank cards and something only they know their pin so if using only the bank card without the PIN then although we do have cont lless cards okay so don't get me wrong we do have cont lless card and if you have it you have to be careful okay okay now yes small transactions are carried out with a contactless card okay so even if it's it's stolen you're safe but it's painful but you're safe okay okay so we call that um a two- Factor authentication okay and also sometime refer to as multiple or multiactor authentication that involves more than uh two methods then um again when using online banking additional information such as user date of birth is often required when a customer carries out certain transaction using a smartphone some banks will send a onetime pin we call it OTP or password in the text message for them to enter as part of the authentication process during the log on process keyboard presses can be detected by spy wear so drop down options are often used for dates or pins to be entered H so we have to we have to be careful about that one we have the next one is levels of assets if a hacker do gain access to a network the ability to retrieve personal details can be limited by network settings created by the network manager now different groups of users can be granted different levels of access to the datail on the network this is particular the case with hospitals and also in um um Federal Security Systems agencies where um we call them um levels of clearance you only have clearance for level two level three level four level five level six okay so even if you have even if the level two is hacked into they can only have access to only only the informations provided for level two okay now another example is the use of online shopping websites that requires a login customers will only see datas that irrelevant to them however if a programmer in employees by a company access the customer database they'll be able to view all the accounts this is because they have been given a higher level of access than the customers we networks it the owner of the data that can ground different levels of access okay um there was one time I don't have a page and in my page I can add other moderators that can do other things on the page okay so it's still the same thing it's still that level of access that we talking about even on my YouTube as a YouTube Creator I can give certain level of access to people to work in the background okay now for example um talking about social networking like Facebook LinkedIn um um your Instagram your ex okay now they can be given um the owners of data can grant different level of access it is possible to amend settings so that only friends are allowed to see their datas or they or they allow both friends and friends of friends to see their data okay most of my um friends across continent they use friends of friends so mean that for you toble to see their information you have to be a friend who is a friend in their contact okay so on the other hand if the settings is public it simply means that um it can be seen by anyone so whenever you're posting whenever you're posting you have to be careful because you have the option of making it public making it only your friends or making it friends of friends okay allocating different assets levels to different group within the information that the different group can see and the actions they allowed to take now for Network policies there are set of rules okay that allow companies to choose who is allowed to access their computer network so this is a policy and control their use of the network once they gain um they they've gain access to it now every organization have policies including networks okay so the policy means that they have a rule okay so if a company is coming on board they they they there are certain levels to we've talk about the levels of assets and how they can use it so it it allows assets to their computer networks and they control the use of the network once they gain asset most company now use the internet to carry out their business transaction as a consequence their computer network have become vulnerable to attacks which is not a good thing as a company don't use the internet this attack can allow competitors to gain knowledge of their operations they can result in data being destroyed or provide access to any personal data that is stored when workers join a company they are normally required to sign an agreement such as acceptable use um acceptable use of policy this specify what type of use is acceptable and what is not acceptable they have agreed not to use the network for illegal unethical or distracting nonwork related activity such as downloading copyrighted materials or spending time on social networking sites to communicate with friends why not necessarily what preventing Hackers from outside the organization attacking the network it does have to limit what employees might be tempted to do with personal data so in the whole essense of network policy is there are companies that um or rules that can allow companies to choose who is allowed to access their computer network and they control the use of network what they gain access to and a good examples are the internet okay which is with is a PR Network okay and this is what banks are making use of software update okay now what we are talking about here is um let's talk about software update okay now software updates okay simply means you're updating a computer's operating system um they made available for different different types of application softwares although these updates are meaningful in eliminating bxs and making the software easier to use soft talks about new features that added to that particular what software probably the most useful function is when they eliminate specific security weakness if weaknesses are present in an operating system hackers can take advantage of this in order to access the computer system as soon as the major software update is made aware um of any vulnerabilities they produce update which eliminate direct this is what the iOS is um I have to give kudos to the iOS because they are very active in updates okay currently now at the time of recording this video there's an update um um iOS 17.02 or 17.2 okay and now there's even a future update of 1.03 because of something they foreseeing and stuff like that so all this is helpful to ensure that um your system is up and running and any form of vulnerability is probably being eliminated it is important for user to install update as soon as possible in order to limit the amount of time hackers have to find and exploit these weaknesses now if an application is left without update for a long time time more hackers may become aware of their vulnerabilities and use that information to gain access to personal information for example um the operating system um the Windows Operating System 7 they have stopped giving update so simply mean that people who still using it to car any form of important transactions they are vulnerable to attacks okay so this is very very important other measures what are other measures okay um the other meas like um encryption which has been um discussed um it simply means um brending those datas meaningless to anybody who sees it in a public space okay now another method which relates to mobile network or consign um to the remote delions of mobile phones or tablet data now if a DAT if a device is lost