You are on page 1of 3

Empowerment Technology 60, 000 computers), slowing them down to

Security and Netiquette halt. Morris now an associate professor in


Popular notion on Cybersecurity MIT.
● Cyber Security is Cyber Crime
● Cyber Security is the domain/responsibility The Concept Virus
of IT (techies) ● The Concept Virus – accidentally shipped
● Cyber Security is all about hackers and on a CD-ROM supplied by Microsoft in
malicious code. 1995, was the first to infect Microsoft Word
Cybersecurity – as defined in Section 3.2.5 of documents. Within days it became the most
Recommendation ITU-TX.1205:2008 (Overview of widespread virus the world has ever seen,
cybersecurity) It is a collection of tools, policies, taking advantage of the fact that computer
security concepts, security safeguards, users shared documents via email.
guidelines, risk management approaches, actions,
training, best practices, assurance and CIH
technologies that can be used to protect the cyber ● CIH – The Chernobyl (also known as CIH)
environment and organization and user’s assets. triggers on April 26 each year, the
anniversary of Chernobyl Nuclear disaster.
Organization and user’s include connected It overwrites the chip insides PCs effectively
computing devices, personnel, infrastructure, paralyzing the entire computer. Its author,
applications, services, telecommunications Cheng Ing Hau, was caught by the
systems, and the totality of transmitted and/or authorities in Taiwan.
stored information in the cyber environment.
The Anna Kuornikova worm
Internet Threats ● The Anna Kournikova Worm – posed as a
1. Malware picture of the tennis player, but was in fact
a. Virus virus written by Jan de Wit, an obsessed
b. Worm admirer from the Netherlands. He ended up
c. Trojan receiving a community service sentence.
d. Spyware
e. Adware ILOVEYOU
2. Spam ● ILOVEYOU – The Love Bug Flooded
3. Phishing internet users with ILOVEYOU messages in
a. Pharming May 2000, forwarding itself to everybody in
the user’s address book. It was designed to
1. Malware – stands for malicious software steal internet access password for its
a. Virus – a malicious program designed to Filipino creator.
replicate itself and transfer from one
computer to another either through the The Melissa Virus
internet and local networks or data storage ● The Melissa Virus – written by David L
like flash drives and CDs Smith in homage to a Florida stripper, was
the first successful email-ware virus and
Top 10 Worst Computer Viruses inserted a quote from the Simpsons in to
The Morris Worm Word documents. Smith was later
● The Morris Worm - In 1998 Robert Morris, sentenced to jail for causing over $80
a university student, unleashed a worm million worth of damage.
which affected 10 percent of all the
computers connected to the internet (at the
time the net was estimated to consist of
The Blaster Worm “spy”). It has the ability to monitor what you are
● The Blaster Worm – launched a denial currently doing and typing through keylogging.
service attack against Microsoft’s website in
2003, and infected millions of computers e. Adware – a program designed to send you
around the world by exploiting a security advertisements, mostly a pop-ups.
hole in Microsoft's software. Its author has
never been found. Internet Safety - It refers to the online security or
safety of people and their information when using
Netsky and Sasser internet.
● Netsky and Sasser – Sven Jaschan, a
German teenager, was found guilty of Netiquette - Is network etiquette, the do’s and
writing the Netsky and Sasser worms. don’ts of online communication.
Jaschan was found responsible for 70% of
all the mallware seen spreading over the 10 Best Rules of Netiquette
internet at the time, but escaped prison and 1. THE GOLDEN RULE - treat others as you would
was eventually hired by a security company like to be treated.
as an “ETHICAL HACKER”.
2. NO Flaming
OSX/RSPlug Trojan Flame – is a personal insult communicated
● OSX/RSPlug Trojan – In November 2007, through internet. Watch your posts or
the first example of financially-motivated comments
malware for Apple Macs was discovered in
the wild. The launched of the OSX/RSPlug 3. Don’t Type in ALL CAPS - people may
Trojan increased fears that Apple’s platform misinterpret it.
may be targeted more by hackers in the
future. 4. Don’t SPAM
SPAM – it is any unsolicited email from unknown
Storm Worm sources.
● Storm Worm – originally posing as breaking
news of bad weather hitting Europe, 5. Don’t talk to people you do not know.
infected computers around the world in
2007. Millions of infected PCs were taken 6. Obey Copyright Laws - don’t steal someone
over by hackers and used to spread spam else’s idea, property, and rights.
and steal identities.
7. Use Proper Grammar and Spelling - errors
b. Worm – a malicious program that transfers from diminish the credibility of the message.
one computer to another by any type of means.
Often, it uses a computer network to spread itself. 8. Be HONEST/ Be Yourself
For example, the ILOVEYOU worm (Love Bug - tell the truth
Worm) created by a Filipino. - do not pretend to be someone else.

c. Trojan – a malicious program that is disguised 9. Follow the TOS


as a useful program but once download or installed, TOS – Terms of Service
leaves your PC unprotected and allows hackers to - rules and policy of the sites.
get your information.
10. Shop Secure Sites
d. Spyware – a program that runs in the - these are sites with Transport Layer Security
background without you knowing it (thus called (TLS) or Socket Layer Security.
THINK BEFORE YOU CLICK

Here are things you mightwant to consider before


posting something over the internet.

1. Before you post something on the web, ask


these questions to yourself: Would you want your
parents or grandparents to see it? Would you want
your future boss to see it? Once you post
something on the web, you have no control of sees
your post.

2. Your friends depend on you to protect their


reputation online. Talk to your friends about this
serious responsibility.

3. Set you post to “private”. In this way, search


engines will not be able to scan that post.

4. Avoid using names. Names are easy for search


engines.

5. If you feel that a post can affect you or other’s


REPUTATION, ask the one who posted it to pull it
down or report it as inappropriate.

You might also like