Staying Safe on the Internet.

Staying safe on the internet requires a combination of personal responsibility, awareness of online threats, and proactive use of security measures to protect information and avoid potential harm.

Why did I Choose This Experiment?

I chose this experiment because there are many people that don't understand how the internet works. Therefore, they get viruses and get hacked, the purpose of this project is to educate people on internet safety.

What is The Science Experiment?

My science experiment was about getting data of of an air-gapped computer, and how even a computer that isn't connected to the internet isn't completely safe.

What Have I Learned During This Project?

Personally, doing this experiment taught me what malware even is. Before any of this I had no idea that malware was a thing. This experiment also taught me about all the different types of viruses and scams.

How Does This project Benefit the Community?

This project can inform people about the dangers of viruses and hackers on the internet, while educating them on how to stay safe for an enjoyable time on the internet.

What is Malware?

Malware, short for malicious software, is any program or code intentionally created to damage, disrupt, or exploit computers, networks, or devices. Cybercriminals use malware to steal senistive informations, spy on users, hijack system functions, or extort money from victims. It can affect personal computers, mobile devices, servers, and enterprise networks, posing risks to both individuals and organizations.

How do computers work?

Computers send information using binary code, a series of ones and zeros. Normally, whenever you download a song, view a website, or send an email, these ones and zeros are sent as electronic signals through a wire like an ethernet cable, or as electromagnetic waves through a connection like Wi-Fi or bluetooth. An air-gapped computer physically lacks the means to send signals over a wired or wireless connection. However, even without an internet connection, computers still transmit signals into the world around them. They makes noise, they blink, they vibrate, and they get hot. Light, sound, vibration, and heat are all physical quantities that we can use to send information.

For example, imagine clicking a flashlight on and off to send binary code "on" for one, and "off" for zero. We can observe these physical quantities with our own senses like sight, sound, and touch; and we can also measure them with electronic sensors. Examples include:

  • A thermometer measures temperature
  • A photosensor measures light
  • A microphone measures sound
  • An accelerometer measures vibration
a picture of a computer monitor with a red screen and a skull in the middle

Air-Gapped

Sometimes companies and governments have extremely sensitive information or computers that control very important equipment. They do not want to risk those computers being hacked, so the computers are air-gapped, they are not physically connected to the rest of the internet through a router or modem via either a hardwired or wireless connection. These routers/modems are connected to servers, which are connected to other servers indirectly connecting millions of computers all around the world. An air-gapped computer is physically separated with no hardwired or wireless connection to the rest of the internet. It may still be part of an air-gapped network, and connected to other computers on a private network, but not the rest of the internet.

Social Engineering

Tricks people into inserting removable media into the computer. This is a way to physically transport data to the computer without an internet connection, and was used to spread the Stuxnet virus in Iran. That might be a good way on to a computer, but how do you get data off the computer?

Hacking

People get hacked primarily due to human error, weak security practices, and hackers exploiting vulnerabilities for financial, political, or personal gain.

  • Human Error and Social Engineering: Many hacks occur because attackers exploit human behavior rather than technical flaws. Common tactics include phishing, where hackers impersonate trusted organizations to steal login credentials, and social engneering, which manipulates trust, urgency, or habit to gain sensitive information. People often unknowningly open malicious emails, click on unsafe links, or reuse passwords across multiple accounts, making it easier for hackers to gain access to their data.
  • Weak Passwords and Poor Security Practices: Using weak or reused passwords is a major vulnerability. When a minor website is breached, attackers can use stolen credentials to access other accounts through credentials stuffing. Outdated software, unpatched systems, and unsecured public Wi-Fi networks also increase the risk of hacking.

Hacker Motivations

Hackers are motivated by various factors:

  • Monetary Gain: Stealing financial information, selling data on the dark web, or demanding ransom through ransomware attacks.
  • Information Theft: Accessing sensitive personal, corporate, or government data for espionage or competitive advantage
  • Disruption or Activism: Hacktivists may target organizations to promote political, social, or moral agendas.
  • Curiosity or Challenge: Some hackers are driven by the desire to test their skills or explore vulnerabilities.

Common Methods of Hacking

  • Phishing and Spam Emails: Attackers send convicing messages to trick users into revealing credentials or downloading malware.
  • Ransomware: Hackers encrypt files or systems and demand payment to restore access.

References

Here is a link to one of the websites I used to get information for this website.

This is another link to a website I used.

This is the final website I used for information.

Video