or stolen the owner can send the command to it using another phone that can completely remove any data now for my phone because I use an iPhone 13 as the time of recording of this video okay so um what happens is this okay um my phone is linked to my siblings phone okay and this is possible to use a find me okay and other softwares as well to ensure that they can be able to track my location in real time okay and they they they go as far as having access to my phone remotely I'm not going to tell you my siblings okay tell me tell me okay okay so it's easier for them to just keep track and um when I leave a certain location they are being notified as well oh your FL does look what happened so the way of keeping track including my airpod and other Apple ecosystems this is one good thing about the Apple ecosystem okay now okay any of the individual data that is not backed up on the cloud will be lost forever but it does not mean that the person who has thr the phone will be unable to see any of the owners with personal data that is why the cloud the I cloud is very very important and me I was a believer of not backing up but recently I said backing up okay it's really not it's really not expensive okay you can go for uh the 50 gig is actually small so I will prefer the 200 gig or the 2 terb monthly so that you can be able to back up your details in a cloud okay so it's very very important now any of the individual data is not backed up with the cloud will last forever we've talked about that in order to receive the command to erase all the data the device has to be turned on or connected to the internet if a device is lost at an airport or R station for example the tax of wiping a device may be straightforward however if whoever has stolen it wants to stop that from being removed from device all you have to do is turn it off remove the SIM card and switch it back on again and any personal data stored on the phone is now um available but this is not the case really for iOS phones whether whether the um the SIM card is removed whether it's switched off and turn even when it's turned off it can still be wiped off this is one fascinating thing about the Apple maybe I do a video to show you how this can be done so even if your your iPhone is stolen and you switched off you can't reach it you can still wipe the phone to ensure that it becomes unusable for the person okay it's it's stolen I can't use it they can also use it okay now so this is very important okay preventing misuse of personal data how can we prevent the misuse of personal data now it's important to consider how personal data can be gathered by persons who are not supposed to have access to it before we can talk about preventing many think that hacking into your computer in order to copy delete or change data is very easy it's not it's not easy with all the security me at line above it is very difficult however there are other ways in which personal datas of an individual can be gathered by unauthorized persons and in this video we we're going to atomize and talk about the most common methods number one on the screen is farming when we talk about farming it simply means that computers connected to the internet all have a file called host files okay computers connected to internet all have a file called a host file this is a basic test file which contain the name and IP address of a numbers of URLs when the user type URL into a web browser what the computer does is first look into the host file to find that URL it then looks up the corresponding IP address and seeks to connect to the to the what to the computer with the IP address if it cannot find the IP address in the host file it connects to the DNS server and looks for it right if they look for if it's there and use the IP address to access the approprate computer now farming begins with a user downloading malicious software without realizing they have done so now what do we mean that downloaded malicious software it could be like a game for all the gamers out there oh I love this game and this game might just be a trojan horse okay it might not be genuine and by downloading it or it can be attached with it and by downloading it you've downloaded the malicious software the software can then corrupt the H file by adding URLs of banks for example to The Host files and corresponding IP address which will take the user to fake websites when they enter the URL the user can then proceed to type in their back details into the fre websites given the first STS all the information he or she needs to access the original site okay now you see how how funny that is it's true for example I make it of asset bank so I'm just going to type asset Bank um PLC okay so let's do asset Bank okay so if I click on assess Bank PLC okay now it's going to show this right here this is asset Bank okay and then you have the option of clicking to internet banking if it's an individual or a business okay obviously I'm making of an individual account okay I Mak an individual account and the information is going to load now what happen if by typing ibank do asset bank. PLC instead of displaying um or something like this if you display something like this or you're typing asset Bank PLC it's going to display a replica of this and where you have to put in um you have to ke or you want to log in as much as possible you see something that looks like asset bank but it's not really an asset bank and if you don't know how genuine or how the or you're not familiar with the your interface of that bank you might be tempted okay get this you might be tempted to key in your banking details okay this is how it looks like it you can proceed to log in now this is how the assets Bank looks like now it could be there could be a farming that looks exactly like this but it cannot exactly look like this they have has to be replica so maybe this becomes an Android phone okay and if you're not careful you key in your username so what's my username I'm going to say a gyot tech it's not my username don't try it it's not it's not going to work okay so don't do this and the password is 1 2 3 4 and the password is um 1 2 3 4 5 6 7 8 now most of you will be doing this exactly with me come on it's not this not my password okay and when you click on sign in you see it's signed in so assume it's signed in okay just assume it's signed in okay assume assume okay assume it's signed in okay so when you when it if this is not the genuine site and you clicking the username and password what happens the the owner of the fing is notified the programmer is notified that oh this is your username and password and it's going to log again with the main website and it's going to do a lot of Mayhem with it okay it's going to do a lot of Mayhem with it okay so please it is very very important okay so please let's take note of that okay another farming another type of farming is when the Foster hacks into the DNS server and cors the file on that computer again causing the user to be redirected to a fake website so each time you type it it redirects you to another site that looks like that site in both cases the user will not realize that they have intrigued since they will have typed in the correct URL so you've typed in the correct URL and you see other site so if you're not careful okay that's why whenever you're going to a site you have to check how genuine the site is now if I come here notice that there's a padlock this pilot talks about that this connection is secure most of these farming sites are not secure secured they not secured so you have to be careful now you can see that tracker five has been blocked okay has been blocked on this site so you have to be careful people wants to access it okay or maybe I want to put in my information you have to be careful okay so please this is very very important prob that's why we are also having this class as well okay okay there are numbers of way to limit the as the chances of farming though none of this will completely prevent it but using an upto-date antivirus is going to help it's one way to prevent it okay which can um which will prevent download of software which change the host file user needs to make sure that they install the latest software update an up toate browser can cause an aler to be raised that a fake website has been loaded now I have an extension okay um on my Google Chrome that shows me size that are genine and S are not genuine that can also help you it is also sensible to use a trusted legitimate internet service provider also these two certificates can be checked to make sure that the site is legitimate any site that requir the entry of personal data should begin with this we talked about this your hyperx transfer protocol secure it should be secured okay you you have this this means that if you click this it means that the connection is secured any most fing websites I repeat most fing websites are not secured and if you don't know the difference between HTTP and https you there's every chance that you're going to fall prey to this you have to be careful okay you have to be really careful okay now if if it does not it might well be a fixed site particular if it has not gone if it does not have a color padlock icon next to it it may be useful to check the URL is indeed correct for that site the actual fix website may tell tale signs such as programar or spelling or they should have lacked the user that it may be a fake website the next one is fishing now this all the things I'm talking about I've been able to talk about it in the O level but because this a level we just we're just talking about it in more in depth so please go on with me okay now for fishing is when the Foster try to obtain personal banking details such as username password credit card details debit card details using email we talking about family that to effect websites fishing on the other hand is going to what uptain person details using email they pretend to be an official of the bank and a message which often directs user to enter personal information into fake websites so they send you an email looking as if they're assess bank but truly in retrospect they're not okay and they tell you to put in your information even my bank ass bank will tell me that they do not tell you or ask you for your PIN how would they ask you for your PIN now people who fall into this ask question how will the bank that knows your PIN ask you for your PIN it's like your dad asking you for your name like your dad calling you up hy son what's your name and you be like Dad uh mom because they know your name they gave back to you they give you your name so actually you know um asking you of your name should raise a red flag yes mhm oh oh Dad okay my name is s okay my name is why will I have to tell them my name they know my name this is what it is in farming and fishing in all this FR way of obtaining your personal information okay and into a fake website which will look exactly like a leg a legitimate website it involves the use of an email in attempt to get people to disclose their personal information an email that often includes a link to fre website inviting the receiver to go on that site so they tell you that it's a promo some they tell you that it's this so more primitive email just askers will be typing their back the bank details in a reply to the email others are more sub than this with the email containing something that instantly grabs the recipient's attention and requires them to take immediate action okay it can be a message that tells them that they have won a lottery I remember one time years back um when uh they sent a message to my mom that she has won um was it 6 million on the gala promo because she has a store then and she was so excited Like Son I've won 6 million and so they told us to get um laas laas yeah laas no offense to laasa if you but it's true okay they say we should get the bot of L and we're celebrating we're celebrating we're celebrating that we' won that my mom was won 6 million and my my other brother was like you've won 6 million what did you do okay me I was young back then okay forgive me for being naive then obviously I never thought I would be a computer teacher okay okay and and my other brother was like what did you do that you want 6 million did you do anything you said no you know since we have a shop we buy like aale no you have to do something you didn't do anything and they told you want okay so we called them okay when can it be delivered when will the money be sent to account so they said we should send 1 million to them so they can do a lot of process and um we can they can process a lot of things and then we can um they can send the 6 million to US now that was where young me was straight up I was straight I was put straight because why will I send you 1 million when I have won 6 million we don't ask all the questions do we why will I pay for an item that I've not even seen and it's not the trusted website it doesn't have any Integrity why do I have to send you money this is lot of things that people fall into schip why would I have to send you money so that the containment can be can be shipped into my country when we don't have any Integrity I don't know who you are and by reason of familiarity I don't know your company I've never been to your company why would I do that and just like my mom why would she send 1 million to have 6 million if now now this is what everybody should be right now I know you're watching this and you're asking the same question if I have won 6 million why don't use 1 million literally why not use 1 million that I've won okay 1 million out of the 6 million like like really right 1 million out of the 6 million and use it okay fine I'm not selfish right take the 1 million give me 5 million I think I'm being fair okay so why do I have to send you 1 million you know and that was where we stopped we just you know it was good time for a family to celebrate you know we needed that that bonding together to cele celebrate you know togetherness it was good memories but well you know it has this SP you know the celebration came to an end but the memories is always going to be with me okay so yes it's very very important okay so it can be Ming that they told they have told you that You' have won a lottery I need to put your personal information to claim me Pride please don't put in your personal informations to claim any prize the message can contain a link to an email where they must have sent the information in addition to giving out their personal information which could be which could lead toward what identi TFT the recipient is then asked to send money see it to send money to cover the sendal fee then they will receive their winnings why will I do that another type of fishing or fishing email inform the recipient that the account has been closed or blocked and