comp security
How to diagnose if ur systems been hacked
-fake antivirus messages- if u notice these, power down ur comp and rebook in safe mode. In safe mode run ur antivirus program - unwanted browser toolbars frequent random popups fake emails or social media messages from your account
How do computer viruses work
1 Virus arrives via email attachment, file download, or by clicking in an infected website 2 An action trigger the virus 3 the virus spreads to other computer/devices or network 4 the activated virus starts its destructive actions
Starting a windows comp in safe mode
1 click the windows button 2. click settings 3scroll to view all options 4update and security 5 recovery 6 restart now 7 after rebooting the system, you will enter windows re (recovery environment) 8 trouble shoot 9 adv options 10 startup settings 11 restart 12 use number or function keys to enable safe mode
customize cookies
1 open the desktop and then tap or clikc the internet explorer icon on the taskbar tap or click the tools button and then tap or click internet options on the privacy tab,
how do i allow cookies in internet explorer
1 open the desktop and then tap the inetexpl icon on the taskbar 2 tap the tools button then internet options 3 tap the privacy tab and under settings, move the slider to the bottom to allow cookies, and then tap or click OK.
internet explorer delete cookies
1 tap to open internet explorer/edge swipe in and tap settings tap options then under history click select select cookies then delete
Cyber Crime
A crime in which a computer is the object of the crime or is used to commit a criminal offense
Keystroke logger
A form od spyware that records all actions typed on a keyboard can be hardware devices and software applications software based keystroke logger are often a trokan that is installed without the user's knowledge key stroke loggers can record passwords and conf info
Macro virus
A virus written in a macro lanf and plaved within a doc or spreadsheet when file is opened the macro virus is executed commands in the macro lang set off the destructive elements can be avoided by not downloading or opening the attachment
Spyware
Collects info about ur internet surfing habit and behaviors includes the collection of keystrokes, passwords, and conf info Often installed via free downloads of by visiting certain illegitimate websites
What to do if u get a phishing message
Do not give out personal info if you receive a suspicious message, contact the institution that the message was allegedly sent from report the incident to US CERT
Dos and DDoS attacks
DoS attack: Interrupt network traffic by flooding servers with too many requests DDos : Most common dos attack botnet sends out illegitimate messages creating huge volumes of network traffic high volume of traffic causes a network crash
how do firewalls work
Filter all info coming thru the internet to ur network or comp system there are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or networking including packet filters- a packet filter inspects each packet leaving or entering a network proxy server- intercept all messages between client and server
internet filter
Firewall software used to block a user's access to specific internet content software can reside on a computer stand alone filter attached to a server network
Ransomware
Makes comps data inaccessible until a ransom payment is made encrypts data, forcing victim to buy a decryption code. Payment is made using bitcoin or prepaid cards Attack usually comes via trojan- legit looking email worm- in a comp network an alternative version of a ransomware threatens to make the victim's confidential files public
Pharming
Phising that seeks to obtain personal info thru malicious software that is inserted on a victims comp redirects the user to a phony web page when users reach the fake web page they are encouraged to enter the personal info
Packet Sniffer
Specialized hardware or software that capture packets transmitted over a network sniffers examine each packet passing thru a router gateway and search for specific data legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal info packet sniffers can be very diff to detect
Single event cyber crime
Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus
Zombie
a comp controlled by a hacker groups of compromised comps that are controlled by a hacker are called botnets or zombie armies hackers use zombies to send spam from multiple ip addresses launch a dos attack
spam filter
a comp software that is designed to prevent spam messages from entering into a user's email inbox Spam filters are known as span blockers or anti spam spam filters search for spam by monitoring suspicious word patterns and frequencies
Cyber attack
a deliberate misuse of comps and networks via the internet. use malicious code Cyberattacks use a malicious code to modify the normal operations of a computer or network Cyberattacks include the following Pharming and ohishing spamming and spoofing spyware trojans and viruses identity and information theft dos and ddos
Worm
a destructive program that replicates itself throughout a single comp or across a network automatically reproduces itself designed to attack both wired and wireless networks replication exhausts network bandwidth or available storage
firewall options
a firewall is an app that executes diff tasks than those executed by antivirus or anti-malware apps. Firewalls help protect against worms and hackers, anti-virus apps help protect against viruses anti-malware apps help protect against malware. You need all 3 to be fully protected
Hacker
a person who attempts to gain unauthorized access to networks commonly attempts to steal and corrupt info and data the term hacker and cracker are synonymos first network of hackers cap'n crunch (john draper)
Trojan
a program that appears legit but executes an unwanted activity when activated often used to find passwords, destroy data, or to bypass firewalls similar to viruses, but do not replicate themselves often found attached to free downloads and apps
managing cookies in mozilla firefox
according to mozilla, cookies store: personally identifiable info info can be stored if u provide it
Script Kiddie
amateur comp hackers w little programming expertise illegally gain access to computer systems using programs (scripts) that others have written do not have the skill or experience to write their own programs
Online nuisnaces
annoying software programs that can slow down the ops of a comp, clog email, lead to the theft of info and money ex spam spyware phishing and pharming trolling and spoofing
email virus
attached in a file in and sent via email message. When that file is opened, the virus infects the comp 3 types: phishing- tricks users into revealing usernames and passwords by appearing legit ransomware- when activated encrypts files on user hard drive and then sells a decryption program keystroke logging trojan- when activated, saves all keystrokes for subsequent transmission to virus creator
Managing cookies in google chrome
blocking/allowing cookies by default deleting cookies make exceptions for cookies from specific websites or domains
Black hat hacker
break into comp systems with the intent of causing damage or stealing data aka hackers or crackers richard stallman invented the def to express the maliciousness of a criminal hacker vs a white hate hacker
Network Address translation NAT
by cisco, used by firewalls, routers, and comps that are part of a network connected in the intenret used in firewalls to provide protection from outside network intrusions by hiding internal ip addresses can be used to prevent many types of network attacks but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the os
password tips and techniques
change ur password frequesntly use generic passwords keep your password private use a comb of letter, symbols, and numbers, check ur accounts
delete cookies in chrome
click chrome menu settings show adv settings privacy section, content settings cookies section change: all cookies and data to open remove all click x
remove cookies or stored data in safari
click remove all website data select and remove
Antivirus software
comp program that is used to scan files to identify and remove computer viruses and other malicious programs common techniques are using signature based detection and heuristic based detection other techs include behavioral detection and cloud based detection
Virus symptoms
comps infected w a virus exhibit many symptoms: os doesn't launch properly Files get deleted or encrypted Strange error messages or pop up ads docs wont save comp runs slower programs launch on their own
How to turn on parental controls
control panel, user friendly accounts, set up click the one ya want under p cs click on pc, can limit time and access
Managing cookies
determine what cookie settings are preferred cookie settings must be adjusted in each browser you use cookie settings in web browsers delete cookies block/customize cookies allow cookies
Blocking cookies in firefox
go to website u wanna block view page info, permissions pannel set cookies, remove check mark from use default change settings to block
Hacktivism
hacking for a politically or socially motivated purposes Uses same techniques as a hacker but does so in order to disrupt services and bring attention to a political or social cause
Cyberbullying
harassing using digital devices and networks in a repeated and deliberate manner includes (among others) emails, blogs, texts, with the intension of harming another person cyberstalking is a form of cyberbullying
Firewall
hardware or software used to keep a comp secure from outside threats such as hackers and viruses allow or block internet traffic in and out of a network or computer the most ideal firewall configuration consists of both hardware and software personal software firewalls are typically included with the operating system hardware based firewalls can be purchased as a stand alone product
Phishing
illegitimate use of an email message that appears to be from an established orgainization often contain the comps logo and identifying info use legitimate looking email messages
safe browsing tatics
incognito be cautious when using social media Virtual private network VPN can protect ur online identity HTTPS check for it
Avoiding viruses
