Lesson 4 Internet Threats
Lesson 4 Internet Threats
Lesson 4 Internet Threats
College of Informatics
Hacking
Hacking is a term used to describe actions taken by someone to gain
unauthorized access to a computer. The availability of information online on
the tools, techniques, and malware makes it easier for even non-technical
people to undertake malicious activities.
The process by which cyber criminals gain access to your computer.
• Find weaknesses (or pre-existing bugs) in your security settings and exploit them in
order to access your information.
• Install a Trojan horse, providing a back door for hackers to enter and search
for your information.
Malware
Malware is one of the more common ways to infiltrate or damage your
computer. Malicious software that infects your computer, such as computer
viruses, worms, Trojan horses, spyware, and adware.
Phishing
Phishing is used most often by cyber criminals because it's easy to execute
and can produce the results they're looking for with very little effort.
Fake emails, text messages and websites created to look like they're from
authentic companies. They're sent by criminals to steal personal and
financial information from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update, validate or confirm
your account. It is often presented in a manner than seems official and intimidating,
to encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can access
your accounts (your online bank account, shopping accounts, etc.) and steal your
credit card numbers.
Ransomware
Ransomware is a type of malware that restricts access to your computer or
your files and displays a message that demands payment in order for the
restriction to be removed. The two most common means of infection appear
to be phishing emails that contain malicious attachments and website pop-
up advertisements.
Spam
Spam is one of the more common methods of both sending information out
and collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or pornography
to addresses which can be easily found on the Internet through things like
social networking sites, company websites and personal blogs.
Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a good
chance you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate
software. It is an executable file that will install itself and run automatically
once it's downloaded.
Viruses
Most people have heard of computer viruses, but not many know exactly
what they are or what they do.
Malicious computer programs that are often sent as an email attachment or
a download with the intent of infecting your computer, as well as the
computers of everyone in your contact list. Just visiting a site can start an
a virus. automatic download of
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to capture
personal information.
Virtual “listening in” on information that's shared over an unsecure (not
encrypted) WiFi network.
Worms
Worms are a common threat to computers and the Internet as a whole.
A worm, unlike a virus, goes to work on its own without attaching itself to files or
programs. It lives in your computer memory, doesn't damage or alter the hard drive
and propagates by sending itself to computers in a network – whether within a
company or the Internet itself.
References
• http://www.mccc.edu/~virtcoll/Netiquette
• http://ecampus.matc.edu/student_support/pdfs/7-essential-rules-of-netiquette.pdf
• https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx