Information Pages

Sunday, March 22, 2015

Computer Language

Computer Lingo...and...What You Should Know About It

by
Allen Weintraub
Anthem Opinions Administration

The Best Defense against being violated and abused on the internet is good information.

As a follow-up to my last article about my getting hacked, I present to you to better educate you.

When it comes to cyber-security, it's important to understand what common security "buzzwords" and technical terms mean and how they impact you. 

In this message, we'll take a look at the following terms:.. 

Malware 
eMail spoofing
Pyramid scheme
Social engineering 
Malware
This is short for "malicious software". 
Malware is an all-encompassing term that includes viruses, ransomware, worms, trojan horsesrootkits, key-loggers, dialers, spyware, rogue security software, etc. installed on your computer, phone or mobile device without your consent. 
Malware can be used to crash your computer, monitor, and/or control your online activity. 
Criminals use malware to steal your information, send spam, or commit fraud. 
Malware can often be detected using up-to-date anti-virus software, which should be run regularly on your computer, smartphone and/or tablet.

eMail Spoofing

eMail spoofing occurs when a forged sending address is used in the delivery of an eMail. 
Spam and phishing eMails typically use spoofing to mislead you about the origin of the message.
 For example, an eMail arrives in your mailbox apparently from your friend "John Doe"; but rather than coming from JohnDoe@valideMail.com, it is actually coming from BadGuy@stealyourstuff.com
Opening such messages can lead to having malware installed on your computer, smartphone or tablet.

Pyramid Schemes

  If you have an eMail account, you've seen this one:  a get-rich-quick scheme designed to take your money. 
The technical definition of a pyramid scheme is an unsustainable business model involving promising participants' payment or services, primarily for enrolling other people into the scheme, rather than supplying any real investment or sale of products or services to the public
The best defense: if it sounds too good to be true, it probably is, so just delete such messages upon receipt.


Social Engineering

Of all our terms for today, social engineering is perhaps the most interesting.
In the context of computer security, it refers to the manipulation of people into performing actions or divulging confidential information

As a type of "confidence trick" or "con"; for the purpose of information gathering, committing fraud, or gaining system access, it differs from a traditional con in that it is often just a first step in a complex fraud scheme

An example would be pretending to be someone familiar to you - either personally or as part of a group - and then playing on that "association" to exploit you for personal information, computer access or money. 
You can avoid such manipulation by being absolutely sure of the person you’re communicating with before taking any actions that might compromise your personal information.

What's the best advice anyone can give you ?

The  best defense is a good offense.

Be careful, it is tough out there.





No comments:

Post a Comment