0 evaluări0% au considerat acest document util (0 voturi)
34 vizualizări2 pagini
This document provides information on internet surfing, cybercrime, hacking, and identity theft. It discusses dos and don'ts of internet usage including keeping antivirus software updated and avoiding scams. Cybercrime includes child solicitation, cyber libel, and phishing scams. Hacking methods like cookie theft, DNS spoofing, and viruses are outlined. Different types of hackers such as crackers, ethical hackers, and script kiddies are defined. Identity theft encompasses stealing personal details to assume someone's identity for financial gain, including child and medical identity theft. Excel functions covered include CONCATENATE, CASE, SUM, AVERAGE, and IF statements.
This document provides information on internet surfing, cybercrime, hacking, and identity theft. It discusses dos and don'ts of internet usage including keeping antivirus software updated and avoiding scams. Cybercrime includes child solicitation, cyber libel, and phishing scams. Hacking methods like cookie theft, DNS spoofing, and viruses are outlined. Different types of hackers such as crackers, ethical hackers, and script kiddies are defined. Identity theft encompasses stealing personal details to assume someone's identity for financial gain, including child and medical identity theft. Excel functions covered include CONCATENATE, CASE, SUM, AVERAGE, and IF statements.
This document provides information on internet surfing, cybercrime, hacking, and identity theft. It discusses dos and don'ts of internet usage including keeping antivirus software updated and avoiding scams. Cybercrime includes child solicitation, cyber libel, and phishing scams. Hacking methods like cookie theft, DNS spoofing, and viruses are outlined. Different types of hackers such as crackers, ethical hackers, and script kiddies are defined. Identity theft encompasses stealing personal details to assume someone's identity for financial gain, including child and medical identity theft. Excel functions covered include CONCATENATE, CASE, SUM, AVERAGE, and IF statements.
Reviewer in Empowerment Technology o Electronic Libel and Cybercrime weaknesses and reveal them to
Prevention Act of 2012 system owner.
3rd Quarterly Examination Hacktivist - A hacker who use Hacking is the gaining of unauthorized access to INTERNET SURFING – Refers to any activity you have done data in a system or computer hacking to send social, religious, using the internet. o Cookie theft - The hacker creates a fake and political, etc. messages. user interface and when the user clicks This is usually done by Dos and /don’ts of using internet or computer: he/she is directed to another site hijacking websites and leaving the o DNS Spoofing - This basically uses the message on the hijacked website. Dos: cache data of a website or domain that Script Kiddies - A non-skilled Keep an updated Anti-virus. the user might have forgotten about. person who gains access to Think twice before clicking anything in the computer systems using already o UI redness - These are released by the internet. made tools. hacker into the files of the website once Learn about the different scam online and do they enter into it. Identity Theft is obtaining the personal or anything to avoid them. o Virus - This implies replicating the original financial information of another person for the Use your common sense while surfing the net website so the unsuspecting user enters sole purposes of assuming that person’s name Read the Term of Service before clicking agree. the information like account details which or identity to make transactions or purchases the hacker seizes and misuses. o Child Identity Theft - Someone uses a Don’ts: o TYPE OF HACKERS: child's identity for various forms of Turn off your Firewall to avoid cyber attack. Cracker - A hacker who gains personal gain. Use a very familiar password for you to unauthorized access to computer o Criminal Identity Theft - misrepresents remember it. systems for personal gain. The himself as another person during arrest to Include important details that you have in intent is usually to steal corporate try to avoid a summons, prevent the your Facebook account. data, violate piracy rights, transfer discovery of a warrant issued in his real Type in ALL CAPS for a much intense message. funds from bank accounts name or avoid an arrest or conviction Keep Spam messages on your email's Spam Ethical Hacker - A hacker who record. area gains access to systems with a o Financial Identity Theft - Someone uses view to fix the identified another person's identity or information CYBERCRIME – Refers to any malicious activity against the weaknesses. They may also to obtain credit, goods, services or law through the usage of computer via internet. perform penetration testing and benefits. vulnerability assessment. o Medical Identity Theft - Someone Child Solicitation involves the use of information Grey hat - A hacker who is in identifies himself as another person to and communication of technology as means to between ethical and clack hat obtain free medical care. sexually abuse/or sexually exploit children hackers. He/she breaks into o Synthetic Identity - A type of fraud in Cyber Libel deals with an online defamation computer systems without which a criminal combines real (usually authority with a view to identify stolen) and fake information to create a new identity, which is used to open =AVERAGE(D3,D4) fraudulent accounts and make fraudulent =AVERAGE(D3, D4, D5) purchases. IF: Phishing is which scammers send a malicious =IF(L14>=4, “DROPPED”, “PASSED”) email. o Account Verification - Links points to a Note: website pretending to be a company’s You should also review the steps on mail legitimate site and asks for your log in merging. I have not included it in the reviewer for credentials I know you know it already. o Cloud File Sharing - Contains a link to what appears to be shared file on Google docs, Dropbox or another file sharing. o Docusign - Comes from a domain similar to the DocuSign domain. Link will prompt you to sign in to view the document, giving attackers control of your inbox. o Fake Invoice - Contain document presented as an unpaid invoice and claims service will be terminated if invoice is not paid. o Delivery Notification – a spam messages. o Tax Scam - Appears to come from a government tax revenue agency. Claims you are delinquent on you taxes and provide a mean to fix. EXCEL FUNCTIONS/ FOMULAS: CONCATENATE: =CONCATENATE(C3, “, “, D3, “ “, E3) =CONCATENATE(C3, “,“, “ “, D3, “ “, E3) CASES: =LOWER(D3) =UPPER(D3) ARITHMETIC: =SUM(D3:D4) =SUM(D3, D4, D5)