MALWARE is activated when user clicks on malicious links that leads to installing dangerous software
Virus is a malicious program designed
to replicate itself and transfer from one
computer to another either through the
internet and local networks or data
storage like flash drives and CDs
Worm is a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself. For example, the ILOVEYOU
worn (Love Bug Worm) created
Trojan is a malicious program that
is disguised as a useful program
but once downloaded or installed,
leaves your PC unprotected and
allows hackers to get your
information
Spyware is a program that runs in
the background without you
knowing it (thus called “spy”). It has
the ability to monitor what you are
currently doing and typing through
keylogging
Ransomware is a type of malware that encrypts files on an infected device and demands payment in exchange for decryption.
Adware is a form of spyware that displays unwanted advertisements on your screen.
Emotet is the Cybersecurity and Infrastructure
Security Agency (CISA) describes Emotet as
“an advanced, modular banking Trojan that
primarily functions as a downloader or dropper
of other banking Trojans. Emotet continues to
be among the most costly and destructive
malware.”
Netiquette, or network etiquette, is
concerned with the "proper" way to
communicate in an online environment.
DENIAL OF SERVICE floods a computer or network so it can’t respond to requests. according to Jeff Melnick of Netwrix, BOTNETS(Zombie Systems) target and overwhelm processing capabilities
MAN IN THE MIDDLE hackers insert themselves into a two-party transaction which usually occurs in unsecured network(public)
PHISHING use fake communication, such as an email, to trick the receiver carrying out the instructions inside (Ex.card info)
SQL INJECTION “Structured Query Language” that results from inserting malicious code into a server that uses SQL.
PASSWORD ATTACKS “Social Engineering”-relies heavily on human interaction by tricking people into breaking standard security
ADHERE TO THE SAME STANDARDS OF BEHAVIOR THAT YOU FOLLOW IN REAL LIFE Act within the laws and ethical manners of society whenever you inhabit "cyberspace."
REMEMBER THE HUMAN Do unto others as you would have others do unto you.
KNOW WHERE YOU ARE IN CYBERSPACE "Netiquette varies from domain to domain." (Shea, 1994)
RESPECT OTHER PEOPLE’STIME AND BANDWIDTH make sure that the time spent reading your words isn't wasted. Make your written communication meaningful
MAKE YOURSELF LOOK GOOD ONLINE You are judged based on the quality of your writing (spelling, grammar)
SHARE EXPERT KNOWLEDGE Information can be shared or accessed easily
HELP KEEP FLAME WARS UNDER CONTROL "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994); Two or three people exchange angry posts between one another, must be controlled
RESPECT OTHER PEOPLE’S PRIVACY Just as you expect others to respect your privacy, so should you respect the privacy of others.
DON’T ABUSE YOUR POWER knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone.
BE FORGIVING OF OTHERS MISTAKE Practice kindness and forgiveness as you would hope someone would