Professional Documents
Culture Documents
SECURITY AND
RULES OF
NETIQUETTE
LESSON 2
ONLINE SAFETY, SECURITY AND
RULES OF NETIQUETTE
LESSON 2
ONLINE SAFETY, SECURITY
AND RULES OF NETIQUETTE
INTERNET SAFETY
is network etiquette,
the do’s and don’ts of
online
communication.
TEN RULES OF NETIQUETTE
Rule No. 1:
Remember the human
TEN RULES OF NETIQUETTE
Security
Requirement
Triad
Types of System Intruders
Masquerader-
pretend to be
someone one is not
Types of System Intruders
Hackers - is a person
who breaks into a
computer system.
Types of System Intruders
Clandestine user -
The category of
individuals those
have supervision/
administrative
control over the
system and misuse
the authoritative
power given to them.
Parts of Virus
• Infection
mechanism
• Trigger
• PayloaD
Virus stages
Key Terms
Privacy Policy/Terms
of Services (ToS) –
tells the user how the
website will handle
its data.
Key Terms
Virus- a malicious
program designed to
transfer from one
computer to another
in any means
possible.
Key Terms
Worms– a malicious
program designed to
replicate itself and
transfer from one file
folder to another and
also transfer to other
computers.
Key Terms
Trojan-a malicious
program designed
that is disguised as a
useful program but
once downloaded or
installed, leaves your
PC unprotected and
allows hacker to get
your information.
Key Terms
Spyware– a program
that runs in the
background without
you knowing it. It has
the ability to monitor
what you are
currently doing and
typing through key
logging.
Key Terms
Adware- a program
designed to send you
advertisement,
mostly pop-ups.
Key Terms
Spam– unwanted
email mostly from
bots or advertisers.
Key Terms
Phishing- acquires
sensitive personal
information like
passwords and
credits card details.
Key Terms
Pharming- a more
complicated way of
phishing where it
exploits the DNS
system.
Key Terms
Copyright- a part of
law, wherein you
have the rights to
work, anyone who
uses it w/o your
consent is punishable
by law.
Key Terms
Keyloggers- used to
record the keystrokes
done by user. This is
done to steal
passwords or any
other sensitive
information.
Key Terms
Rogue security
softwares– is a form of
malicious software and
internet fraud that
misleads users into
believing there is a virus
on their computer, and
manipulates them into
paying money for a fake
malware removal tool.
Four search strategies
• Keyword searching
• Boolean
• Question
• Advanced
Quiz 2