0% found this document useful (0 votes)
29 views3 pages

ICT Reviewer 1

Uploaded by

7m5nr5hfmc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

ICT Reviewer 1

Uploaded by

7m5nr5hfmc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Fighting Fakes ● Use a device such as the IronKey

Secure USB flash drive


1. Read Past the Headline (wwww.ironkey.com), which includes
- Don't just read the catchy headline. special security software to protect your
Read THE ARTICLE! data and encrypt your online
2. Check who published the story communications
- If suspicious, Google the site! ● Don’t fill out site registration forms
3. Check the publish date and time unless you see a privacy policy
- Is it new? Or just rehashed info? statement indicating that the information
Remember, News=Current you supply won’t be sold to third parties.
4. Who is the Author? ● Turn off cookies in order to prevent the
- By-lines mean accountability activity of Web beacons.
5. Check for links and sources
- A solid story has multiple, verifiable ● A Web beacon is a tiny graphic image
sources that surveys a user's Web activity.
6. Be wary of questionable quotes, ● When a user visits a website or sends
photos, and even videos an email that contains a Web beacon,
- Everything can be faked! that information is recorded for
7. Be aware of your own biases analytical purposes.
- We are drawn to stories that support our
biases and fakers know this! Cookies
8. Are others reporting it? - Cookies are small text files that are
- If no other reputable sites, or if only written to your computer’s hard disk by
similarly suspicious sites are reporting it, many of the Web sites you visit.
then it is most likely fake
9. Think before you share! Privacy at Home
- When in doubt, DON'T! How to protect yourself at home?
Additional resources to help you spot and fight ● Create logins and passwords for each
FAKE NEWS: individual using a system to provide
● FactCheck.org each user with a section to store
● Poynter’s Tips For Debunking Fake documents
News ● Do not save account numbers or
● TinEye Reverse Image Search passwords for access to secured sites
● Vera Files Fact Check such as bank accounts and personal
email on a shared system
● Do not leave a secured account active
Privacy, Crime, and Security on the monitor and walk away
● Do not leave devices like cell phones on
Privacy the tables at restaurants and other
- Privacy refers to an individual’s ability to public places
restrict or eliminate the collection, use, ● Turn off services that are not in use,
and sale of confidential personal especially Bluetooth
information. ● Ensure that devices are configured
Online Privacy securely and, if necessary, require
How to protect yourself online? authentication
● Surf the web anonymously by using
software products such as Anonymizer’s
Anonymous Surfing
(www.anonymizer.com)
Computer Crime and Cybercrime - When hackers attempt unauthorized
access, they rarely damage data or
- Computer Crime are computer-based steal assets.
activities that violate state, federal laws, Crackers
or international laws. - AKA black hats, are hackers who
- Cybercrime describes crimes carried become obsessed (often uncontrollably)
out by means of the Internet. with gaining entry to highly secure
computer systems.
Types of Computer Crime Cybergangs
- Groups of hackers or crackers working
Identity Theft together to coordinate attacks, post
- A criminal obtains enough personal online graffiti, or engage in other
information to impersonate you. malicious conduct.

How do criminals get this information?


- Phishing – A “phisher” poses as a
legitimate company/person in an email Ethical Hackers
or on a website in an attempt to obtain - AKA white hats, offers their service to
personal information. companies hoping to use hacker
- Malware – Used to send spam and expertise to shore up their computer
steal your personal data. systems’ defenses.
Swindlers
- Perpetuate bogus work-at-home
Fraud, Theft, and Piracy opportunities, illegal pyramid schemes,
- When computer intruders make off with chain letters, risky business
sensitive personal information, the opportunities, bogus franchises, etc.
potential for fraud multiplies. Shills
- Physical theft (hardware components) - A secret operative who bids on another
and software piracy have been growing seller’s item to drive up the price.
problems over the years. Cyberstalkers
- One of the newest and fastest growing
Cybergaming Crime crimes. Cyberstalking uses the Internet,
- Online games are played by real people, social networking sites, email, or other
including thieves and con artists who electronic communications to repeatedly
make real money by stealing other harass or threaten a person.
peoples “virtual” property. Sexual Predators
- Online predators often pose as children,
Tricks for Obtaining PW but many admit that they are older and
- Involves unauthorized access, in which manipulate their victims by appealing to
an intruder gains entry to a supposedly the in other ways.
secure computer system.
Cyberbullying
Meet the Attackers - Involves situations in which one or more
individuals harass or threaten another
Hackers individual less capable of defending
- Hackers are computer hobbyist who himself or herself.
enjoys pushing computer systems (and
themselves) to the limit.
Malwares
Spamming or Spam
Malware or Malicious Software - Spamming is a method of flooding the
- is a term for any software that gets Internet with copies of the same
installed on your machine and performs message. Spams are also known as
unwanted tasks, often for some third Electronic junk mails or junk newsgroup
party's benefit. postings.
- Malware programs can range from Worms
being simple annoyances (pop-up - Worms are malicious programs that
advertising) to causing serious computer make copies of themselves again and
invasion and damage (e.g., stealing again on the local drive, network shares,
passwords and data or infecting other etc.
machines on the network).
- Malware refers to virus, spy ware, worm - The only purpose of the worm is to
etc. and is designed to cause damage to reproduce itself again and again. It
a stand alone computer or a networked doesn’t harm any data/file on the
pc. computer.
Trojan
Popular Types of Malware - a destructive program that looks as a
- Trojans genuine application. Unlike viruses,
- Virus Trojan horses do not replicate
- Adwares themselves but they can be just as
- Spam destructive.
- Spywares - Trojans also open a backdoor entry to
- Worms your computer which gives malicious
- hijackers users/programs access to your system,
allowing confidential and personal
Adwares information to be theft.
- Adware is the class of programs that Virus
place advertisements on your screen. - a program written to enter to your
These may be in the form of pop-ups, computer and damage/alter your
pop-unders, and advertisements files/data. A virus might corrupt or delete
embedded in programs. data on your computer. Viruses can also
Spywares replicate themselves.
- Programs classified as spyware send - A computer Virus is more dangerous
information about you and your than a computer worm as it makes
computer to somebody else. Some changes or deletes your files while
spyware simply relays the addresses of worms only replicates itself with out
sites you visit or terms you search for to making changes to your files/data.
a server somewhere.
Hijacker or Browser hijacking software
- Advertising software that modifies your
browser settings (e.g., default home
page, search bars, toolbars), creates
desktop shortcuts, and displays
intermittent advertising pop-ups.

You might also like