Professional Documents
Culture Documents
Lesson 2
Lesson 2
ONLINE
SAFETY, SECURITY AND
RULES OF NETIQUETTE
INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online
communication.
You need to remember that you are talking to a real person when you
are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the
person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should
not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you
can’t see them.
Rule no. 3: Know where you are in cyberspace.
Always take a look around when you enter a new domain when
surfing the web.
Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
Do not take advantage of other people just because you have more
knowledge or power than them.
Treat others as you would want them to treat you if the roles were
reversed.
Rule no. 10: Be forgiving of other people’s mistake.
ConfidentIality
Data confidentiality
Privacy
Integrity
Data integerity System integrity
Availability
Threat Consequence Threat Action ( Attack)
Exposure: Sensitive data are directly released
to an unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses
sensitive data by reasoning from
characteristics or byproducts of
Unauthorized Disclosure communications.
A circumstance or event whereby Intrusion: an unauthorized entity gains
an entity gains access to data for access to sensitive data by circumventing a
which the entity is not authorized. system’s security protections.
Incapacitation: prevents or interrupts system
operation by disabling a system component.
Corruption: Undesirably alters system
operation by adversely modifying system
Disruption functions or data.
A circumstances or even that Obstruction: A threat action that interrupts
interrupts or prevents the correct delivery of system services by hindering
operation of system services and system operation.
functions. Masquerade: An unauthorized entity gains
access to a system or performs a malicious act
Deception by posing as an authorized entity.
A circumstance or event that may Falsification: False data deceive an
result in an authorized entity authorized entity.
receiving false data and believing Repudiation: An entity deceives another by
it to be true. falsely denying responsibility for an act.
Usurpation
A circumstances or event that
results in control of system Misappropriation: An entity assumes
services or functions by an unauthorized logical or physical control of a
unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is
detrimental to system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase
Virus is idle.
Propagation phase
Virus places an identical copy of itself into other programs or into certain
system areas on t the disk.
Triggering phase
Virus is activated to perform the function for which it was intended.
Caused by a variety of system events
Execution phase
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will
handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in
any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file
folder to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and allows hacker to
get your information.
Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card
details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as
it is used in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates
them into paying money for a fake malware removal tool.
Four search strategies
Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Boolean
AND – enter words connect with AND- it will include sites where both words and
found
Uses: joining different topics (i.e. global warming AND California)
Question
a question may be entered in the search field of search engine
Advanced
Features are offered on many engines by going to an “Advanced search”
page and making selections. Effective in narrowing search returns to a
specific topic or phrase.