Module 2 ICT
Module 2 ICT
Email spam
AISO known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one
will eat up your time and can clog your email. Dangerous spams carry virus like Trojan horse and other
malicious software (malware). Spammer is the term used to refer to a person who creates electronic
spam.Spamming is projected to continue because it is a cheap means of advertising. In addition, many
countries do not have laws to punish spammers.
Email spoofing
this refers to deceitful email practice in which the sender address is changed, so that it Would appear to
have come from a different source usually someone you know. Usually, the reply to address is the
source of the email, and when you unknowingly reply to it you would be replying to the one who
spoofed you. Email spoofing is usually used by spammers to hide the origin of the spam.
Phishing
This is a deceitful practice of trying to get confidential information such as passwords and usernames,
and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually
done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon,
and financial institutions to lure you to their website. Internet users would think that they are accessing
a genuine website and through this way, a phisher would be able to gather sensitive information from
internet account user.
Pharming
This is a dangerous hacker attack on a website which directs all traffic to that web site to another
fictitious website. The main object of pharming is to obtain username and passwords, as well as credit
card and financial information, and use these to steal their money electronically or use the credit card of
the victims.
Pharming is a major concern of many online banking and electronic commerce transactions, which
would compromise many of their client accounts as well as the business. Antivirus and anti-spyware
software cannot prevent and protect one from pharming.
Spyware
This is a computer program that is installed covertly on a personal computer to collect information or
even take control over the computer without the knowledge of the user. A spyware program would be
able to monitor and collect information about the user and his internet habits and practices. It is known
that spyware programs also affect the performance and settings of the computer. Major antivirus
companies have incorporated in theirproducts anti-spyware programs, and many internet-based
companies have offered anti-spyware programs for a fee, and some are free. But you must be careful
which one to use to ensure your protection.
Computer worm
This is a dangerous computer program that replicates itself through a network.Some worms delete files,
others disrupt the network function and still, others send junk mail from infected computer. Computer
worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software
regularly send free updates to clients to prevent the spread of the worms. They usually spread on their
own without attaching to a program or file. Users should not run attachments or open emails from
unknown or suspicious sources, delete them immediately. Anti Virus, anti-spyware, and use of firewall
helps to prevent worm attacks, but it must be updated regularly to ensure current prevention and
control.
Trojan horse
This is a form of a malicious software (malware) fronting to perform a good task, but COvertly performs
undesirable function with the intention of entering the computer without the user's consent. Once the
malware is installed in the computer, the Trojan horse can disable the computer's defenses opening it to
unauthorized entry.
It can erase data, can allow access of the victim's computer, can corrupt files, andcan be used in Phishing
for bank accounts. Regularly updated antivirus and anti-spyware programs can detect Trojan horse and
can delete them.
Computer virus
This is a program that duplicates itself and then infects the computer. It spreads like a real biological
virus, wherein it attaches itself to a host program and infect other Computers if it is received by a
computer through the internet. The virus can also transferred by the use of removable storage media
such as diskette, CD, flashdrives, memory cards, and others. Damage by the computer virus may be mild
to severe. Data loss and crippled functionality of the computer have created specialist to combat deadly
computer viruses. Many antivirus programs are effective against the threats, but should be regularly
updated to remain successful in prevention and fight against these computer viruses.
Hacker
This is a person who is able to enter and control other people's computer withoutauthorization. A
hacker is able to enter another's computer, usually vandalizes the victim's website, steals personal
information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent
entry by hackers.
Windows Security
It is sometimes necessary to protect important work and personal information stored in the computer.
There are also situations that you want to prevent other people from using your computer. Imagine if
you have worked on a project for several hours or days, and then one day, you found out that it was
deleted by someone else by accident. Microsoft Windows has security features that determine who can
use and have access to your computer.
Windows operating system provides user accounts in your operating system to determine and manage
the different kinds of users in one computer. This is to ensure the security and privacy of each user who
will use the computer.
1. Go to Control Panel.
3. In the User Accounts window, you will see tasks that you can do with your account.
1. Computer administrator - controls all the contents and users of the Computer, installs programs,
adds, and deletes users.
2. Limited account- has limited control and only have access to his/her particular account.
3. Guest- accounts created for transient users and do not have access to the other computer accounts
and their content.
