Using the Internet Securely Flashcards
(47 cards)
What is a URL and what does it stand for?
Uniform Resource Locator (URL)
URL Example: http://www.mycompany.com/folder/index.htm
URL is the standardized address of a resource, such as a website.
What is a Protocol?
A protocol is an accepted standardized set of rules for communication.
What is HTTP?
HyperText Transfer Protocol. It is one of the most common communication languages used in delivering web pages.
What is a Host name?
A host name is a unique identifier given to a device connected to a network, allowing it to be located and accessed by other devices on the network.
Name of computer holding the content (www)
What does ‘WWW’ stand for?
World Wide Web - a system of interconnected hypertext documents accessed via the internet.
What is TLD?
TLD stands for top-level domain.
The first-order Internet directories, which include the original six —.com, .gov, .net, .org, .mil, and .edu— as well as the original two-letter country-specific codes, such as .us, .fr, and .es, and a plethora of more recent creations, including .info, .blog, .chat, .movie, .company, and .play.
What is a Path to resource?
A path to a resource refers to the complete path or location of a specific resource within a URL. It is used to identify the specific page or file that a user wants to access within a website or web application. The path is typically listed after the domain name in a URL and includes any subdirectories, files, or parameters that are required to access the desired resource.
URL Structure Example:
“http://www.mycompany.com/folder/index.htm”
Protocol: (HTTP)
Host name: (www)
Registered domain name: (mycompany.com)
TLD: (.com)
Path to resource: (/folder/index.htm)
What does TLD stand for?
Top Level Domain
HTTP VS HTTPS
While HTTP is the most common protocol of the World Wide Web, it’s also not secure. All communications are visible and unencrypted.
If the URL instead starts with HTTPS, it’s using encryption and is more secure. Web browsers also display a padlock icon to indicate that a page is using the HTTPS protocol.
What does HTTP stand for?
HyperText Transfer Protocol
What does HTTPs stand for?
HyperText Transfer Protocol Secure
Shortened URLs
Shortened URLs are used frequently for legitimate purposes as well. Many of them allow you to hover your mouse over them without selecting and see a preview of the page the link is sending you to. You should still be cautious about selecting shortened URLs and check with the person who sent it to you to make sure they actually sent it and they know where it links to.
Guidelines for Browsing the Web Safely:
Usage:
- Use a current / updated web browser.
- Avoid installing unnecessary add-ins, plug-ins, or toolbars in your web browser.
- Hover your mouse over a link before you select it to see the real address to where it leads, particularly if it is a shortened (Bitly-type) address.
- If you’re using a mobile device:
* Use the link preview feature (if it exists) to see the
actual URL before you tap.
* Be mindful that it likely does not have malware
protection by default. - If you’re not sure if a link leads to where it claims, type the address in the address bar of a separate browser instance, rather than simply selecting the link.
- Bookmark websites that you commonly visit, so that you always have the correct address for those sites.
Guidelines for Browsing the Web Safely:
Awareness:
- Learn to recognize suspicious URLs.
- Be vigilant that the websites you use to enter or view sensitive data use HTTPS as the protocol.
- Be mindful of the significance of the first two elements to the left of the single slash in a URL.
- Avoid selecting/tapping ads and pop-ups.
Guidelines for Browsing the Web Safely:
Policies and Procedures:
- If your browser becomes infected or hijacked, seek help from your IT department.
- Always follow organizational policy when browsing the web.
- If your organization has an Internet usage policy, make sure you are familiar with it and follow it whenever you browse the web.
Email Security
Many of the same rules that apply to safe web browsing also apply to safe email usage. Know the people who are sending you email messages and to whom you’re sending email messages, and decide whether or not it’s appropriate to trust them. Instead of entering sensitive information directly into the body of an insecure email message, consider sending an encrypted or password-protected attachment instead.
Common Email Risks
Social engineering and malicious attachments are the two main risks.
Most common types of email - social engineering attacks:
* Fake security alerts: Your bank needs you to change your password.
* Threats of legal or official action: The government or a law firm is coming after you.
* Appeals for help: Someone you know is “stranded” in a foreign country.
* Malware removal/IT support offers: Malicious software has been “discovered” on your computer and someone wants to fix it for you.
* Free offers: Download an MP3 or win a tablet.
* Monetary/inheritance scams: Someone overseas needs your help getting their money.
Email Attachments
Attachments are convenient. Practically any type of file can be an attachment, so exercise caution when opening.
Recognize impostors.
* Check the sender’s name and email address.
* Check the subject.
* Verify that message is in character for the sender.
* Call the sender to verify if uncertain.
Be careful of high-risk file types such as:
.htm .html .zip .exe .js .docm
Common Phishing Techniques:
*The email is addressed to “Dear Valued Customer,” or the name is left blank.
*The sender’s name does not match their email address.
*The sender’s domain is misspelled.
*The subject line tries to draw you in.
*The tone of the message is threatening or urgent.
*There are spelling or grammar mistakes in the message.
*The signature is blank, incomplete, or doesn’t match the sender’s other signatures.
*The message instructs you to update your information, and then provides a convenient link or attachment to do so.
*The message uses the authority of a C-level officer or other manager who is too busy to speak with you directly, but wants you to do something for them.
*A friend wants you to check out a link or attachment.
Remember that legitimate email, even from a debt collector or government agency, will never include details of any case in an unsolicited email. Your IT department, bank, or online services provider will never ask for your password or account information in an email.
Guidelines for Using Email Securely:
Usage
- Hover over links to see where they lead before you click them.
- Delete unsolicited emails and attachments.
- Be extra cautious with your email password. If you ever forget any other password, most systems can email it to you or send you a password-reset link. If a hacker gets into your email account, there’s little else of yours they can’t get.
- If an attachment asks for something unexpected, such as permission to install something, be especially wary.
Guidelines for Using Email Securely:
Awareness
- Educate yourself about the latest scams.
- Be sure of who the senders really are. Recognize not just their names, but also their actual email addresses, their signature blocks, and the content and tone of their messages.
- Double-check that you have the correct recipients’ email addresses before sending any sensitive data.
- Never feel pressured into acting immediately because the tone is urgent, authoritative, or threatening.
- Be wary of subject lines that try to entice you or gain your confidence.
- Look for spelling mistakes in the sender’s domain, or spelling and grammar mistakes in the message body.
- Watch for unusual or atypical requests from seemingly valid sources, such as a bank or IT department asking for a password or personal information.
- Be mindful of hoaxes and impersonations. When in doubt, call back at a known valid number to verify. If something sounds too good to be true, it probably is.
- In dealing with email attachments, like the messages themselves, be confident of the source. If the attachment is unexpected or seems suspicious, delete it immediately and do not open it.
Guidelines for Using Email Securely:
Policies and Procedures
- Do not allow yourself to be pressured into breaching organizational protocol.
- Follow any organizational policies on the use of email, what may be sent, and the manner in which it may be sent.
What is Social Networking?
The use of dedicated websites and applications to interact with others who share similar interests.