they need to log in to unblock the account yes please take note of that please always see now this is one thing now this is one thing when you're looking to your website always check the URL I I I've talk about please I know you're a Lev right you a level students I get that but there a video on O O Level chapter 10 on Communications where I talked about the URL how to just slice in the URL so you know which in which okay so it's important to know this here you have your protocol and here you have the domain name okay so the domain name is very very important this is Amazon it should be Amazon not Amazon n so you have to check it sometimes it looks like the website but URL is different sometime they tell you that your account has been blocked and you need to log in to to unblock it please always make your findings call your bank if they asking you for any information call your bank I do that all the time now for assets bank they have an online system okay if you're in asset Bank I'm not advertising them I'm not an ambassador or anything I'm not advertising them but ass Bank same school okay so you can click on it and there you can be able to talk to um you can have a live chat with any of the agents chat with the live AG and then you can communicate the problems that you're having or you can go to any of the nearest Branch okay and then you can make your complaints please don't fall to any of the scram I'm begging you I've heard some heard some students saying I felt victim to this please don't and this is why anything I'm doing even for my YouTube channel I do it from my YouTube channel directly not from anything I do it from my YouTube channel so you know that it's for me coming from from me okay all right okay now in order to avoid falling victim to this fishing scam there are several things a user computer can do it is important to use anti fishing software on a computer connect to the internet this identify any content that could be interpreted as fishing contained in websites or email it can block the content and usually provide user with a warning it tells you before you click on it this site is a fishing site it is often found within the web browser or image software not all web browser provide this facility that's why that we have the Microsoft Edge we have Google Chrome okay I use this two web browsers and you have been trusted Google CH is from Google the Microsoft Edge is from world renown Microsoft okay so you can go to bed with this okay so you don't have to just download any um you don't have to you don't have to download any web browser that you just found that you find in the internet or your Play Store or or or your app store please don't is a good idea to always have an antivirus and also an antip software running on your computer to update it at regular interverse very very important another thing about fishing emails they often contain grammatical of spelling mistakes we saw that here they have a grammatical what of spelling mistakes that is that is a way to distinguish it from the real one okay it's important to look out for this users should never trust emails that come from people whose names you do not recognize if a email looks suspicious it is best practice to just delete it reputable companies or organization will never ask for personal informations never take this for me never so it's only a sign that is a fishing email and again should not be trusted the best action to take is probably delion if an email starts dear customer rather than using the receiver's name it could be it should be treated with caution I I have meils for my bank that calls my name not de customer why would you tell me de customer I registered in your bank you should know my name okay I'm using ass bank they should know my name okay both in my local bank and also for my International Bank is assess Bank okay so it should be Tre with caution as such emails asking to confirm their personal or financial information could be seen as efficient okay sming now smishing is a variation of fishing now the the major difference is that why for the fishing it makes of email the sming mieses of an sms okay text messages rather than emails to send the message rather than using an email to send the message they use a text message to send the message you you get a you get a text message from assess Bank okay or from any of your your local banks in your country okay asking you to reply or or not just reply there sending you a link that you have to click on the link because most time these images this textes do not reply so they send a link for you to click on the link and then you have to put in your personal information please don't the numbers of smiss attempts have increased since the introduction of smartphones so it is so easy to activate a link within a text message just as with fishing the main intention is to get the recipients to reveal their personal datas okay now there's a perception that among most people that smartphones are more SEC laptops or PCS this is that is not even a perception is every system is vulnerable okay with sming is a text me I sent to your smartphone which has increased the type of scan that many people have become vulnerable to because of their smartphones on their hands okay some Fosters are using text to get users to download an attachment which contain manual in turns can feed personal um data from their phone back to the froster a sming message is similar to fishing messages it also includes a fake website okay or it can just type the the recipients will simply type in their Bank details in order to reply to the text most time they tell you to reply to the text or to call a number they tell you oh you have won something call this number don't call if I won something why will I have to call a number do okay why I have to call a number why not call me tell me to come or come directly to me okay make a public announcement on TV where I can see it that I've actually won something why do that how can I win a 6 million and you cannot even be you cannot even have the Integrity of putting on a TV on a newspaper you want to give me 6 million how much okay I know I'm joking about but it's true you want to give me 6 million how much will it take you to put me on TV or to put my name on TV on newspapers oh it's expensive but you can give me 6 million and I have to send 1 million to you I'm taking this personal okay forgive me I don't want I'm taking this personal because yes the Y my mom and I was like and you know funny funny funny me I was celebrating with her we all celebrating thanks to my senior brother who was well matured to be able to say how did you even win it now in my time back then it was smishing not fishing yes it was sent as a text message okay back then there was no internet okay so it was internet was not popular then and sming is is been long way back it's not a new thing and we're celebrating and finally the celebration came to a h the moment they told us to sell 1 million okay how do you even know we have 1 million okay how do you know we have 1 million okay so you have to be care careful you have to be careful okay you have to be careful so please this is very very important okay now the message usually contains a link to an email address where they can send this message it can ask them to take Financial reward okay to take immediate action it can be a message to tell them that they entit Financial reward sometime