Designed to use modes of transport emails flash

This preview shows page 21 - 23 out of 27 pages.

Designed to use modes of transport (emails, flash drives, networks) Zombies & Bots o Computers that have been hijacked o Botmaster uses malware to hijack hundreds of computers and is able to remotely control them o Botnet (robot network) = network of comps where each comp has been implanted with instructions to wait for commands from the person controlling the botnet Ransomware o A botnet is used to install this and holds data on comp/use of comp hostage until payment o Encrypts target’s files and attacker tells victim to make payment to get decryption key Time, logic and email bombs o Time bomb = is malware programmed to go off at a particular time/day o Logic bomb = detonated when a specific event occurs (ex: all personnel records are erased when an electronic notation is made that a particular person was fired) o Email bomb = overwhelm a person’s email by secretly subscribing it to dozens of mailing lists Cellphone malware o Spread via Internet downloads, MMS attachment, Bluetooth transfers o Show up disguised as applications like games and free programs o Protect phone: Turn off Bluetooth discoverable mode Check security updates to learn about filenames to watch out for Install security software -How do cyberthreats spread? Email attachments Infected disks/flash drives Clicking on infiltrated websites Downloading infected files from websites Infiltrated Wi-Fi hotspots From on infected PC on a LAN to another -What can you do? Install antivirus/firewall software
Don’t use same password and make password complicated enough Don’t give out info Install antispyware software Encrypt financial/personal records so only you can read them Back up data Never download from a website you don’t trust -Encryption Process of altering readable data into unreadable form to prevent unauthorized access Uses powerful mathematical ciphers to create coded messages that are difficult to break Unencrypted messages are known as plain text Encrypted text is known as cybertext You use an encryption key to encrypt and decrypt coded messages 6.7 Concerns about Privacy and Identity Theft Privacy = the right of people not to reveal info about themselves Threats to privacy o Name migration o Résumé rustling & online shopping o Government prying/spying Identity (ID) theft/ Theft of Identity (TOI) o Crime in which thieves hijack your name, identity, and use your info/credit rating to get $ Wallet/purse theft Mail theft Mining the trash Telephone solicitation Insider access to database Outside access to database o If it happens, contact: Credit card companies Banks Department of automotive vehicles Utility and phone companies Local police Federal trade commission Unit 6: Assessing Hardware & Software 6A – How to test hardware function What to check? Major components o Screen Screen is made of very small pixels that display 3 basic colors: red, green, blue Check for dead pixels (dots) that display one color or don’t turn on Check online with: CheckPixels

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture