Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg
Online Threats 1. Malware 2. Spyware 3. Spam 4. Phishing 5. Virus 6. Adware 7. Cookies 8. Pharming 9. Bluejacking 10. Bluesnarfing 11. Browser Hijacking 12. Keylogger 13. Trojan horse 14. Antivirus software 15. Firewall 16. Rootkits 17. Ransomware 18. Computer worm 19. Browser exploit
Online threats infographics rendlabs-security- intelligence/threat- morphosis/ rendlabs-security- intelligence/threat- morphosis/ rendlabs-security- intelligence/are-you-safe- online/ rendlabs-security- intelligence/are-you-safe- online/ nline-threats-101- infographic/ nline-threats-101- infographic/
Phishing Is sent as an Is from someone who claims to be a legitimate enterprise The directs the user to a web site asking them to update their personal information Attempts to gain the person’s personal information and can lead to identity theft
Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops
Spyware Appears as Trojan Horse, acts as a virus changes homepage without you knowing Tracks websites you visit Installs new spyware w. out approval Uses memory so system moves slower Quick scan computer removal Found this info at :
What Spam is? Flooding the internet Most commonly commercial advertising Cost VERY little to send Legal & illegal Illegal Spam = steal your money What it’s not? SPAM RESROUCES: NOT THE HAM
+ Malware A.K.A. “Malicious Software” “Cyber Crime” Viruses Keyloggers Trojan Horse Hackers Create from: malware.htm
Bluesnarfing Violating wireless security on Bluetooth-enabled devices to access data Preventing Update device Don’t allow strangers to contact you Strong passwords Keep sensitive data off these devices Stay 31ft way from stranger laptops
Browser Hijacking A form of malware, spyware, or virus Replaces existing internet browser home page with its own Used to force hits to a particular website
Adware: What Is It and How Can You Avoid It? Adware: Advertising Supported Software A software program that produces advertisements Designed to sell products for their authors How To Avoid It? Antivirus Software Popup Blocker Picture Sources: Popups: up_adhttp://en.wikipedia.org/wiki/Pop- up_ad Computer Lady: /12/flummoxed-frustrated.html /12/flummoxed-frustrated.html
Bluejacking What is it? Unsolicited messages sent via Bluetooth The technological version of doorbell ditching & prank phone calls How? Takes advantage of a loophole in the technology’s messaging options Bluejacker will camp out in crowded areas (i.e. shopping malls, airports, subway system)
PHARMING!!!!! Hackers intending to change IP Address Obtain access to credentials Usernames and passwords Dangerous for banks and major businesses Special protection Sources Wikipedia, edublogs, campchestnutridge
Cookies Encrypted text files in browser directories. Created when user’s browser loads to particular site. Help users navigate their websites NOT viruses: not compiled of code pieces Not self executing. CAN act as a form of spyware Website: Image:
Cookies: Internet Small Look up table containing pairs Ex. (first name, Hannah)(last name, Rudolph) Form on newly loaded webpages Conveniently carry information on webpages They are destroyed when Window is closed Cookies are visible to all people Webpage:
Computer Virus Able to reproduce themselves Placed in commonly used programs When program is run, virus multiplies Interfere with computer operations Often spread through attachments Sources: