Empowerment Technology 60, 000 computers), slowing them down to
Security and Netiquette halt. Morris now an associate professor in
Popular notion on Cybersecurity MIT. ● Cyber Security is Cyber Crime ● Cyber Security is the domain/responsibility The Concept Virus of IT (techies) ● The Concept Virus – accidentally shipped ● Cyber Security is all about hackers and on a CD-ROM supplied by Microsoft in malicious code. 1995, was the first to infect Microsoft Word Cybersecurity – as defined in Section 3.2.5 of documents. Within days it became the most Recommendation ITU-TX.1205:2008 (Overview of widespread virus the world has ever seen, cybersecurity) It is a collection of tools, policies, taking advantage of the fact that computer security concepts, security safeguards, users shared documents via email. guidelines, risk management approaches, actions, training, best practices, assurance and CIH technologies that can be used to protect the cyber ● CIH – The Chernobyl (also known as CIH) environment and organization and user’s assets. triggers on April 26 each year, the anniversary of Chernobyl Nuclear disaster. Organization and user’s include connected It overwrites the chip insides PCs effectively computing devices, personnel, infrastructure, paralyzing the entire computer. Its author, applications, services, telecommunications Cheng Ing Hau, was caught by the systems, and the totality of transmitted and/or authorities in Taiwan. stored information in the cyber environment. The Anna Kuornikova worm Internet Threats ● The Anna Kournikova Worm – posed as a 1. Malware picture of the tennis player, but was in fact a. Virus virus written by Jan de Wit, an obsessed b. Worm admirer from the Netherlands. He ended up c. Trojan receiving a community service sentence. d. Spyware e. Adware ILOVEYOU 2. Spam ● ILOVEYOU – The Love Bug Flooded 3. Phishing internet users with ILOVEYOU messages in a. Pharming May 2000, forwarding itself to everybody in the user’s address book. It was designed to 1. Malware – stands for malicious software steal internet access password for its a. Virus – a malicious program designed to Filipino creator. replicate itself and transfer from one computer to another either through the The Melissa Virus internet and local networks or data storage ● The Melissa Virus – written by David L like flash drives and CDs Smith in homage to a Florida stripper, was the first successful email-ware virus and Top 10 Worst Computer Viruses inserted a quote from the Simpsons in to The Morris Worm Word documents. Smith was later ● The Morris Worm - In 1998 Robert Morris, sentenced to jail for causing over $80 a university student, unleashed a worm million worth of damage. which affected 10 percent of all the computers connected to the internet (at the time the net was estimated to consist of The Blaster Worm “spy”). It has the ability to monitor what you are ● The Blaster Worm – launched a denial currently doing and typing through keylogging. service attack against Microsoft’s website in 2003, and infected millions of computers e. Adware – a program designed to send you around the world by exploiting a security advertisements, mostly a pop-ups. hole in Microsoft's software. Its author has never been found. Internet Safety - It refers to the online security or safety of people and their information when using Netsky and Sasser internet. ● Netsky and Sasser – Sven Jaschan, a German teenager, was found guilty of Netiquette - Is network etiquette, the do’s and writing the Netsky and Sasser worms. don’ts of online communication. Jaschan was found responsible for 70% of all the mallware seen spreading over the 10 Best Rules of Netiquette internet at the time, but escaped prison and 1. THE GOLDEN RULE - treat others as you would was eventually hired by a security company like to be treated. as an “ETHICAL HACKER”. 2. NO Flaming OSX/RSPlug Trojan Flame – is a personal insult communicated ● OSX/RSPlug Trojan – In November 2007, through internet. Watch your posts or the first example of financially-motivated comments malware for Apple Macs was discovered in the wild. The launched of the OSX/RSPlug 3. Don’t Type in ALL CAPS - people may Trojan increased fears that Apple’s platform misinterpret it. may be targeted more by hackers in the future. 4. Don’t SPAM SPAM – it is any unsolicited email from unknown Storm Worm sources. ● Storm Worm – originally posing as breaking news of bad weather hitting Europe, 5. Don’t talk to people you do not know. infected computers around the world in 2007. Millions of infected PCs were taken 6. Obey Copyright Laws - don’t steal someone over by hackers and used to spread spam else’s idea, property, and rights. and steal identities. 7. Use Proper Grammar and Spelling - errors b. Worm – a malicious program that transfers from diminish the credibility of the message. one computer to another by any type of means. Often, it uses a computer network to spread itself. 8. Be HONEST/ Be Yourself For example, the ILOVEYOU worm (Love Bug - tell the truth Worm) created by a Filipino. - do not pretend to be someone else.
c. Trojan – a malicious program that is disguised 9. Follow the TOS
as a useful program but once download or installed, TOS – Terms of Service leaves your PC unprotected and allows hackers to - rules and policy of the sites. get your information. 10. Shop Secure Sites d. Spyware – a program that runs in the - these are sites with Transport Layer Security background without you knowing it (thus called (TLS) or Socket Layer Security. THINK BEFORE YOU CLICK
Here are things you mightwant to consider before
posting something over the internet.
1. Before you post something on the web, ask
these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of sees your post.
2. Your friends depend on you to protect their
reputation online. Talk to your friends about this serious responsibility.
3. Set you post to “private”. In this way, search
engines will not be able to scan that post.
4. Avoid using names. Names are easy for search
engines.
5. If you feel that a post can affect you or other’s
REPUTATION, ask the one who posted it to pull it down or report it as inappropriate.