Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Friday, July 9, 2010

Cyber Security - 201 Definitions

What is Internet fraud?

Internet fraud refers to any type of fraud scheme that uses email, websites, chat rooms, or any other Internet related means to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud.

What is Financial Fraud?

Financial fraud is any non-violent offense that is committed by or against an individual or corporation and which results in a financial loss.

Some examples include:

* Cross-Border Fraud
* Romance Schemes
* Advanced Fee Scams
* Charities Fraud
* Debt Elimination
* Investment Frauds
* Job Scams
* Nigerian "4-1-9" Scams
* Ponzi & Pyramid Schemes
* Sweepstakes/Lottery Fraud

What is a hacker, attacker, or intruder?

These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain.

What is malicious code?

Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Examples of malicious code are viruses and worms.

What does anti-virus software do?

Anti-virus software scans files or your computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. It is important that you have the latest definitions installed on your computer since new viruses are released or old ones are changed frequently
.
How do I create a good password?

· Don't use passwords that are based on personal information that can be easily accessed or guessed.
· Don't use words that can be found in any dictionary of any language.
· Develop a mnemonic for remembering complex passwords (ex: I am the Captain of the football team = IatCotft).
· Use both lowercase and capital letters.
· Use a combination of letters, numbers, and special characters.
· Use passphrases when you can (ex: Iamtheleaderofthepack,...or Iamthebossofallthings).
· Use different passwords on different systems.

What do firewalls do?

Firewalls provide protection against outside attackers by shielding your computer or network from attack and subsequent intrusion by restricting the network traffic which can pass through them, based on a set of defined rules. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. They are especially important for users who rely on "always on" connections such as cable or DSL modems.

What are rootkits and botnets?

A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it. Botnet is a term derived from the idea of bot networks. In its most basic form, a bot is simply an automated computer program, or robot. In the context of botnets, bots refer to computers that are able to be controlled by one, or many, outside sources. Your computer may be part of a botnet even though it appears to be operating normally.

What is a phishing attack?

Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email from a seemingly reputable company, financial institution or charity that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts. Attackers often take advantage of current events and certain times of the year, such as:

* natural disasters (e.g., Hurricane Katrina, Indonesia tsunami)
* epidemics and health scares (e.g., H1N1)
* economic concerns (e.g., IRS scams)
* major political elections
* holidays

What is file sharing?

File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may compromise your information, computer or the entire network in jeopardy.

What are Honey Pots?

Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by hackers. They can be used to catch hackers or fix vulnerabilities.

No comments:

Post a Comment