Computer 
Lingo...and...What You Should Know About It
by
Allen 
Weintraub
Anthem Opinions 
Administration
The Best Defense against being violated and 
abused on the internet is good information. 
As a follow-up to my last article about my 
getting hacked, I present to you to better educate you.
When it comes to cyber-security, it's 
important to understand what common security "buzzwords" and technical terms 
mean and how they impact you.  
In this message, we'll take a look at the 
following terms:..  
Malware  
eMail spoofing 
Pyramid scheme 
Social 
engineering 
Malware
This is short for "malicious 
software".  
Malware is an 
all-encompassing term that includes viruses, ransomware, worms, trojan horses, rootkits, key-loggers, dialers, spyware, rogue security 
software, etc. installed on your computer, phone or mobile device without 
your consent.  
Malware can be 
used to crash your computer, monitor, and/or control your online activity.  
Criminals use 
malware to steal your information, send spam, or commit fraud.  
Malware can 
often be detected using up-to-date anti-virus software, which should be run 
regularly on your computer, smartphone and/or 
tablet.
eMail 
Spoofing
eMail spoofing occurs when a forged 
sending address is used in the delivery of an eMail. 
Spam and phishing eMails typically 
use spoofing to mislead you about the origin of the 
message.
 For example, an eMail arrives 
in your mailbox apparently from your friend "John Doe"; but rather than coming 
from JohnDoe@valideMail.com, it is actually coming 
from BadGuy@stealyourstuff.com. 
Opening such messages can lead to having 
malware installed on your computer, smartphone or 
tablet.
Pyramid 
Schemes
  If you 
have an eMail account, you've seen this one:  a get-rich-quick scheme designed 
to take your money. 
The 
technical definition of a pyramid scheme is an unsustainable business model involving promising 
participants' payment or services, primarily for enrolling other people into the 
scheme, rather than supplying any real investment or sale of products or 
services to the public.  
The best defense: if it sounds too good to 
be true, it probably is, so just delete such messages upon 
receipt.
Social 
Engineering
Of all our terms for today, 
social engineering is perhaps the most 
interesting.
In the 
context of computer security, it refers to the manipulation of people into 
performing actions or divulging confidential information.  
As a type 
of "confidence trick" or "con"; for the purpose of information gathering, 
committing fraud, or gaining system access, it differs from a traditional con 
in that it is often just a first step in a complex fraud 
scheme. 
An example would be pretending to be someone familiar to you - either personally or as part of a group - and then playing on that "association" to exploit you for personal information, computer access or money.
You can avoid such manipulation by 
being absolutely sure of the person you’re communicating with before taking any 
actions that might compromise your personal 
information.
What's the best advice anyone can 
give you ?
The  best defense is a good 
offense.
Be careful, it is tough out 
there.
 

 
No comments:
Post a Comment