Once you are in the account, you can pick any change that you like:
1. Change my account name - If you want to change your name displayedin your account.
6. Change my account type - You can set an account either as Computer Administrator or Limited.
Creating a new password requires you to have a user name first. once that is created, click on Create a
password and a dialog box will appear and will require you to type in a new password and retype it to
confirm on the next line. You will be asked to type a word or phrase to help you remember your
password in case you forget it later on. When creating a password, be aware that it is case sensitive, this
means that letters that are capital or small must be typed as they are when you enter them the first
time. Otherwise, you will not be able to open the computer using your account name.
The password that you create should be at least eight characters which could be a Combination of
uppercase and lowercase letters, symbols, and numbers. A secure password ideally should not be a real
word that anyone can easily guess. Make Sure
to remember the password by writing it and keeping it in a safe place or creating password hint.
Changing Passwords
Click the User Account icon from the control panel (Category view) and then select Change an account.
You will be prompted to Pick an account to change. You can create or change a password on an existing
account; otherwise, create a new account and a password for that new account. Assuming you are the
administrator and want to change your password, click on your account. You will be asked What do you
want to change about your account? Select the Change my password to change the existing password. A
dialog box will appear and require you to enter the current password and then the new password should
be typed twice on the space provided. Click Change Password, when you are done, otherwise, press
Cancel if you wish to discontinue.
There is a very big possibility that you will forget your password if you do not use your account very
often. In this situation, it is helpful that you create a password hint that will be easily remembered and
one that is meaningful to you. However, be aware that your password hint will also be visible to others
who will use your Computer.
Whenever you forget your password, check on the hint you have created. Thepassword hint is found on
the Welcome screen beside the password prompt. If you still could not remember your password, and
you have created a password reset disk, you can use that disk to log on and create a new password. If
the above steps are not available and have not helped you, then ask the computer administrator
tocreate a new password for you.
Most operating systems has a feature that allows you to lock the computer even when the computer is
in a screen saver mode. This means that, even if your computer is open, no one will be able to access
your computer account from a Screen saver mode.
Security Center
The Security Center of Windows is the place where you can set additional protectionfrom threat to your
computer, especially when using the Internet. There are threeimportant security settings available;
Firewall, Automatic Updates, and VirusProtection.
1. Firewall helps in protecting your computer from unauthorized entries, viruses, or worms from the
Internet or network. It is recommended that you keep this setting turned on. Windows Firewall,
however, allows some exception to programs and services that helps some application programs to
work better, as well as sites thatyou trust. A selection box which says Don't allow exceptions is available.
Whenthis box is checked, all incoming programs will be blocked. This is important when you are
connected on a public Wi-Fi Internet connection where security is less secure.
2. Automatic Updates is another feature of Windows which when turned on willautomatically download
updates from Microsoft Windows website. Many of theupdates coming from Microsoft are usually
meant to update some Windows feature, secure areas of vulnerability, fix any bugs in the operating
system, and others.
3. Virus Protection is usually about the current antivirus software installed in your computer; this option
is recommended to be turned on always. Antivirus software is meant to locate, find, and remove virus
threats that are already in your computer.It also prevents other malware (malicious software) from
gaining entry into your computer. Antivirus program should be constantly updated to ensure that its
Anti-virus definition is current.
When you open the antivirus program, you will see settings and prompts that you can adjust, activate,
and fix. In the Antivirus window below, you will find the length of subscription, protection status, last
date it was updated, and the last time the Computer was scanned. There is also a summary report or
logs for all security activities. If you are always using the internet, it is recommended that you install the
Antivirus with Internet Security; it has lots of PC protection aside from the Antivirus packed into it.
The Ten Commandments of Computer Ethics was written by Dr. Ramon C. Barquin in 1992 for the
Computer Ethics Institute. He wrote a paper entitled "In Pursuit of a Ten Commandments for Computer
Ethics". Ramon C. Barquin stated that it is a means to create a set of standards to guide and instruct
people on the ethical use of computers. The Ten Commandments of Computer Ethics copies the style of
the Ten Commandments from the Bible which use "thou shalt" and "thou shalt not" style ofwriting.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.