Computer
Lingo...and...What You Should Know About It
by
Allen
Weintraub
Anthem Opinions
Administration
The Best Defense against being violated and
abused on the internet is good information.
As a follow-up to my last article about my
getting hacked, I present to you to better educate you.
When it comes to cyber-security, it's
important to understand what common security "buzzwords" and technical terms
mean and how they impact you.
In this message, we'll take a look at the
following terms:..
Malware
eMail spoofing
Pyramid scheme
Social
engineering
Malware
This is short for "malicious
software".
Malware is an
all-encompassing term that includes viruses, ransomware, worms, trojan horses, rootkits, key-loggers, dialers, spyware, rogue security
software, etc. installed on your computer, phone or mobile device without
your consent.
Malware can be
used to crash your computer, monitor, and/or control your online activity.
Criminals use
malware to steal your information, send spam, or commit fraud.
Malware can
often be detected using up-to-date anti-virus software, which should be run
regularly on your computer, smartphone and/or
tablet.
eMail
Spoofing
eMail spoofing occurs when a forged
sending address is used in the delivery of an eMail.
Spam and phishing eMails typically
use spoofing to mislead you about the origin of the
message.
For example, an eMail arrives
in your mailbox apparently from your friend "John Doe"; but rather than coming
from JohnDoe@valideMail.com, it is actually coming
from BadGuy@stealyourstuff.com.
Opening such messages can lead to having
malware installed on your computer, smartphone or
tablet.
Pyramid
Schemes
If you
have an eMail account, you've seen this one: a get-rich-quick scheme designed
to take your money.
The
technical definition of a pyramid scheme is an unsustainable business model involving promising
participants' payment or services, primarily for enrolling other people into the
scheme, rather than supplying any real investment or sale of products or
services to the public.
The best defense: if it sounds too good to
be true, it probably is, so just delete such messages upon
receipt.
Social
Engineering
Of all our terms for today,
social engineering is perhaps the most
interesting.
In the
context of computer security, it refers to the manipulation of people into
performing actions or divulging confidential information.
As a type
of "confidence trick" or "con"; for the purpose of information gathering,
committing fraud, or gaining system access, it differs from a traditional con
in that it is often just a first step in a complex fraud
scheme.
An example would be pretending to be someone familiar to you - either personally or as part of a group - and then playing on that "association" to exploit you for personal information, computer access or money.
You can avoid such manipulation by
being absolutely sure of the person you’re communicating with before taking any
actions that might compromise your personal
information.
What's the best advice anyone can
give you ?
The best defense is a good
offense.
Be careful, it is tough out
there.
No comments:
Post a Comment