We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
MODULE 4 firewall and keep antivirus software on your
Malware (malicious software)- program or computer up to date, as we describe below.
code that is designated to infiltrate a system (You might also consider switching to and execute malicious operation and Mozilla Firefox from Internet Explorer as controls your browser.) Denial of Service Attacks- consist of • Through infiltrated Wi-Fi hot spots: As making repeated requests of a computer. mentioned earlier, if you’re a user of Wi-Fi Worms- Program that copies itself wireless repeatedly into a computer’s memory or Some tips for minimizing the chances of onto a disk drive. infecting your computer are as follows: Viruses- deviant programs, stored on a • Don’t open, download, or execute any computer floppy disk, hard drive, or CD, files, email messages, or email attachments that can cause unexpected and often if the source is unknown or if the subject undesirable effects, such as destroying or line of an email is questionable or corrupting data. unexpected. The famous email love bug- Subject line • Delete all spam and email messages from was I LOVE YOU strangers. Don’t open, forward, or reply to Originated- in the Philippines, May 2000 such messages. $10 billion in damage worldwide. • Back up your data files regularly, and keep Trojan Horses- program that pretends to be the backup hard drive (external) or whatever a useful program, usually free in a location separate from your computer). Worms, viruses, and Trojan horses are Then if a virus (or a fire) destroys your work passed in the following ways: files, your data won’t be totally devastated. • By infected floppies or CDs: The first • Make sure you have virus protection way is via an infected floppy disk or CD, software, such as McAfee VirusScan perhaps from a friend or a repair person. (www.mcafee.com) or Norton Antivirus • By opening unknown email attachments: activated on your machine. You can The second way is from an email download it from these companies; then attachment. This is why a basic rule of using follow the installation instructions. the internet is: Never click on an email • Buying a new computer with antivirus attachment that comes from someone you software on it does not mean you are don’t know. This advice also applies to automatically protected. The software could unknown downloaded files, as for free video be six months old and not cover new games or screensavers. viruses. You have to register it with the • By clicking on infiltrated websites: Some designer company, and you need to receive crackers “seed” web pages with contagious antivirus updates. malware that enables them to steal personal data, so that by simply clicking on a website • Scan your entire system with antivirus you can unwittingly compromise your PC. software the first time it’s installed; then The risk can be minimized if you have a scan it regularly after that. Often the Cyber Intruders Refusal to acknowledge evidence: Even when presented with hard, software can be set to scan each time the cold facts, they computer is rebooted or on a periodic schedule. Also scan any new drives and the ignore this and pretend like they never saw like before using them. it. • Update your antivirus software regularly. Dismissive, condescending tone: An early There are virus and security alerts almost indicator of a troll was that they would ask every day. Most antivirus software is an angry responder. automatically linked to the internet and will Use of unrelated images or memes: They add updated antivirus code to your system reply to others with memes, images, and whenever the software vendor discovers a gifs. new threat. Seeming obliviousness: They seem • If you discover you have a virus, you can oblivious that most people are in ask McAfee or Norton to scan your disagreement with them. computer online. Then follow the company’s II. directions for cleaning or deleting it. Cyber spies Internet Trolls- someone who makes Cyber espionage, or cyber spying, is a type intentionally inflammatory, rude, or of cyberattack in which an unauthorized user upsetting statements attempts to access sensitive or classified data Anonymous online forums: Places like or intellectual property (IP) for economic Reddit, 4chan, and other anonymous gain, competitive advantage or political message boards are prime real-estate for reasons. online trolls. Cyber Espionage Targets- The most X (formerly Twitter): X also has the option common targets of cyber espionage include to be anonymous, and has become a hotbed large corporations, government agencies, for internet trolls.. academic institutions, think tanks or other Comment sections: The comment sections organizations that possess valuable IP of places such as YouTube and news and technical data that can create a websites are also popular areas for trolls to competitive advantage for another feed. organization or government. Targeted Signs Someone Is Trolling- become campaigns can also be waged against difficult to tell the difference between a troll individuals, such as prominent and someone who just genuinely wants to political leaders and government officials, argue about a topic. business executives and even celebrities Off-topic remarks: Completely going Hackers- computer enthusiasts, people who off-topic from the subject at hand. This is enjoy learning programming languages and done to annoy and disrupt other posters. computer systems Thrill-seeker hackers- hackers who illegally access computer systems White-hat hackers: White-hat hackers are unauthorized intrusion. usually computer professionals who break into computer systems and networks with the knowledge of their owners
Cyberthieves and cybercriminals- are Password- is the special words, codes, or
widely available in what is called the “Dark symbols required to access a computer Web” where they mostly provide their system. illegal services or products. Biometric Authentication Types of Cyber Theft A hacker or cracker can easily breach a Phishing and Scam- is a type of social computer system with a guessed or stolen engineering attack that targets the user and password. tricks them by sending fake messages and Biometric authentication- devices emails authenticate a person’s identity by Identity Theft- occurs when a comparing his or her physical or behavioral cybercriminal uses another person’s personal characteristics with digital code stored in a data like credit card numbers or personal computer system. pictures without their permission to commit a fraud or a crime. There are several kinds of devices for Ransomware Attack- has the capability to verifying physical or behavioral prevent users from accessing all of their characteristics that can be personal data on the system by encrypting used to authenticate a person’s identity. them and then asking for a ransom • Hand-geometry systems: Also known as Hacking/Misusing Computer Networks- full-hand palm scanners, these are devices to crime of unauthorized access to private verify a person’s identity by scanning the computers or networks and misuse of it entire hand, either by shutting it down or tampering with • Fingerprint scanners: These range from the data stored or other illegal approaches. optical readers, in which you place a finger Internet Fraud- type of cybercrimes that over a window, makes use of the internet and it can be • Iris-recognition systems: Because no two considered a general term that groups all of people’s eyes are alike, iris scans are very the crimes that happen over the internet like reliable identifiers. spam, banking frauds,theft of service, etc. • Face-recognition systems: Antivirus software- scans a computer’s Facial-recognition systems may come to hard disk, CDs, and main memory to detect play an important role in viruses and, sometimes, to destroy them. biometric photos embedded in U.S. firewall- is a system of hardware and/or • Voice-recognition systems: These systems software that protects a cable modem, compare a person’s voice with digitized satellite, and DSL, as well as some wireless voice prints stored in a computer, which the devices, are particularly susceptible to individual has previously “trained” to recognize his or her speech patterns
Encryption- is the process of altering
readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even virtually impossible to break.There are two basic forms of encryption— private key and public key: • Private key: Private-key (symmetric) encryption means that the same secret key is used by both sender and receiver to encrypt and decrypt a message. • Public key: Public-key encryption means that two keys are used—a public key- which the receiver has made known beforehand to the sender, who uses it to encrypt the message, and a Private key- which only the receiver knows and which is required to decrypt the message.