Chapter 2 Flashcards
It is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
Cybersecurity
Internet threats
malware
spam
phishing
– stands for malicious software
Malware
– a malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives and CDs
a. Virus
– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.
b. Worm
– a malicious program that is disguised as a useful program but once download or installed, leaves your PC unprotected and allows hackers to get your information.
c. Trojan
– a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging.
d. Spyware
– a program designed to send you advertisements, mostly a pop-ups.
e. Adware
unwanted email mostly from bots or advertisers. It can be used to send malware.
- SPAM –
– Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and asked to update his/her username, password, credit card or personal information.
- Phishing
a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
*Pharming –
- It refers to the online security or safety of people and their information when using internet.
Internet Safety
- Is network etiquette, the do’s and don’ts of online communication.
Netiquette
- treat others as you would like to be treated.
The Golden Rule
is a personal insult communicated through internet.
No Flaming
- people may misinterpret it.
Dont type in all caps
it is any unsolicited email from unknown sources.
dont spam
don’t steal someone else’s idea, property, and rights.
obey copyright laws
errors diminish the credibility of the message
use proper grammar and spelling
- tell the truth
- do not pretend to be someone else.
be honest
these are sites with Transport Layer Security (TLS) or Socket Layer Security.
shop secure sites