You are on page 1of 3

Rules of Netiquette and redirects you to malicious

websites.

Online Safety and Security  Worm- Worms are spread via software
vulnerabilities or phishing attacks. Once a
- The Internet, truly, is a powerful tool. It can
worm has installed itself into your
be used to promote your business, gain new
computer’s memory, it starts to infect the
friends, and stay in touch with the old ones.
whole machine and in some cases… your
- It is also a source of entertainment. But like
whole network.
most things in this world, there is always
Depending on the type of worm and your
“another side of the coin.” The Internet is
security measures, they can do serious
one of the most dangerous places,
damage. These parasitic nasties can…
especially if you do not know what you are
- Modify and delete files
doing.
- Inject malicious software onto computers
- Replicate themselves over and over to
Internet Threats: deplete system resources
- Steal your data
1. Malware – stands for malicious software,
- Install a convenient backdoor for hackers
software that is specifically designed
to disrupt, damage, or gain unauthorized
Types of Worm:
access to a computer system.
 Email worms - Email worms work by
Types: Virus, Worm, Trojan, Spyware, Adware creating and sending outbound
messages to all the addresses in a
user's contact list.
 Virus- Unlike worms, viruses need an  File-sharing worms - File-sharing
already-infected active operating system or worms copy themselves into shared
program to work. Viruses are typically folders and spread through peer-to-
attached to an executable file or a word peer file-sharing networks
document.  Internet worms - Some computer
- Most people are probably aware that a .exe worms specifically target popular
file extension could lead to issues if it’s not websites with poor security.
from a trusted source.

Types of virus:  Trojan- Just as it sounds, a Trojan Horse is a


 Resident Virus - Resident viruses set malicious program that disguises itself as a
up shop in your RAM and meddle legitimate file. Because it looks trustworthy,
with your system operations. users download it and… hey presto, in storms
the enemy.
 Multipartite Virus - This virus infects
Trojans themselves are a doorway. Unlike a
the entire system – multipartite
worm, they need a host to work.
viruses spread.
- Delete, modify and capture data
 Direct Action - This virus targets a
- Harvest your device as part of a botnet
specific file type, most commonly
- Spy on your device
executable files (.exe)
- Gain access to your network
 Browser Hijacker - Easily detected,
this virus type infects your browser
Types of Trojan: Think Before You Click
 Downloader Trojan - a downloader
1. Before you post something on the web, ask
trojan downloads and deploy other
these questions to yourself: Would you
malicious code, such as rootkits,
want your parents or grandparents to see
ransomware or keylogger.
it? Would you want your future boss to see
 Rootkit Trojans - acquire root-level
it? Once you post something on the web,
or administrative access to a
you have no control of who sees your posts.
machine, and boots together with
2. Your friends depend on you to protect their
the operating system, or even
reputation online. Talk to your friends
before the operating system.
about this serious responsibility.
3. 3. Set your post to “private.” In this way,
search engines will not be able to scan that
 Spyware- Spyware secretly records your
post.
online activity, harvesting your data and
4. Avoid using names. Names are easy for
collecting personal information such as
search engines to scan.
usernames, passwords and surfing habits.
5. If you feel that a post can affect you or
- Spyware is a common threat, usually
other’s reputation, ask the one who posted
distributed as freeware or shareware that
it to pull it down or report it as
has an appealing function on the front end
inappropriate.
with a covert mission running in the
background that you might never notice.
COPYRIGHT INFRINGEMENT
Types of Spyware:
 Key loggers - is a type of spyware - If you create something—an idea, an
that is difficult to detect. Keylogging invention, a form of literary work, or a
software works to record everything research, you have the right of how it
you enter. should be used by others. This is called
intellectual property.

 Adware- Its name is derived from a


combination of the phrases software and Netiquette
advertising. At its core, adware is any
- Netiquette (Network Etiquette) represents
software that shows advertising on a
the importance of proper manners and
computer, whether malicious or not.
behavior online.
- Adware is one of the better-known types of
- -In general, netiquette is the set of
malware. It serves pop-ups and display ads
professional and social etiquettes practiced
that often have no relevance to you.
and advocated in electronic.

2. Spam – unwanted email mostly from bots


Make sure identification is clear in
or advertisers. It can be used to send
all communications.
malware.
- Begin with a salutation (“Hi, Jason!”)
3. Phishing – Its goal is to acquire sensitive
personal information like passwords and
 Review what you wrote and try to
credit card details.
interpret it objectively.
- When we speak face to face and are
misunderstood, we have an on-the-spot
opportunity to rephrase our words.

 If you wouldn’t say it face to face,


don’t say it online.
- When you’re working online, you’re safe
behind a screen, but that’s no excuse to be
ill-mannered or say things you would never
say in public.

 Don’t assume everyone


understands where you’re coming
from.
- Sarcasm and wit is often the spice of in-
person conversation, but in online
discussion, it can not only lose its edge, it
can bite!

 Don’t spam.
- Please don’t take advantage of your
connection with the other students in your
online classroom to forward emails and
links regarding your political/spiritual
beliefs or to sell your services.

 Respect others’ privacy.


- Don’t give out another student’s personal
email address without permission.

 Remember, if it’s on the internet,


it’s everywhere.
- Don’t share personal information about
yourself in a public online forum, especially
something that could put your safety or
security at risk.

 Forgive and forget.


- If you’re offended by something another
student says online, keep in mind that you
may have misunderstood their intentions.
Give them the benefit of the doubt.

You might also like