0% found this document useful (0 votes)
10 views4 pages

Module 4 It

Uploaded by

busganonicole554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

Module 4 It

Uploaded by

busganonicole554
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

MODULE 4 firewall and keep antivirus software on your

Malware (malicious software)- program or computer up to date, as we describe below.


code that is designated to infiltrate a system (You might also consider switching to
and execute malicious operation and Mozilla Firefox from Internet Explorer as
controls your browser.)
Denial of Service Attacks- consist of • Through infiltrated Wi-Fi hot spots: As
making repeated requests of a computer. mentioned earlier, if you’re a user of Wi-Fi
Worms- Program that copies itself wireless
repeatedly into a computer’s memory or Some tips for minimizing the chances of
onto a disk drive. infecting your computer are as follows:
Viruses- deviant programs, stored on a • Don’t open, download, or execute any
computer floppy disk, hard drive, or CD, files, email messages, or email attachments
that can cause unexpected and often if the source is unknown or if the subject
undesirable effects, such as destroying or line of an email is questionable or
corrupting data. unexpected.
The famous email love bug- Subject line • Delete all spam and email messages from
was I LOVE YOU strangers. Don’t open, forward, or reply to
Originated- in the Philippines, May 2000 such messages.
$10 billion in damage worldwide. • Back up your data files regularly, and keep
Trojan Horses- program that pretends to be the backup hard drive (external) or whatever
a useful program, usually free in a location separate from your computer).
Worms, viruses, and Trojan horses are Then if a virus (or a fire) destroys your work
passed in the following ways: files, your data won’t be totally devastated.
• By infected floppies or CDs: The first • Make sure you have virus protection
way is via an infected floppy disk or CD, software, such as McAfee VirusScan
perhaps from a friend or a repair person. (www.mcafee.com) or Norton Antivirus
• By opening unknown email attachments: activated on your machine. You can
The second way is from an email download it from these companies; then
attachment. This is why a basic rule of using follow the installation instructions.
the internet is: Never click on an email • Buying a new computer with antivirus
attachment that comes from someone you software on it does not mean you are
don’t know. This advice also applies to automatically protected. The software could
unknown downloaded files, as for free video be six months old and not cover new
games or screensavers. viruses. You have to register it with the
• By clicking on infiltrated websites: Some designer company, and you need to receive
crackers “seed” web pages with contagious antivirus updates.
malware that enables them to steal personal
data, so that by simply clicking on a website • Scan your entire system with antivirus
you can unwittingly compromise your PC. software the first time it’s installed; then
The risk can be minimized if you have a scan it regularly after that. Often the
Cyber Intruders Refusal to acknowledge
evidence: Even when presented with hard,
software can be set to scan each time the cold facts, they
computer is rebooted or on a periodic
schedule. Also scan any new drives and the ignore this and pretend like they never saw
like before using them. it.
• Update your antivirus software regularly. Dismissive, condescending tone: An early
There are virus and security alerts almost indicator of a troll was that they would ask
every day. Most antivirus software is an angry responder.
automatically linked to the internet and will Use of unrelated images or memes: They
add updated antivirus code to your system reply to others with memes, images, and
whenever the software vendor discovers a gifs.
new threat. Seeming obliviousness: They seem
• If you discover you have a virus, you can oblivious that most people are in
ask McAfee or Norton to scan your disagreement with them.
computer online. Then follow the company’s II.
directions for cleaning or deleting it. Cyber spies
Internet Trolls- someone who makes Cyber espionage, or cyber spying, is a type
intentionally inflammatory, rude, or of cyberattack in which an unauthorized user
upsetting statements attempts to access sensitive or classified data
Anonymous online forums: Places like or intellectual property (IP) for economic
Reddit, 4chan, and other anonymous gain, competitive advantage or political
message boards are prime real-estate for reasons.
online trolls. Cyber Espionage Targets- The most
X (formerly Twitter): X also has the option common targets of cyber espionage include
to be anonymous, and has become a hotbed large corporations, government agencies,
for internet trolls.. academic institutions, think tanks or other
Comment sections: The comment sections organizations that possess valuable IP
of places such as YouTube and news and technical data that can create a
websites are also popular areas for trolls to competitive advantage for another
feed. organization or government. Targeted
Signs Someone Is Trolling- become campaigns can also be waged against
difficult to tell the difference between a troll individuals, such as prominent
and someone who just genuinely wants to political leaders and government officials,
argue about a topic. business executives and even celebrities
Off-topic remarks: Completely going Hackers- computer enthusiasts, people who
off-topic from the subject at hand. This is enjoy learning programming languages and
done to annoy and disrupt other posters. computer systems
Thrill-seeker hackers- hackers who
illegally access computer systems
White-hat hackers: White-hat hackers are unauthorized intrusion.
usually computer professionals who break
into computer systems and networks with
the knowledge of their owners

Cyberthieves and cybercriminals- are Password- is the special words, codes, or


widely available in what is called the “Dark symbols required to access a computer
Web” where they mostly provide their system.
illegal services or products. Biometric Authentication
Types of Cyber Theft A hacker or cracker can easily breach a
Phishing and Scam- is a type of social computer system with a guessed or stolen
engineering attack that targets the user and password.
tricks them by sending fake messages and Biometric authentication- devices
emails authenticate a person’s identity by
Identity Theft- occurs when a comparing his or her physical or behavioral
cybercriminal uses another person’s personal characteristics with digital code stored in a
data like credit card numbers or personal computer system.
pictures without their permission to commit
a fraud or a crime. There are several kinds of devices for
Ransomware Attack- has the capability to verifying physical or behavioral
prevent users from accessing all of their characteristics that can be
personal data on the system by encrypting used to authenticate a person’s identity.
them and then asking for a ransom • Hand-geometry systems: Also known as
Hacking/Misusing Computer Networks- full-hand palm scanners, these are devices to
crime of unauthorized access to private verify a person’s identity by scanning the
computers or networks and misuse of it entire hand,
either by shutting it down or tampering with • Fingerprint scanners: These range from
the data stored or other illegal approaches. optical readers, in which you place a finger
Internet Fraud- type of cybercrimes that over a window,
makes use of the internet and it can be • Iris-recognition systems: Because no two
considered a general term that groups all of people’s eyes are alike, iris scans are very
the crimes that happen over the internet like reliable identifiers.
spam, banking frauds,theft of service, etc. • Face-recognition systems:
Antivirus software- scans a computer’s Facial-recognition systems may come to
hard disk, CDs, and main memory to detect play an important role in
viruses and, sometimes, to destroy them. biometric photos embedded in U.S.
firewall- is a system of hardware and/or • Voice-recognition systems: These systems
software that protects a cable modem, compare a person’s voice with digitized
satellite, and DSL, as well as some wireless voice prints stored in a computer, which the
devices, are particularly susceptible to
individual has previously “trained” to
recognize his or her speech patterns

Encryption- is the process of altering


readable data into unreadable form to
prevent unauthorized
access.
Encryption is able to use powerful
mathematical concepts to create coded
messages that are difficult or even virtually
impossible to break.There are two basic
forms of encryption— private key and
public key:
• Private key: Private-key (symmetric)
encryption means that the same secret key is
used by both sender and receiver to encrypt
and decrypt a message.
• Public key: Public-key encryption means
that two keys are used—a
public key- which the receiver has made
known beforehand to the sender, who uses it
to encrypt the message, and a
Private key- which only the receiver knows
and which is required to decrypt the
message.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy