Potential Abuse & Unethical Use

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

COMPUTER VIRUSES

A computer virus is a program written to alter the way a computer operates, without thepermission or knowledge of the user.• A virus replicates and executes itself, usually doing damage to your computer in theprocess. How to avoid them: Carefully evaluating free software, downloads from peer-to-peer file sharing sites, andemails from unknown senders are crucial to avoiding viruses.• Most web browsers today have security settings which can be ramped up for optimumdefense against online threats. The single most-effective way of fending off virusesis up-to-date antiviruses software from a reputable provider.

IDENTITY THEFT AND FRAUD

An idea of stealing someone else's personal information and files.• The thieves use stolen Social Security card, ID's, etc. to make fake accounts such as bank accounts, credit/debit cards, and also buying things online.

PIRATING

An unauthorized way of reproducing a copy righted book, recording, television program, patented invention, trademarked product, etc.• It's becoming a growing program in our society.

Bring your own device risks

Bring-your-own-device (BYOD)• comes with many risks, primarily from employees being lax about device security and combining work and play in a single device How to avoid:Make sure to implement and enforce an effective BYOD policy. This includes setting clearstandards about what employees can and can't do with their devices, where to draw theline between work and personal use.• Privacy and how the company can access and monitor employee devices for securitypurposes.• Keep all business data completely separate from the rest of the device.

UNSECURED NETWORKS

From cafes to airports, hotels and other areas, plugging tablets into public Wi-Fi hotspots maybe convenient for on-the-go employees, but it's also one of the easiest ways to givecybercriminals access to sensitive data.• Wi-Fi side-jacking — the use of Internet tracking technologies to capture in-transit data, suchas email and other login information, via wireless networks. How to avoid:The best way to protect employee tablets is by installing a virtual private network (VPN), whichconnects users to your company's secure, private network.• Use a carrier-based, paid Wi-Fi hotspot, which lets employees connect to 4G/LTE and 3Gbroadband services.• Instruct employees to ensure that the websites they visit and where they enter privateinformation use Secure Socket Layer (SSL), which encrypts data being sent and received.

HACKERS AND PREDATORS

Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism.• These online predators can compromise credit card information, lock you out of your data, and steal your identity How to avoid:Online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.

Hacking

Invading someone's personal information and files.• Hacking can be figuring out people's usernames and passwords to social media and faking to be that person.

Laptops & computers

Laptops are computers that are portable and a perfect travel companion forlong trips away from home.• They're lightweight and portable.• Computers are electronic devices that can keep and look over data.

Networks

Networks are groups or systems of people or things that are connected to one another.

PHISHING

Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach.• Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages How to avoid:Antivirus solutions with identity theft protection can be "taught" to recognize phishing threats in fractions of a second.

SPYWARE THREATS

Spyware is any program that monitors your online activities or installsprograms without your consent for profit or to capture personal information. How to avoid:Reading terms and conditions is a good way to build an understanding of how youractivity is tracked online.• If a company you don't recognize is advertising for a deal that seems too good tobe true, be sure you have an internet security solution in place and click withcaution.

MOBILE MALWARE

Tablet users are at risk for all types of mobile malware that can wreak havoc and allow unauthorized users into the device and network systems.• Such malware includes root kits that give hackers access to settings and controls,tracking programs that monitor activities, and apps that steal data, such as by capturing usernames and stealing passwords How to avoid:Be wary of free or fake-looking apps, and educate employees on how to tell when a freeapp looks suspicious.• Install a mobile security app that automatically scans, detects and removes malware.

Tablets

Tablets are computers that doesn't have a mouse or keyboard, instead it accepts its users fingers to receive input.

Cyberbullying

The act of harassing someone through any social media calling them names,making threats, starting rumors, etc.• Cyberbullying can lead to serious consequences or can result into victimssuicide.

THEFT AND LOSS

Theft is the action or crime of stealing. Loss is the act of being unable to keep or maintain something or someone. How to avoid: Use a lock screen that requires a PIN, password or, even better, biometrics. ocate and wipe the tablet as soon as possible.

WHAT ARE THE LEGAL PUNISHMENTS?

There are new laws that have made the prison sentence four times what itused to be.• The 6-month sentence is now a 2-year sentence.

PLAGIARISM

This is a way of documenting someone else's work word for word that theyhave completed and stealing it without citing where you got it from.• The act of presenting another's work or ideas as your own.

Be wary of free or fake-looking apps, and educate employees on how to tell when a freeapp looks suspicious.• Install a mobile security app that automatically scans, detects and removes malware.

When a security breach occurs, it almost always results in data loss.• This could mean hackers doing anything from stealing data in the background to locking you out of your device or network systems How to avoid:The simplest way to prevent data loss is to back up data frequently and automatically.• One way to do so is by using a third-party cloud storage solution, such as Dropbox, Box,Google Drive or OneDrive.

HOW TO RECOGNIZE ABUSE

When you see someone using spam, hacking or inappropriately using the internet or any networking to hurt or harass someone is abuse


संबंधित स्टडी सेट्स

Chapter 16: Therapy and Treatment Questions

View Set

Chapter 1: Ten Principles of Economics

View Set

8-Relevant Fitness and Wellness issues

View Set

Ch 44: Oncologic Disorders-Brain & Spinal Cord PrepU

View Set

The Kite Runner Quotation Analysis

View Set