Unit 5. Electronic communication Show
Click play on the following audio player to listen along as you read this section. Security IssuesAlthough Internet led to many benefits, it also poses a greater potential for security threats. Below are a number of common Internet security issues. Hacker– refers to a person who can gain unauthorized access to (break into) a computer or a network to commit crimes. Some things a skilled hacker can do to your computer:
Malware(short for malicious software) – a software that is designed to damage, disrupt, or infect computers.
Computer virus– a specific type of malware that is designed to replicate (copy) and spread from one computer to another.
Trojan horse(or Trojan) – a type of malware that looks harmless but can cause harm to a computer system.
Worm– it is similar to a virus (a sub-class of a virus). It is designed to quickly self-replicate and spread copies of itself from one computer to another.
Phishing– a scammer uses deceptive emails or websites and tries to obtain valuable personal information (i.e., username, password, account number, etc.).
Spyware– a software that secretly monitors (spies) user’s online behaviour and gets sensitive information about a person or organization without the user’s knowledge.
Prevent Cyber ThreatsTips on how to prevent malware from infecting your computer
Some free antivirus software
The Dangers of Hacking and What a Hacker Can Do to Your ComputerComputer hackers can also try to access your computer and private information directly if you are not protected by a firewall. They can monitor your conversations or peruse the back-end of your personal website. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial
information, or much worse. Predators who stalk people while
online can pose a serious physical threat. Using extreme caution when agreeing to meet an online “friend” or acquaintance in person is always the best way to keep safe. What can I do about computer hackers and predators?
Protect yourself while online
Security Tips to Prevent Hacking
Practice safe email and virus/malware protocols
Guard Yourself Against Dangerous Online ThreatsAn unprotected computer is like an open door for computer hackers and predators. To take it a step further, protect your computer from hackers by using a spam filter or gateway to scan inbound email or instant messages. Products like Webroot AntiVirus and Webroot Internet Security Complete thwart dangerous malware before it can enter your PC, stand guard at every possible entrance of your computer and fend off any spyware or viruses that try to enter, even the most damaging and devious strains. While free anti-spyware and antivirus downloads are available, they just can’t keep up with the continuous onslaught of new malware strains. Previously undetected forms of malware can often do the most damage, so it’s critical to have up-to-the-minute, guaranteed protection. Webroot offers complete, cloud-based protection from viruses and identity theft for all your devices, without slowing you down. Click the link to learn more about all of our internet security solutions for the home. Find the right cybersecurity solution for you. What is a computer called that is connected to the Internet and controlled by a hacker without the owner's knowledge?A botnet is a network of private computers that hackers have infected with malicious software. The hackers then control these computers remotely without the knowledge of their owners.
Which computer is used by hackers?Dell Inspiron is an aesthetically designed laptop that can be easily used by professional hackers to perform routine tasks. It has a 10th generation i7 chip that provides high-level performance. Laptop with 8GB RAM, advanced multitasking, and 512GB SSD provides enough space to store files needed for pentesting.
What is the name given to a person who hacks into a computer network in order to test or evaluate its security rather than with malicious or criminal intent?An ethical hacker, also referred to as a white hat hacker, is an information security (infosec) expert who penetrates a computer system, network, application or other computing resource on behalf of its owners -- and with their authorization.
What are the 3 types of hackers?There are three well-known types of hackers in the world of information security: black hats, white hats and grey hats. These colored hat descriptions were born as hackers tried to differentiate themselves and separate the good hackers from the bad.
|