Sunteți pe pagina 1din 2

Reviewer in Empowerment Technology o Electronic Libel and Cybercrime weaknesses and reveal them to

Prevention Act of 2012 system owner.


3rd Quarterly Examination  Hacktivist - A hacker who use
 Hacking is the gaining of unauthorized access to
INTERNET SURFING – Refers to any activity you have done data in a system or computer hacking to send social, religious,
using the internet. o Cookie theft - The hacker creates a fake and political, etc. messages.
user interface and when the user clicks This is usually done by
Dos and /don’ts of using internet or computer: he/she is directed to another site hijacking websites and leaving the
o DNS Spoofing - This basically uses the message on the hijacked website.
Dos:
cache data of a website or domain that  Script Kiddies - A non-skilled
 Keep an updated Anti-virus.
the user might have forgotten about. person who gains access to
 Think twice before clicking anything in the computer systems using already
o UI redness - These are released by the
internet. made tools.
hacker into the files of the website once
 Learn about the different scam online and do they enter into it.  Identity Theft is obtaining the personal or
anything to avoid them. o Virus - This implies replicating the original financial information of another person for the
 Use your common sense while surfing the net website so the unsuspecting user enters sole purposes of assuming that person’s name
 Read the Term of Service before clicking agree. the information like account details which or identity to make transactions or purchases
the hacker seizes and misuses. o Child Identity Theft - Someone uses a
Don’ts: o TYPE OF HACKERS: child's identity for various forms of
 Turn off your Firewall to avoid cyber attack.  Cracker - A hacker who gains personal gain.
 Use a very familiar password for you to unauthorized access to computer o Criminal Identity Theft - misrepresents
remember it. systems for personal gain. The himself as another person during arrest to
 Include important details that you have in intent is usually to steal corporate try to avoid a summons, prevent the
your Facebook account. data, violate piracy rights, transfer discovery of a warrant issued in his real
 Type in ALL CAPS for a much intense message. funds from bank accounts name or avoid an arrest or conviction
 Keep Spam messages on your email's Spam  Ethical Hacker - A hacker who record.
area gains access to systems with a o Financial Identity Theft - Someone uses
view to fix the identified another person's identity or information
CYBERCRIME – Refers to any malicious activity against the weaknesses. They may also to obtain credit, goods, services or
law through the usage of computer via internet. perform penetration testing and benefits.
vulnerability assessment. o Medical Identity Theft - Someone
 Child Solicitation involves the use of information  Grey hat - A hacker who is in identifies himself as another person to
and communication of technology as means to between ethical and clack hat obtain free medical care.
sexually abuse/or sexually exploit children hackers. He/she breaks into o Synthetic Identity - A type of fraud in
 Cyber Libel deals with an online defamation computer systems without which a criminal combines real (usually
authority with a view to identify stolen) and fake information to create a
new identity, which is used to open =AVERAGE(D3,D4)
fraudulent accounts and make fraudulent =AVERAGE(D3, D4, D5)
purchases. IF:
 Phishing is which scammers send a malicious =IF(L14>=4, “DROPPED”, “PASSED”)
email.
o Account Verification - Links points to a Note:
website pretending to be a company’s You should also review the steps on mail
legitimate site and asks for your log in merging. I have not included it in the reviewer for
credentials I know you know it already.
o Cloud File Sharing - Contains a link to what
appears to be shared file on Google docs,
Dropbox or another file sharing.
o Docusign - Comes from a domain similar
to the DocuSign domain. Link will prompt
you to sign in to view the document, giving
attackers control of your inbox.
o Fake Invoice - Contain document
presented as an unpaid invoice and claims
service will be terminated if invoice is not
paid.
o Delivery Notification – a spam messages.
o Tax Scam - Appears to come from a
government tax revenue agency. Claims
you are delinquent on you taxes and
provide a mean to fix.
EXCEL FUNCTIONS/ FOMULAS:
CONCATENATE:
=CONCATENATE(C3, “, “, D3, “ “, E3)
=CONCATENATE(C3, “,“, “ “, D3, “ “, E3)
CASES:
=LOWER(D3)
=UPPER(D3)
ARITHMETIC:
=SUM(D3:D4)
=SUM(D3, D4, D5)

S-ar putea să vă placă și