Sunday, March 19, 2017

LESSON 2: ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE



INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.




NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.



TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human
  •          You need to remember that you are talking to a real person when you are online.
  •          The internet brings people together who would otherwise never meet.
  •          Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.
  •       You need to behave the same way online that you do in real life.
  •       You need to remember that you can get caught doing things you should not be doing       online just like you can in real life.
  •         You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.
  •          Always take a look around when you enter a new domain when surfing the web.
  •          Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.
  •          Remember people have other things to do besides read your email. You are not the center of their world.
  •          Keep your post and emails to minimum by saying what you want to say.
  •          Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.
  •          Be polite and pleasant to everyone.
  •          Always check your spelling and grammar before posting.
  • ·        Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge
  •         Ask questions online
  •         Share what you know online.
  •         Post the answers to your questions online because someone may have the same question         you do.

Rule no. 7: Help keep flame wars under control
  •         Netiquette does not forgive flaming.
  •         Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.

Rule no. 8: Respect other people’s privacy.
  •          Do not read other people’s mail without their permission.
  •          Going through other people’s things could cost you, your job or you could even go to jail.
  •          Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.
  •          Do not take advantage of other people just because you have more knowledge or power than them.
  •          Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.
  •          Do not point out mistakes to people online.
  •          Remember that you were once the new kid on the block.
  •          You still need to have a good manners even though you are online and cannot see the          person face to face.

  Internet security
  Security Requirement Triad
·            
                   Confidentiality
          Data confidentiality
          Privacy
·                  Integrity
         Data integerity                                                        System integrity
·                  Availability

Threat Consequence
Threat Action ( Attack)

Unauthorized Disclosure
A circumstance or event whereby an entity gains access to data for which the entity is not authorized.

Exposure: Sensitive data are directly released to an unauthorized entity.
Interception: An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
Inference: A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.
Intrusion: an unauthorized entity gains access to sensitive data by circumventing a system's security protections.



Disruption
A circumstances or even that interrupts or prevents the correct operation of system services and functions.

Deception
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.

Incapacitation: prevents or interrupts system operation by disabling a system component.
Corruption: Undesirably alters system operation by adversely modifying system functions or data.
Obstruction: A threat action that interrupts delivery of system services by hindering system operation.
Masquerade: An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
Falsification: False data deceive an authorized entity.
Repudiation: An entity deceives another by falsely denying responsibility for an act.


Usurpation
A circumstances or event that results in control of system services or functions by an unauthorized entity.

Misappropriation: An entity assumes
unauthorized logical or physical control of a
 system resource.

Misuse: Causes a system component to perform a function or service that is detrimental to system security.




Types of System Intruders
  •          Masquerader
  •          Hackers
  •          Clandestine user


       

 Parts of Virus 
  •  Infection mechanism
  •  Trigger
  •   Payload



Virus stages
  •    Dormant phase                                                                                                                                   Virus is idle.
  •       Propagation  phase                                                                                                                           Virus places an identical copy of itself into other programs or into certain system areas on t        the disk.
  •    Triggering phase                                                                                                                                 Virus is activated to perform the function for which it was intended.                                             Caused by a variety of system events
  •        Execution phase                                                                                                                                 Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms- a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
Spyware- a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam- unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.
Rogue security softwares- is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.

Four search strategies
  •     Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the ...)
+ and – can be used to include or exclude a word
  •     Boolean
AND - enter words connect with AND- it will include sites where both words and found
   Uses: joining different topics (i.e. global warming AND California)
OR   -  requires at least one of the terms is found.
   Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT - searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

  • Question                                                                                                                                   

 a question may be entered in the search field of search engine    

  •         Advanced                                                                                                                                                          

 Features are offered on many engines by going to an "Advanced search" page and  making selections. Effective in narrowing search returns to a specific topic or phrase.


 




No comments:

Post a Comment