Activity 2. Online Safety, Security Ethics and Netiquette
Activity 2. Online Safety, Security Ethics and Netiquette
ASSIGNMENT:
1. Provide 5 examples of malware and give a brief description of each.
Ex: ILOVEU – description:
a) Zombies = Malicous software that enables a computer to be controlled by a remote
master machine. A cracker, a computer hacker who intends mischief or harm, secretly
infiltrates an unsuspecting victim’s computer and uses it to conduct illegal activities. The
user generally remains unaware that his computer has been taken over , he can still use it,
though it might slow down considerably. As his computer begins to either send out massive
amounts of spam or attack Web pages, he becomes the focal point for any investigations
involving his computer’s suspicious activities. In one case of zombies it was found that over
1.5 million computers were affected in an attack.
REFERENCES:
(help and definitions from google and youtube)
*https://medium.com/@cyntakara/the-different-types-of-malware-trojan-zombie-
bots-spyware-44ab5adaae71
http://www.peachpit.com/articles/article.aspx?p=1960827&seqNum=3
2. Provide 5 real cybercriminals and give a brief description of what they
have done.
Ex. Anonymous – description
a) Kevin Mitnick
-Kevin David Mitnick (born August 6, 1963) is an American computer
security consultant, author, and convicted hacker, best known for his high-
profile 1995 arrest and five years in prison for various computer and
communications-related crimes. Mitnick's pursuit, arrest, trial, and sentence
along with the associated journalism, books, and films were all controversial.
He now runs the security firm Mitnick Security Consulting, LLC. He is also the
Chief Hacking Officer of the security awareness training company KnowBe4,
as well as an active advisory board member at Zimperium,a firm that develops
a mobile intrusion prevention system.
b) Astra
- Astra gained access to French aviation company Dassault Group
computers, stealing weapons technology data for more than five years. Astra
sold information about jet fighters and military aircrafts to countries during
the period spanning the hacks. Astra’s infiltration of Dassault computers
apparently cost the company more than $360 million. Astra’s identity, never
identified, is described by authorities as a 58-year old mathematician. Caught
in January 2008, Astra was sentenced to six years in jail.
c) Gary Mckinnon
- Gary McKinnon is a Scottish hacker who, by hacking into 97 U.S. military
and NASA computers, claims to have found evidence for UFO cover-ups,
and suppression, of free energy.
e) Richard Pryce
- Richard Pryce, was only 16 when he used a basic pounds 750 computer
from his bedroom in north London to infiltrate some of America's top security
establishments.Codenamed Datastream Cowboy, Pryce, now 18, was the
subject of allegations in the United States Senate, where the unknown "spy"
was accused of "causing more harm than the KGB" He has also been described
as "The number one threat to US security".
REFERENCES OF PAGE 2 (cybercriminals):
(help by google)
*https://arstechnica.com/uncategorized/2006/05/6789-2/
*https://rationalwiki.org/wiki/Gary_McKinnon
*https://www.independent.co.uk/news/fine-for-boy-who-hacked-into-
pentagon-1274204.html
*https://www.quora.com/Who-is-the-famous-hacker-Astra-and-what-is-his-
story
*https://en.wikipedia.org/wiki/Kevin_Mitnick
Example: We all know how important a contact list is on our cell phones. The
contact list allows us to save our friends' numbers for easy future reference.
We look up the friend's name and click the call command. The cell phone uses
the number and the associated network technology to reach your friend's
phone. A connection is established and your friend is soon at the other end of
the line.
4. As social netizens, give 2 do's and 2 dont's in dealing with social media.
Do’s :
1st) -Do positive thinking. In dealing, using, interacting or surfing the internet and
social media, it is important to maintain patience and calmness. Patience is a
virtue and it will be tested majorly in the internet, wether its slow connection
buffering or seeing truths, reading unlikely facts and enduring with some
personalities of anonymous people.
Don’t’s :
1st) – Don’t be Ignorant. The first and number one targets of cybercriminals or
simple hackers or scammers are those who lack experience and knowledge,
beause it is more easier to trick or confuse and they wont even know what hit
them. Ignorance and somewhat curiosity can be risky when using the web.
2nd) – Don’t share to much information. People nowadays can be too sharing and
caring. They post more facts about them in a small amount of time which is
dangerous. The things that are essential to your characteristics, personalities,
attributes or description can be valuable and important and some must be kept
personal or private, otherwise, people might use some of the information against
you and get intel about you that could help them outwit you, steal from you,
blackmail you or track you down.
Unauthorized use:
=is the term when the use of a computer or its data is for unapproved or
illegal activities. - Ex: gaining access to a bank computer and performing
an unauthorized bank transfer etc.
Unauthorized access:
=means the use of a computer or network without permission.- by
connecting to it and then logging in as a legitimate user. - do not cause
damages. - merely access the data, valuable information or programs in
the computer.
REFERRENCES:
*https://www.slideshare.net/chrispaul8676/unauthorized-access-and-use