it cont a phone number asking the recipient to phone the bank organization using that number I don't even do it with about this when they phone then they asked for their personal details why would you ask me for your for my person you know there was one time I got a call okay don't laugh don't laugh so I I got a call one time um an SMS or so they told me to call the number it was pretty much idess okay idess is bad mhm it's bad and they told me to call this number that I've want something so I called the number and like okay who is this I was introducing myself um the very very this is a result of Hess I was just okay I introducing myself they okay fine they're going to send an OTP a code they didn't know I knew is an OTP a code that they want to activate the transfer to my bank now they said I should call the code for them okay this was where I became very very spiritual okay I became very spiritual I bought I bought up my Bible and I open to John 3:16 for gospel of the word yeah I open it and so I was like okay J 3116 I said no it's all numbers I said fine it's all numbers okay I open to Matthew 26 verse 26 okay I was open so 26 26 they said it's wrong please I said fine no problem John 1335 1335 they said it's wrong I said I want to win this I really want to win this I was just messing around that day because trust me you know I called them I called they called me back so it was more or less their air time not mine so let's get the story straight so I had time to spare okay so please let's be careful okay there are plenties of methods of prevention plenties of method of prevention many digital security companies produce mobile protection software which users would have running on their smartphones users should also look out for all the same signs as in fishing attempt such as spelling and grammatical errors messages requiring immediate action or other Financial reward sign up now or or other pushy or something that that is too good to be true see if it's too good to be true it probably is they should never reply to such messages good practice is to open the sender website itself rather than replying to a text with a personal information included in it a sensible action is to check the sender's phone number against the phone number of the company what I do when I get such text messages now there call truecolor so true color.com although it's not really active on the iOS I go to tool.com and I put the number there and to my surprise you see that people have reported that to be what spam so please toiz worldwide so again if you if you have any suspicious numbers that you're not sure um what who the whose number it is you can go to tool.com and then type in the number there is going to review the name and then other other um other reviews concerning that number okay now again user should never type in personal or banking information other than when using an or organization official website receiver of a text should not click on links from sender they do not recognize they should not click on any Link in the text message since it is safer to type the URL into a browser okay they should not phone any number containing contained in the text message don't phone don't make any call okay please the next one is Vision the next one is vision okay I can close this now vision is a combination of the word voice and fishing yes combination of the words voice and what fishing as it name implies it is the practice of making a phone call in order to get someone to diorge their personal or banking details so you're making a phone call in order to get someone to divot the personal backing detail Vision can take um several forms for example a foster claiming to be from a bank phones a customer telling them that their bank account has been accessed by by a hacker they need to change their password they will help them to do this by giving the caller the account number and password they are now allowed the Foster to access their account so please even your bank will not even call you what's the what they can do they can invite you to the nearest Branch okay they're going to they're not going to do that I once watched a movie about a heist and vision was used even if the customer is not at home the Foster will leave a message requiring them to phone a particular number which is actually the Foster's number often often this phone number goes to an answered phone message asking the customer to leave the account number and other personal details an alternative is for the phone call to notify the receiver that they have won some money or that they have won a prize in both cases the Foster charge a handle or Redemption fee which they invite the person to pay bying their credit card over the phone sometime the firster we ask the customer to hang up and phone the bank to confirm in an effort to convince the customer that they can call that the call really is from the bank meanwhile the first has not disconnected the call so when the customer thinks they are phing the bank they actually still connected to the forer they talk to the customer to the proc of logging on the bank website and the customer then enters the details in order to transfer money to their new account when they set up by the bank I was watching a movie called um the Magnum PI and in one of the episode in season 5 it was a scene there where people scamming people in fact they have the whole setup and all they doing they using Vision platforms and um fishing platforms to just SC people when the police um oh High um police um um Department got a hold of them they were able to rec recover watch this $92 million people's life savings people's hardend money people have people um have committed suicide people have given up on their dreams these are money for their children tuition gone I wonder if they have conscience I wonder what gain do they have to F people of their money and put people in poverty this is a hardend money and that's why when the police people gets them arrested or they are being caught I have no mercy for them I have no mercy for them okay because it's bad it's bad reaping people stealing from people is bad okay there's no way to in any language in any sign is bad what is bad is bad okay so in order to avoid being a victim of vision it is a good practice to use another phone to call the bank and ask to speak with the person who just make the call the main thing is not to give out login informations over the phone as leg B will never ask for it we talked about this the same information for accounts information the basic thing for customer to remember is never give out personal information over the phone bank will never ask for your PIN or password why would they do that customers should hang up ignore them block their numbers these are all physical method but smartphone have softwares included that can perform the blocking of numbers okay if what I'm doing from next year is at the time this recording is to silent numbers that don't have their contact saved on my phone I'm sorry but I have to take drastic measures if I have your number phone um saved you can always call me on Whatsapp okay um you can t me up introduce yourself but on the normal call i s your number because I'm trying to ensure that I don't fall into victims and I'm also trying to ensure that every number that CES that that Rings my phone are numbers that I probably recognize yeah so you can use WhatsApp you can use Discord and you can use slack okay um to reach out to me I think these are these are the um official platforms that you can actually which all you can send me an a mail okay to to my email address right there on my YouTube channel okay so Banks would never ask for for that they would never do that okay so you can do all this okay um there are also variety of apps available which go beyond May blocking the call and keeping a file containing the block number for all phone owners using the app users can browse through the files to see which numbers are blocked one software solution is employed by large organizations where whereby the software can filter numbers according to likelihood that scams are being attempted this is true color for you true color can do that so any numbers that is well you know um has been deemed spammed okay will be on red and the call will not go through okay it's important that you should be able to evaluate the prevention method described above you need to be able to judge watch this the importance of each method and How likely it is to be successful okay as I've mentioned earlier there are very few effective method of preventing farming but method of preventing fishing can be very effective and the same can be said for vision and submission marrow marel is short for malicious software that's what marel is is a short form for what Mal software it's a general term for computer programs which have been created okay with the deliberate intention of causing damage or disruption or gaining access to a computer without the owner's what permission I'm going to say it again it is mar which is a shortterm for malicious software is a general term for computer programs which have been created with the liberate intention of causing damage or disruption or gaining access to a computer without the owner's permission and the types of marw well and we're going to cover all this okay um ranging from Treasure hes worms spyware hardwar rookies malicious boots um ransomware etc etc so let's talk about viruses virus is a a type of marrow that is designed to spread from one computer to another okay so it's a type of marel that is designed to spread from one computer to another usually by means of the internet causing changes in the way computer operates as it spreads okay so they have the ability for viruses they have the ability to replicate themsel just like real viruses some type of virus Del the data on the DI or just corrupt the corrupt the data change the data they can also inserts or attach thems okay to another computer program okay they look for a host sometime they often lie dant or inactive on a situation arises which will C cause the computer to execute its code the situation or event which can be it could be a particular time or date symptoms that can indicate um IND indicate a virus is present at the popup window suddenly start appearing frequently the user hom page is changed so that it's different to what is um normally displayed or their password is different prevented user to be able to log on versus can be can be can be large numbers of emails to be sent from what the user's email account the computer May frequently crash or the processing speed can be noticeably what slowed down so all these is viruses are signs of your system being infected with a virus tro horse a trojan horse is shorten to Trojan it's also a type of malicious computer program which is used to hack into a computer now it enables the person who created it to take control of the computer it has in infected the name to refer to an ancian Greek story in which a Greek Soldier laying Siege to the city of TR he inside a a wooden horse deceives the Trojan into thinking it was a peace offering when the toan took uh the toan took the horse inside the city the Greek Soldier LED them out and attacked leted themselves out and they got attacked here it is the user who is deceived into thinking they have downloaded a genuine software unlike computer viruses and worms toan gen do not attempt to infect other files or replicate themselves instead they are used for number of purposes the the main one is being able to gain access to a computer so that the controller can discover personal datas of the owner another purose delete files from the hard dis children can also be used to corrupt the data as well so you have to take note okay so um laye SE to City of 12 so um the is just to deceive you that's so it's a way to hack into your computer so they they just send a gen software like Facebook and the more you that Facebook another software is been downloaded to it okay and once you install that also software is also installing and before you know it they have taking hold of your laptop one one are similar to viruses okay in that they replicate whats a one will often exploit security holes in networks that's what one does they exploit security holes in network in order to spread throughout the network sometimes the many people seem to be continually what replicating in doing so occupy more and more disc space until disc is full and can no longer what function so you discovered that a hard drive that is 512 has 300 gig full and the files that you can be able to attest to just have 60 gig so what happens to the rest okay they do not attachs to other programs unlike the virus in that sense they are sent to be stand theone program they are designed to spread by sending many copies to other computers in the network this can result in slowing down the traffic in the network some ones do not even try to change the computers they are moving too but they designed to occupy more and more band R in their attempt to slow down a network when once you replicate themselves they start to use up the free space on a computer okay One symptom on a computer with a warm is that the Speed and Performance are reduced another is that the type or the amount of free story space on the computer is noticeably what reduced okay files go missing or new fil only appearing is another indication that a worm is present so take note of that spyware okay is also type of a malicious software that is designed to collect information about a computer user activ with that knowledge this um activities talks about web browsing habits email messages username and password credit card informations are passed to the hackers without user having an idea what is happening and one thing that is used is what we call a key loger a key loger is often used okay this is a type of spyware which works by collecting a record of user what key strokes and result in the hacker receiving information about the user credit cards and other sensitive or personal datas it does not replicate like a virus or warm but it's just there to spy on the computer the only real indent indication is that the user might notice that there's a spyware on the computer is a reduction of processing power and band since they are used by spy to communicate information back to what the hacker now the next one is Hardware when we talk about Hardware it's also a type of malicious software now the main purpose is to generate income for the originator or creator of the software it is normally downloaded with a free software without the user knowledge it automatically generates advertisement that's what ad does okay is to generate income for the Creator so once you download that software it's going to be sh before you do anything there's a lot of ads a lot of ads are generating