Computer Security Technologies

Cards (15)

  • Cyber world
    Also known as cyberspace, typically refers to the virtual environment or digital space that exists within computers and networks. It encompasses all aspects of the internet, digital communication, virtual reality, and other interconnected systems.
  • Cybersecurity threats
    Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
  • Types of Cybersecurity Threats
    • Worms
    • Viruses
    • Trojans
    • Phishing
    • Smishing
    • Keyloggers
    • Adware
    • Baiting
  • Worms
    • Malware that exploits software vulnerabilities and backdoors to gain access to an operating system
  • Viruses
    • A piece of code that injects itself into an application. When the application runs, the malicious code executes
  • Trojans
    • Malicious code or software that poses as an innocent program, hiding in apps, games or email attachments. An unsuspecting user downloads the trojan, allowing it to gain control of their device
  • Phishing
    • The attacker sends emails pretending to come from a trusted source. Phishing often involves sending fraudulent emails to as many users as possible but can also be more targeted
  • Smishing
    • SMS phishing - the attacker uses text messages as the means of deceiving the victim
  • Keyloggers
    • Record a user's keyboard operations. The majority of keyloggers will hunt for easily identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to keylogging
  • Adware
    • A type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups. In some cases, adware can even track your online behavior and display personalized ads
  • Baiting
    • The attacker lures a user into a social engineering trap, usually with a promise of something attractive like a gift card. The victim provides sensitive information such as credentials to the attacker
  • Cyber safety

    • Don't add or meet online friends without a parent's permission
    • Don't post anything you wouldn't want teachers, family, and future employers to see
    • Tell someone if you think cyber bullying is happening to you or other people
    • Always be kind and respectful to others
    • Tell a parent what you are doing online. Ask a trusted adult if you need help or are unsure of any online activity
    • Keep your personal information private! DO NOT share your name, location, phone number or birthday
    • Do not believe everything you read online. There is a lot of incorrect information on the internet
    • Only create accounts with trusted sites. Make sure to use strong passwords. Don't share your passwords with others
    • Balance your screen time. Make sure you go outside for a walk, read a book and talk face to face with others
  • Netiquette
    Proper behavior in cyberspace
  • Netiquette rules
    • Remember the human
    • Adhere to the same standards of behavior online that you follow in real life
    • Know where you are in cyberspace
    • Respect other people's time and bandwidth
    • Make yourself look good online
    • Share expert knowledge
    • Help keep flame wars under control
    • Respect other people's privacy
    • Don't abuse your power
    • Be forgiving of other people's mistakes
  • A classmate shares a photo of you online without your permission. What should you do?