MODULE 2

Cards (24)

  • MALWARE is activated when user clicks on malicious links that leads to installing dangerous software
  • Virus is a malicious program designed
    to replicate itself and transfer from one
    computer to another either through the
    internet and local networks or data
    storage like flash drives and CDs
  • Worm is a malicious program that
    transfers from one computer to
    another by any type of means. Often,
    it uses a computer network to spread
    itself. For example, the ILOVEYOU
    worn (Love Bug Worm) created
  • Trojan is a malicious program that
    is disguised as a useful program
    but once downloaded or installed,
    leaves your PC unprotected and
    allows hackers to get your
    information
  • Spyware is a program that runs in
    the background without you
    knowing it (thus called “spy”). It has
    the ability to monitor what you are
    currently doing and typing through
    keylogging
  • Ransomware is a type of malware that encrypts files on an infected device and demands payment in exchange for decryption.
  • Adware is a form of spyware that displays unwanted advertisements on your screen.
  • Emotet is the Cybersecurity and Infrastructure
    Security Agency (CISA) describes Emotet as
    “an advanced, modular banking Trojan that
    primarily functions as a downloader or dropper
    of other banking Trojans. Emotet continues to
    be among the most costly and destructive
    malware.”
  • Netiquette, or network etiquette, is
    concerned with the "proper" way to
    communicate in an online environment.
  • DENIAL OF SERVICE floods a computer or network so it can’t respond to requests. according to Jeff Melnick of Netwrix, BOTNETS(Zombie Systems) target and overwhelm processing capabilities
  • MAN IN THE MIDDLE hackers insert themselves into a two-party transaction which usually occurs in unsecured network(public)
  • PHISHING use fake communication, such as an email, to trick the receiver carrying out the instructions inside (Ex.card info)
  • SQL INJECTION “Structured Query Language” that results from inserting malicious code into a server that uses SQL.
  • PASSWORD ATTACKS “Social Engineering”-relies heavily on human interaction by tricking people into breaking standard security
  • ADHERE TO THE SAME STANDARDS OF BEHAVIOR THAT YOU FOLLOW IN REAL LIFE Act within the laws and ethical manners of society whenever you inhabit "cyberspace."
  • REMEMBER THE HUMAN Do unto others as you would have others do unto you.
  • KNOW WHERE YOU ARE IN CYBERSPACE "Netiquette varies from domain to domain." (Shea, 1994)
  • RESPECT OTHER PEOPLE’STIME AND BANDWIDTH make sure that the time spent reading your words isn't wasted. Make your written communication meaningful
  • MAKE YOURSELF LOOK GOOD ONLINE You are judged based on the quality of your writing (spelling, grammar)
  • SHARE EXPERT KNOWLEDGE Information can be shared or accessed easily
  • HELP KEEP FLAME WARS UNDER CONTROL "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994); Two or three people exchange angry posts between one another, must be controlled
  • RESPECT OTHER PEOPLE’S PRIVACY Just as you expect others to respect your privacy, so should you respect the privacy of others.
  • DON’T ABUSE YOUR POWER knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone.
  • BE FORGIVING OF OTHERS MISTAKE Practice kindness and forgiveness as you would hope someone would