okay so when the software is open the advertisement may appear in the interface used by the software it also keep tracks of the internet size that the user visits and matches the advertisement to the type of goods and services that user appears to be interested in it often cost requested advertisement to be displayed in the browser when the user accesses the internet okay alternatively the advertisement appears in popups CA is 30 mil away from you why will CIA be 30 mil away from you why why is be 30 miles CIA is close by why will CIA be close by what do you need CIA for okay these are hard words and okay you be naive you being curious you click on it you're generating income sometime it could be also fishing okay so you have to be careful that it doesn't or fing rather or fing rather it doesn't take you to a fake website so please you have to be careful CIA is not 30 m away from you your laptop is about to get in serious trouble if you click on C 30 mil away C is close by well good for you God is also close by yeah God also close by is God is is is with you okay so God is Not Just teiz God is nearby okay so please you have to be careful okay so it's also a way of generating incomes to the originator or creator of the software okay it also it can also keep track of your activities so you have to be careful okay it often causes unrequested to be displayed in your browser that can access the internet or natively they can be pop up like I said it's regarded as a more of a nuisance than dangerous it's not dangerous okay but is it's just popping up so I can generate a lot a lot of income for the of to create of of the software symptoms can be unnoticeable but the type of Hardware can slow down the perform of the computer why it is not dangerous it can have an effect it can slow down your laptop okay so please you have to you have to be very very careful okay and they can be tendency in recent times with the hardware to be in a spyware so you click on it it has some software installed on your laptop and you're not even aware of it okay and symptoms can be unnoticeable but some time of Hardware can slow down the performance of the computer and tend to be larger number than the usual popup rot kit let's talk about rot kit now RIT is a type of malicious software that is designed to install a set of tools this not in the a set of tools in a computer which allows the attacker to access to have remote access to that computer continuously it gives the attacker continuous privilege access to the computer and hi his presence deep within the operating system the user is completely unaware that the computer have been infected the different two enable the attacker to discover the user passwords credit card details the root in the root key is taken from the word using Unix and L system to signify the administrator account or somebody who has administrator what privileges it can be downloaded in a similar way of fishing by click on the link within an email or an or an haer could gain administrator privileges and instore it remotely the r kit can change security software your antiv to convin it that it's not there it's also capable of removing an software yes I have seen it so please you can use an software to scan it and it's not going to be there so you have to be careful malicious Boat Boat is sh for internet robot yes that's what it is and as this name suggests it performs tasks that are normally undertaken by humans when used to gather informations over the Internet both are referred to as web crawlers without them the smooth run of search engine for example will not be efficient so they are boots unfortunately there are malicious boots as well like a warm a malicious boat can replicate itself is designed to feed back to the server called the boat net because it is control of the network of infected computer the boet can now gather email addresses from them generate spam to those and other addresses they are capable of gathering informations about different websites such as your date of birth from one site health insurance from another site this is what so many hackers they make use of they use boat malicious boat and they have information to so many informations on the on your websites on your website you have gone that has personal details and you get a lot of money from them they are extremely difficult to detect on the computer because of the increased use of what the I the iot which is both Nets are becoming a grave concern because they can control networks which consist of what different what devices this is largely because some of the device in the iot are relatively easy to hack into a substable what um um spreading of what to B so you have to be careful right just like war is going to um replicate itself okay and it's going to feed back to the what to the server called the boot net of every information it has found on the laptop on websites Ransom we now this type of marwel right will block access to user data until ROM is p it takes all of your computer sends a message to your screen that you have to pay this certain amount of information else your information laptop will be completely deleted it's an alternative approach for the hackers to threaten to publish datas unless a ransom is paid probably they have seen maybe um private informations personal datas on your laptop and the user are somewhere to just tell you see if you don't pay I'm going to make it public especially if you're a public figure okay so one of the most common ways of downloading one where is again to the fishing emails the receiver will click on what appears to be a link to a trust a trusted file but once it opens the software which can take a form of a war Oran horse it takes control of the user computer among the many actions of software can perform once it has taken over the computer the most is to encrypt the user files so you don't have access to your computers access to your files and send a message demanding Ransom payment before it will decrypted back okay so we have other types of mar like U Fess marwel that does not rely on files and leave no evidence once it was executed okay now it does not perform any action which affects the computer hard drive it ceases to work once the system is what rebooted okay we also have the scare well which is the type of mware that will trick the computer into thinking that their computers have been infected with a virus right now it appears as a popup and seem to come from a genuine antivirus provider the user would pay the provider to download the antivirus and then discover that it is a scam so please let take note how is used there are numbers of ways Mar can be carried out that can car that can be used to car out illegal activities fraud yes it involves um the computer to take take or to alter electronic data or to gain unlawful use of a computer or system to illegally what benefit what financially scamming people on the internet that's Computer Fraud okay the different types of marware and generate misuse of personal data have been described we have the spyware that can be used um um to get your person to collect your personal datas browsing habit and keystroke okay um we have scell okay that tells you that oh your laptop is affected subscribe to ensure that it's removed and you subscribe and SC we have fishing visioning farming which is intended to divor your password run somewhere as well so take note of that industrial expage okay