L2 Rules of Netiquette
L2 Rules of Netiquette
L2 Rules of Netiquette
Ransomware infects a user's system and encrypts its data. Cybercriminals then
demand a ransom payment from the victim in exchange for decrypting the system's
data.
A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an
infected computer system that enables threat actors to remotely access it without
alerting the user or the system's security programs.
Adware tracks a user's browser and download history with the intent to display pop-
up or banner advertisements that lure the user into making a purchase. For
example, an advertiser might use cookies to track the webpages a user visits to
better target advertising.
Internet Threats:
What is a keylogger?
-Keyloggers are software programs that leverage
algorithms that monitor keyboard strokes through
pattern recognition and other techniques
Internet Threats:
What is pharming?
is a type of social engineering
cyberattack in which criminals redirect
internet users trying to reach a specific
website to a different, fake site. These
“spoofed” sites aim to capture a victim’s
personally identifiable information (PII)
and log-in credentials, such as passwords,
social security numbers, account
numbers, and so on, or else they attempt
to install pharming malware on their
computer.
`
TASK this WEEK
Activity 1 (Netiquette Poster-Slogan)
-Create your personal Netiquette by creating
a poster-slogan on how you safeguard
yourself online. Do this on any size of bond
paper.