NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Rule No. 1: Remember the human
- You need to remember that you are talking to a real person when you are online.
- The internet brings people together who would otherwise never meet.
- Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you
follow in real life.
- You need to behave the same way online that you do in real life.
- You need to remember that you can get caught doing things you should not be doing online just like you can in real life.
- You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
- Always take a look around when you enter a new domain when surfing the web.
- Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
- Remember people have other things to do besides read your email. You are not the center of their world.
- Keep your post and emails to minimum by saying what you want to say.
- Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
- Be polite and pleasant to everyone.
- Always check your spelling and grammar before posting.
- · Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
- Ask questions online
- Share what you know online.
- Post the answers to your questions online because someone may have the same question you do.
Rule no. 7: Help keep flame wars under control
- Netiquette does not forgive flaming.
- Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
- Do not read other people’s mail without their permission.
- Going through other people’s things could cost you, your job or you could even go to jail.
- Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
- Do not take advantage of other people just because you have more knowledge or power than them.
- Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
- Do not point out mistakes to people online.
- Remember that you were once the new kid on the block.
- You still need to have a good manners even though you are online and cannot see the person face to face.
Security Requirement Triad
·
Confidentiality
Data confidentiality
Privacy
Confidentiality
Data confidentiality
Privacy
· Integrity
Data integerity System integrity
Data integerity System integrity
· Availability
Threat Consequence
|
Threat Action ( Attack)
|
Unauthorized
Disclosure
A circumstance or event whereby an entity gains access to data
for which the entity is not authorized.
|
Exposure:
Sensitive data are directly released to an unauthorized entity.
Interception:
An unauthorized entity directly accesses sensitive data traveling between
authorized sources and destinations.
Inference:
A threat action whereby an unauthorized entity indirectly accesses sensitive
data by reasoning from characteristics or byproducts of communications.
Intrusion:
an unauthorized entity gains access to sensitive data by circumventing a
system's security protections.
|
Disruption
A circumstances or even that interrupts or prevents the
correct operation of system services and functions.
Deception
A circumstance or event that may result in an authorized entity
receiving false data and believing it to be true.
|
Incapacitation:
prevents or interrupts system operation by disabling a system component.
Corruption:
Undesirably alters system operation by adversely modifying system functions
or data.
Obstruction:
A threat action that interrupts delivery of system services by hindering
system operation.
Masquerade:
An unauthorized entity gains access to a system or performs a malicious act
by posing as an authorized entity.
Falsification:
False data deceive an authorized entity.
Repudiation:
An entity deceives another by falsely denying responsibility for an act.
|
Usurpation
A circumstances or event that results in control of system
services or functions by an unauthorized entity.
|
Misappropriation:
An entity assumes
unauthorized logical or physical control of a system resource.
Misuse:
Causes a system component to perform a function or service that is
detrimental to system security.
|
Types of System Intruders
- Masquerader
- Hackers
- Clandestine user
Parts of Virus
- Infection mechanism
- Trigger
- Payload
Virus stages
- Dormant phase Virus is idle.
- Propagation phase Virus places an identical copy of itself into other programs or into certain system areas on t the disk.
- Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system events
- Execution phase Function is performed
Key Terms
Cyber crime- a
crime committed or assisted through the use of the Internet.
Privacy Policy/Terms
of Services (ToS) - tells the user how the website will handle its data.
Malware- stands
for malicious software.
Virus- a
malicious program designed to transfer from one computer to another in any
means possible.
Worms- a
malicious program designed to replicate itself and transfer from one file
folder to another and also transfer to other computers.
Trojan-a
malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get
your information.
Spyware- a
program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through key logging.
Adware- a program
designed to send you advertisement, mostly pop-ups.
Spam- unwanted email
mostly from bots or advertisers.
Phishing-
acquires sensitive personal information like passwords and credits card
details.
Pharming- a more
complicated way of phishing where it exploits the DNS system.
Copyright- a part
of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means
that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used
to record the keystrokes done by user. This is done to steal passwords or any
other sensitive information.
Rogue security softwares-
is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
Four search
strategies
- Keyword searching
Enter terms to search
Use quotation marks to search as a
phrase and keep the words linked together
Common words are ignored (That, to,
which, a, the ...)
+ and – can be used to include or
exclude a word
- Boolean
AND - enter words connect with AND- it
will include sites where both words and found
Uses: joining
different topics (i.e. global warming AND California)
OR - requires at least one
of the terms is found.
Uses: join similar or synonymous
topics (i.e. global warming OR greenhouse effect)
NOT - searches for the first term and excludes sites that have the
second term.
(i.e. Washington
NOT school)
- Question
a question may be entered in the search field of search engine
- Advanced
Features are offered on many
engines by going to an "Advanced search" page and making selections.
Effective in narrowing search returns to a specific topic or phrase.
No comments:
Post a Comment