Sie sind auf Seite 1von 8

EMPOWERMENT TECHNOLOGIES

Sunday, March 19, 2017

LESSON 2: ONLINE SAFETY, SECURITY AND RULES


OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.


TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.

 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

 Remember people have other things to do besides read your email. You are not the center
of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

 Be polite and pleasant to everyone.


 Always check your spelling and grammar before posting.
 · Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge

 Ask questions online


 Share what you know online.
 Post the answers to your questions online because someone may have the same
question you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.

Rule no. 8: Respect other people’s privacy.

 Do not read other people’s mail without their permission.


 Going through other people’s things could cost you, your job or you could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

 Do not take advantage of other people just because you have more knowledge or power
than them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

 Do not point out mistakes to people online.


 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot see
the person face to face.

Internet security

Security Requirement Triad


Confidentiality
Data confidentiality
Privacy
 Integrity
Data integerity System integrity
 Availability
Threat Consequence Threat Action ( Attack)

Unauthorized Disclosure Exposure: Sensitive data are directly released to an


unauthorized entity.
A circumstance or event whereby an
entity gains access to data for which the Interception: An unauthorized entity directly accesses
entity is not authorized. sensitive data traveling between authorized sources
and destinations.

Inference: A threat action whereby an unauthorized


entity indirectly accesses sensitive data by reasoning
from characteristics or byproducts of communications.

Intrusion: an unauthorized entity gains access to


sensitive data by circumventing a system's security
protections.

Disruption Incapacitation: prevents or interrupts system operation


by disabling a system component.
A circumstances or even that interrupts or
prevents the correct operation of system Corruption: Undesirably alters system operation by
services and functions. adversely modifying system functions or data.

Obstruction: A threat action that interrupts delivery of


system services by hindering system operation.
Deception
Masquerade: An unauthorized entity gains access to a
A circumstance or event that may result in
system or performs a malicious act by posing as an
an authorized entity receiving false data
authorized entity.
and believing it to be true.
Falsification: False data deceive an authorized entity.

Repudiation: An entity deceives another by falsely


denying responsibility for an act.

Usurpation
A circumstances or event that results in Misappropriation: An entity assumes
control of system services or functions by unauthorized logical or physical control of a
an unauthorized entity. system resource.

Misuse: Causes a system component to perform a


function or service that is detrimental to system
security.

Types of System Intruders


 Masquerader
 Hackers
 Clandestine user

Parts of Virus
 Infection mechanism
 Trigger
 Payload

Virus stages
 Dormant phase Virus
is idle.
 Propagation phase Virus
places an identical copy of itself into other programs or into certain system areas on t the disk.
 Triggering phase Virus
is activated to perform the function for which it was intended. Caused by a
variety of system events
 Execution
phase Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any means possible.

Worms- a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.

Spyware- a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam- unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.

Rogue security softwares- is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Four search strategies

 Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together

Common words are ignored (That, to, which, a, the ...)

+ and – can be used to include or exclude a word

 Boolean
AND - enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)

OR - requires at least one of the terms is found.

Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

NOT - searches for the first term and excludes sites that have the second term.

(i.e. Washington NOT school)

 Question

a question may be entered in the search field of search engine

 Advanced

Features are offered on many engines by going to an "Advanced search" page and making selections.
Effective in narrowing search returns to a specific topic or phrase.

GROUP1 ABM-B at 9:54 AM


Share
No comments:
Post a Comment


Home

View web version


About Me

GROUP1 ABM-B

View my complete profile

Powered by Blogger.

Das könnte Ihnen auch gefallen