Final Reviewer- Living in It Era
Final Reviewer- Living in It Era
MALWARE – short for "malicious software " -consists of programs that act a user’s knowledge; alters the
operation of computers and mobile devices.
COMMON TYPE OF MALWARES:
1. VIRUS -affects or infects a computer or mobile device negatively by altering the way the
computer or device works without the user’s knowledge or permission.
2. WORM -program that copies itself repeatedly; possibly shutting down the computer or device,
or network; replicate on its own.
3. TROJAN HORSE - hides within or looks like a legitimate program; does not replicate itself to
other computer or networks; creates backdoor to make an entry for third party
2|Page
4. ROOTKIT - hides in a compute or mobile device and allows someone from a remote location to
take control of the computer or device.
5. SPYWARE -program placed on a computer or mobile device without the user's knowledge that
secretly collects information about the user and communicates the information it collects to
some outside source while the user is online.
6. ADWARE -program that displays on online advertisement in a banner, pop-up window, or pop-
under window on webpages, email messages or internet services.
DIGITAL FORENSICS - discovery, collection, and analyses of evidence found on computers and networks.
Many areas of digital forensics:
Law enforcement
Criminal prosecutors
Military intelligence
Insurance agencies
Information security departments
SOFTWARE THEFT- someone steals software media intentionally erases programs; illegally copies
programs.
LICENSE AGREEMENT - right to use the software.
INFORMATION THEFT - occurs when someone steals personal or confidential information.
ENCRYPTION - process of converting data that in readable by humans into encoded characters to
prevent unauthorized access.
DIGITAL SIGNATURE- an encrypted code that a person, website, or organization attaches to an electronic
message to verify the identity of the message sender.
DIGITAL CERTIFICATE- a notice that guarantees a user or a website is legitimate.
SECURE SITE- a website that uses encryption techniques to secure its data.
HARDWARE THEFT- act of stealing digital equipment.
BACK-UP -a duplicate of a file, program or media that can be used if the original is lost, damaged, or
destroyed.
OFF-SITE BACKUPS- stored in a location separate from the computer or mobile device site.
Categories of backups:
FULL BACKUP- copies all of files on media in the computer.
DIFFERENTIAL BACKUP- copies only the files that have changed since the last full backup.
INCREMENTAL BACKUP- copies only the files that have changed since the last full or incremental
backup.
SELECTIVE BACKUP- user choose which folders and files to include in a backup.
CONTINUOUS DATA PROTECTION (CDP)- all data is backed up whenever a change is made.
CLOUD BACKUP- files are backed up to the cloud as they change.
TECHNOLOGY ETHICS- more guidelines that govern the use of computers, mobile devices, information
systems, and related technologies.
4|Page
INTELLECTUAL PROPERTY- refers to unique and original works such as ideas, inventions, art and
writings.. and logos.
INTELLECTUAL PROPERTY RIGHTS- are the rights to which creators are entitled to their work.
COPYRIGHT- protects any tangible form of expression.
DIGITAL RIGHTS MANAGEMENT (DRM)- strategy designed to prevent illegal distribution of movies,
music, and other digital content.
CODE OF CONDUCT- a written guideline that helps determine whether a specification is ethical/
unethical or allowed or not allowed.
GREEN COMPUTING- involves reducing the electricity and environmental waste while using computer,
mobile devices, and related technologies.
INFORMATION THEFT- refers the light of individuals and companies to deny or restriction the collection,
use and dissemination of information about them.
COOKIE- small text file that a web server stores on your computer.
Reasons why website use cookie:
Allow personalization
Store user names and/or passwords
Assist with online shopping
Track how often the users visit a site
Target advertisement
PHISING- scam in which a perpetrator sends an official looking email message that attempts to obtain
your personal and/or financial information.
SOCIAL ENGINEERING- defined as gaining unauthorized access to or obtaining confidential information
by taking advantage of the trusting human nature or some victims and the naivety of others.
EMPLOYEE MONITORING- involves the use of computers, mobile devices, or cameras to observe, record,
and review an employee’s use of a technology.
CONTENT FILTERING- process of restricting certain material.
WEB FILTERING SOFTWARE- restricts access to specified websites.