what is social engineering
phishing
spam/mass
spear (personalized info, target high value
Caution w links
Sender?
Link legit?
pharming
Obtain personal info
Infect legit web w malicious code, redirect to bogus
Web address?
Secure ssl, https
Smishing
Sms phishing
- phone no. or link
Vishing
Alerting the victim to an issue w their account or
Advising the victim of a profitable gain
Malware: Trojan horse
worm
Adware
Malicious bot
How to avoid malware
Rootkit
Ransomware
repetitive strain injury
- need good posture
What is a hacker?
A hacker is someone who tries to gain unauthorized access to your computer with the intention of corrupting or stealing data
What is spamming?
Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails
What is Phishing?
Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.
What is malware?
Malicious software that is downloaded onto a computer unintentionally by a user
Name 3 types of malware?
What is a virus?
A program which is designed to damage a computer system
How can you protect yourself from viruses?
Installing an antivirus program that will regularly scan your computer for threats.
What is a trojan horse?
It gains entry into a user’s computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.
What is a worm?
A worm spreads around from computer to computer in a network. It does this by replicating itself.
What are the problems with worm viruses?
Worms require bandwidth which results in slower data transmission speeds
What is a key logger?
It records a user’s keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user (also used by employers to monitor employees’ activities)