Be Aware? Threat is anything that can cause harm to our computer resources. In computer security, a threat can be a virus infection or an attack by a hacker. How about applying a countermeasure? We can apply regular backup process of our data. Putting a Firewall to our computer network system is our countermeasure against a possible attack by a serious hacker. Identity Theft is a technology term used when someone impersonates you. An Identity Theft can stole your accounts and even your money at the bank. How and why? By Shoulder Surfing! Because he or she wants your money! What is shoulder surfing? Shoulder surfing is simply watching someone who withdraws on the ATM machine. But they are getting to know your PIN (Personal Identity Number) number. What other tricks a theft can use in smuggling? Snagging The Identity Theft could use wire tapping so that he or she could listen to your conversation on the telephone. Dumpster Diving The Identity Theft use this technique where he or she go to the trash bins to get slips regarding your withdraw or deposit. Social Engineering The Identity Theft will trick the victim into providing critical information under pretext of something legitimate. Mechanics: Each group will have their representative which will answer our questions oraly. We will have 10 questions and each question is worth 1 candy. If your representative got all 10 questions in the fastest way they can and got it all correct he or she can share 10 flattops with his or her groupmates. While others on seat will answer in their notebook. What is a Computer Virus? It is simply a tiny powerful program written and developed by an intelligent and malicious programmer. Pirated CD’s and USB’s is the source of Computer virus.
What can a virus do?
Well Virus can destroy data files, corrupt software integrity, gobble up computer’s, etc. Like humans, viruses have brothers as well. There are 3 types of viruses - Trojan Horses - Worms and Logic Bombs - Logic Bombs
Trojan Horses introduce malicious software
under the pretension of being a useful program. Worms are like viruses, they can reproduce themselves. The difference is that they can travel inside your computer. Logic Bombs are program triggered to perform a task or mission when it encounters some sequence of events or activities or after a certain amount of time elapses or when a date came. The software developers have created a lot of tracking programs that continuously monitor our online activities in accessing the internet.
Cookies A cookie is a small code that a web server asks your web browser such as internet explorer of Mozilla Firefox to place on your computer. Spyware
The spyware is also known as Adware. The
spyware collects and records secretly your email address, web usage, individual key strokes and even your personal information. Spam A spam offers products or services that usually we don’t need or want. Any act of stealing hardware and software resources are classified as cybercrime. Hacking is an illegal act of accessing the computer resources of some people with their knowledge or permission, or unauthorized access into company’s network system. Hacker employs the sniffing technique where he or she tries to guess the password of the hapless victim. Another technique used by the hacker is called Phising. In this technique, the hacker may contact the unsuspecting victim by email and ask the victim to provide password information of an apparent legitimate reason. The other technique use by the hacker is the IP Spoofing. In this technique, the hacker intercepts the data while it is transmitted or gain access to the computer network system by posing as an authorize user. Cyberterrorism is an act of attacking the mission-critical information technology infrastructure and government network system of a particular country. Putting firewalls in our computer system network is our best defense against the possible attack of a hacker. The firewall automatically drops or discards any unsolicited data communications it detected. There are some apps to be installed that can protect or clean our computer. But there are some that are automatically in there, some of those are Virus scanner and cleaner. These software is designed and programmed to search and destroy computer viruses that invade our computer. The computer subsystems that can be scanned are the hard disk, external hard disk, floppy disk, computer’s main memory, CD/DVD ROM drive and USB drive. Hello! They can be aware of my bad friends if they avoid buying pirated disks, USB’s, and CD’s. like this… Your Welcome… Bye!
Perjury and Lies by Judge Peter McBrien at the Commission on Judicial Performance: Whistleblower Leaked CJP Records Documenting False Statements and Perjurious Testimony by Hon. Peter J. McBrien Sacramento Superior Court - Judge Steve White - Judge Laurie Earl - Judge Robert Hight - Judge James Mize Sacramento County - California Supreme Court Justice Tani Cantil-Sakauye, Justice Goodwin Liu, Justice Carol Corrigan, Justice Leondra Kruger, Justice Ming Chin, Justice Mariano-Florentino Cuellar, Kathryn Werdegar Supreme Court of California
California Judicial Branch News Service - Investigative Reporting Source Material & Story Ideas