Emptech 2: internet security Flashcards
It refers to the online security or safety of people and their information when using the internet
internet security
It describes security for activities and transactions made over the internet. It’s a particular component of the larger ideas of cybersecurity and computer security, involving topics including browser security, online behavior and network security
Internet security
a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
computer virus
When this replication succeeds, the affected areas are then said to be _____ with a computer virus.
infected
the name that is given to any type of software that could harm a computer system, interfere with and gather a user’s data, or make the computer perform actions without the owner’s knowledge or permission
malware
malware is aka
malicious software
malicious advertising is aka
malvertising
a piece of malicious code that inserts itself into computer systems, self-replicates, and spreads to other systems and devices.
virus
Once launched, a computer virus attempts
encrypt, distort, steal data and conduct more malware attacts
data of published of iloveyou virus
may 2000
person who created ily virus
onel de guzman
As it spreads, a ____ consumes bandwidth, overloading infected systems and making them unreliable or unavailable
worm
As it spreads, a worm consumes _____ overloading infected systems and making them unreliable or unavailable
bandwidth
it can change and delete files or introduce other malware.
worm
worm can be send through (fem)
flash drives, email, or message attachments.
Once a _____ infiltrates the system, it grants the attacker unauthorized control over devices or spreads malware without the user’s knowledge.
trojan
This includes stealing sensitive information, modifying files, taking control of the system, or creating backdoors for remote access.
trojan
trojan are typically distributed through
SOCIAL ENGINEERING TECHNIQUES :
email, phishing, fake software update, compromised website
adware is a type of
grayware
ransomware is a time-sensitive cyberattackwhen a hacker _____ user files or devices and holds them for ransom until a certain deadline. Even after the victim proceeds to pay the release payment, they have no guarantee that their files or devices will be _____.
encrypts, descrypted
ransomware can be initiated through (mecm)
malicious files, exploit kits, compromised websites, malware-infected downloads/links
spyware is designed to gather
sensitive data (passwords, financial details, personal infos, browsing habits)
2 answers:
This type of malware is often used as a first stage of a _____ for a hacker to explore the system
spyware, data breach
spam are aka
email spam, junk email
Spam can be sent by real humans, but more often, it is sent by a
botnet
single attacking party
bot herder
Apart from email, spam can also be distributed
text messages, socmed
cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
phishing
phishing can result in
identity theft, financial loss
ways to protect ur computer from viruses
1-2-3-a-b-a-b
THINK
is it True
is it Helpful
is it Inspiring
is it Necessary
is it Kind
netiquette rules was made by ___ entitled _____
Virginia Shea’s Core Rules of Netiquette
Golden Rule
do unto others as you would have others do unto you
When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit,” ask yourself, “Would I be okay with this if someone else had written it?”
remember the human
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit “cyberspace.” Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
adhere to the same standards of behavior online that u follow in rl
Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?
knownwhete u are in cyberspace
Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn’t wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.
respect other people’s time and bandwidth
One of the virtual world’s best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit
make urself good online
tips to look good online
- always check for spelling and grammar errors
- knwo what urm’re talking abt,and state it clearly
- be pleasant and polite.
one of the reasons why internet was found
information sharing
rule no.6
Share expert knowledge
When this replication succeeds, the affected areas are then said to be “____” with a computer virus.
infected
“flame wars,” when two or three people exchange angry posts between one another, must be controlled, or the ________ of the group could be compromised
camaraderie