install the latest antivirus software and update it surf the web and download content safely only visit trusted sites removes any usb drives and dvds before booting your comp purchase a new router every other year to ensure you have the latest firewall protections adjust your web browders security setings to allow browsing only on trusted sites never bypass your browser's built in security features dont use a discarded hard drive
how antivirus works
look for sig (code of virus) once its identifed the software tries to remove the file
fee based vs free antivirus software
main diff is number of features free comes with ads most of the free were just as effective
White hat hacker
non malicious comp security experts test the security measures of an organization's info systems to ensure they are protected against malicious intrusions
On-going series of events cyber crime
on going series of events more serious than single event cyber crimes: cyber stalking, child predatation
adjusting cookie settings in microsoft edge
open m edge press 3 dot more button settings, view adv settings drop down select block all cooks or b all 3p cooks
block cookies internet expl
open the desktop and then tap internet explorer icon tap tools button then internet options tap privacy tab and block
How viruses can infect a digital device
opening an infected email attachment downloading an infected file from the internet sharing infected files visiting a contaminated website disguised as images, audio, or video files
damage comp hardware
power surge protecting a digital from overheating- heat can hurt protecting from humidity- humidity sucks for comps protecting a dd from magnetic fields-
how to diagnose the effects of online nuisances
receiving span emails and bounced back email frequent pop ups while searching the web pop ups start appearing after visiting unfamiliar sites
Password
secret code - used to secure many things doesnt identify the authenticity of user terms passcode and keycode are synon 4 passw
fire fix delete cookies
set time range to clear everything explain history list select cooks and other items click clear
Malware
short for malicious software designed to steal info destroy data incapacitate a comp or network frustrate the user common malware viruses worms trojan horses
Cookie
small text file of info created by websites u visit that ur web browser stores on ur hard disk First-Party cookie created by visited websites to optimize browsing Third-party cookie created by a website other than the one you are currently visiting and are used to track your surfing habits
persistent cookie
small text files stored on hard drive collect info reguarding user preferences password and username info ip address data on websurfing behavior
Adware
software that collects the user's web browsing history data is collected to create unsolicited targeted pop up ads adware often accompanies downloaded programs
Computer virus
software that infects computers created using comp code typically must be run to attack and do damage can destroy programs or alter the op of a comp or network
Session cookie
stroed in temp memory and is lost when the browser is closed determine the star and end of a session analyze and measure traffic on a webpage determine the web browser being used
protecting a dd from power surges and volt differences
surge protector uninterruptiple power supply UPS - surge suppression and power backup voltage diffs when traveling
apple parent controls
sys pref, pc lock icon select user and enable
Rootkit
type of malware that hides in the operating system and is triggered each time you boot your computer a rootkit allows a remote user to install rogue files use and take control of the comp by creating a backdoor that bypasses security delete files
Spam
uncolicited email sometimes called UBE unsolicited bulk email and are used for a variety of marketing purposes including selling products and services messages may contain a variety of malicious programs
password management
use a strong password and never use the same password twice experts suggest using password management software to keep passwords safe
Cyberterrorist
uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Attacks include the disruption of e-commerce and gov sites the power grid and public utilities have also been targeted pentagon 1,000 hack attempts per day
Spectre and meltdown
vulnerabilities impacting computer chips allows unauthorized reading of processor memory could allow a hacker to use apps to change a processors os no single patch can fix these so user should expect to install a number of updates as required
where to download antivirus software
website download.cnet.cim think before you click
privacy risks with cookies
websites can collect your info and can sell it to 3rd parties websites can track ur surfing behavior and create a user profile corporate and gov entities can monitor your web behavior
cookies in safari
you can change options in safari preferences so that safari always accepts or blocks cookies and other website data important: changing ur cookie prefs may change them in other apps
windows firewall
you can customize four settings for each type of network location in windows firewall 1 start 2 control panel 3 system and security, windows firewall 4 adjust windows firewall settings