Lesson 2 Flashcards
(35 cards)
Core Rules of Netiquette
- Remember the Human
- Adhere to the Same Standard behaviour online that you follow in real like.
- Know where you are in Cyberspace
- Respect other people’s tome and bandwidth
- Make yourself look good online
- Share expert knowledge
- Help keep flame wars under control
- Respect other people’s privacy
- Don’t abuse your power
- Be forgiving of other people’s mistakes
Net Pioneers and Web Creator
Larry Roberts
Bob Kahn
Vint Cerf
Sir Tim Berners-Lee
Internet Threats
- Malware
- SPAM
- Phishing (Pharming)
- Evil Twins
Stands for malicious software
Malware
Types of Malware
Virus, Worm, Trojan, Spyware, Adware, and Ransomware
What is a Virus?
Malicious program that replicates and transfer from one computer to another.
Example: Short-cut files and Downloadable files
What is a Worm?
Malicious program that transfer from one computer to another, by any types of means
Example: ILOVEYOU worm (Love Bug Worm) created by the Filipino Onel De Guzman
What is a Trojan?
Designed as useful program but once downloaded or installed, leaves PC unprotected and allows hackers to get your information
Example: Computer Games
What is Spyware?
Program that runs in the background without you knowing it
Ability to monitor what you are doing and typing through keylogging
e.g Fake Login Forms/Sites
What is Adware?
Program designed to send you advertisements, mostly as pop-ups
Aka, Click Fraud
E.G Pop-up ads
What is Ransomware?
Holds your PC hostage and demand money
Locks computer/threatens to destroy data/demands money
What is SPAM?
Unwanted email mostly from bots and advertisements.
Can be used to send malware
What is Phishing?
To acquire sensitive personal information like passwords and credit cards detail.
*Pharming- more complicated way of phishing where its exploits the DNS (Domain Name Service) System.
What is Pharming?
More complicated way of phishing where its exploits the DNS (Domain Name Service) System.
What is Evil Twins?
Wireless network that pretends to offer trusthworthy Wi-fi connections to the internet
What is Identity Theft?
Theft of personal information to impersonate someone.
Example: Posers and Gamers
What is Information Leak?
When information is revealed to the public
Information given to an unauthorized user
AKA, “Data Breach”
Example: FB and Cambridge Analytica Scandal
What is a Hacker?
Someone who accesses a computer system by circumventing and breaching its security system.
What is Hacking?
Defined as showing computer expertise
Types of Hacker
- Professional Hacker (White/Black Hackers)
- Script Kiddies
- Underemployed Adult Hackers
- Ideological Hacker
What are Script Kiddies?
Mostly students who want to be known
What is Underemployed Adult Hacker?
Adults who want to have recognition to the hacker’s community.
What is Ideological Hackers?
Targets government sites for political purposes.
What is Criminal Hacker?
Will do what they want to get what they want regardless of harming others.