one exp is spy directed towards discovering the secret of a rival manufacturer industry what company people do it you want to get your rival's information so you can use it on them to trade secret it can be used it can be carried out by getting an employee to work for a rival company and spy from the inside is now more common carried out by hacking into database or what computer networks marware has become a Major Tool in IND industrial what cyber what expage okay with the purpose of stealing information in the form of company secret that people who work on who work with other companies and what they do what they do is to steal informations about the Rivers's company okay install softwares on them pretending that and then they resign and you wouldn't have know what have happened okay mware can be used to assess an employee computer and the computer information it holds so please you have to be very careful okay we talked about intellectual property te in the us alone which is estimated to cost company hundreds of billions of dollars per year certain certain countries have been head responsible for this activities but more private companies are now getting involved in this type of entrepreneur group of workers are offering their serves to hire for millions of dollars some are actually hacking into a computer secret and offering the information have gathered to the highest speeder okay sabotage the term compter sabotage refers to making deliberate attacks which are intended to cause computers or network to cease to function properly okay the idea is that businesses okay or education establishment or otherization are attacked in order to um in order to ensure that their normal operations are disrupted this is also happening in the US and they have lost a lot of billions of dollars to computer sabotage okay and so and this has happened with a great deal of in the hospitals um the networks are being um tampered with and you have to spend a lot of money to ensure that this is done okay so please just take note of that consequences for organizations and individuals marwel poses a major threat to any organization yes it can Ru the organization secret Arrangement regarding his computer network as a result it can distur his business operation leading to financial losses personal informations can be accessed leading to Identity te okay um some organization particularly banks have to pay out a great deal of money in the form of composition where personal details has been stolen the three main implication of malth organizations are the loss of data the time and the cost it in chaos so please just take note of that if a virus has infected one's computer right here on the network each computer has to be disconnected from the network and cleans by an antivirus software to remove the viruses each computer must be clean of viruses before being reconnected to the network please this is very very important prevention of marel how do we prevent marel we talked about antiviruses must ensure all data is scanned for malicious code as the enter the computer network okay now a firewall which filters incoming traffic and prevents malicious software entry the system okay now should be used on all external entry points to the network so Firs are what the fter incoming and outgoing what traffic antiviruses um these are the preventions so filter is one two antiviruses software must be kept up to date running at all times which can scan schedule you can schedule it maybe three times to run on frequent intervals okay only one and Dev program should be run at a time as two different program May conflict with each other so you have to take not of that anti softwares can be used it may be different to antiviral software although these days the difference are becoming blured anti software can protect Network computers in two ways it can guard against the entry marware into a network it can also remove Mar that have managed to get into the computer's what network system fiscal method of prevention what are the fiscal method of prevention companies are advised to develop and Implement anti-ar policies and ensure that they are consistently applied across the organizations a record should be kept of any known malal website which should be blocked by the firewall from assessing the network dedicated standing loan um virus checking computers should be equipped with and the softwares okay which should be provided okay we should be able to run any type of what scan all employees should be educated so that they understand the risk for malware and aware of the day-to-day procedures they should follow to prevent malware infection they should be encourage to stop and think before clicking on links don't just click on any link you see you can't send me on any link and I'm going to click on on it no but if they do they should inform the IT department as soon as possible they should know that they may not connect they may not connect any removable Medias or personal own device to the network they need to be aware so they can report any spange or unexpected what system Behavior to a technician or member of the it what department okay finally good advice to both organizations and individuals is that operating systems and browser softwares should be kept up to dat software that is no longer used or old versions of application software should be removed if a software is no longer supported by the software company then it should be open to MW what then it should be open to Mar what attacks any soft no supported by the software company is open that I talked about Windows 7 okay it the update has been totally discontinued no update on it email should be read with suspicion since encouraging the user to download Mar only works if the user is not paying sufficient attention to the um to who sent the email and it might be suggesting in fishing section the things to look out for will descried in details grammar spellings of grammars um the cender address okay the two address of the link and so on finally strong password should be used that is one that is unique a strong password okay um it should be changed often and it should not be related to any form of personal information please website should have appropriate padlocks next to URL I've shown you right here in this in this class and users should always log off from their computers at the end of the section students don't do this um I'm going to tell you a story before I go one of my students um back then um used a public laptop to access a financial account and forgot to log off if fact I've seen a story where somebody use a friend's phone to access a financial to assess Financial records or to carry out a financial transaction and forgot to log off you cannot trust people with these things please always log off from even your own computers after the end of the session thank you very much bye-bye I want to talk about a very important YouTube channel called H Tech trust me this YouTube channel is is a giveaway it's loaded with igcc ICT O level as and a level so trust me you is a giveaway this is this channel is helpful for your um group studies your personal studies and it it has a proven track record of producing excellent result so do me a favor click on the Subscribe button okay and share this YouTube channel with your friend trust me that will be the best gifts that you are given to them thank you very much and I'll see you in my next video bye-bye