0% found this document useful (0 votes)
57 views1 page

Netiquette Terms

The document discusses parts and stages of viruses including dormant, propagation, triggering, and execution phases. It also defines key cybersecurity terms like malware, viruses, worms, Trojans, spyware, and phishing. Finally, it outlines four search strategies: keyword, Boolean, question, and advanced searching.

Uploaded by

Rhene Alvarez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views1 page

Netiquette Terms

The document discusses parts and stages of viruses including dormant, propagation, triggering, and execution phases. It also defines key cybersecurity terms like malware, viruses, worms, Trojans, spyware, and phishing. Finally, it outlines four search strategies: keyword, Boolean, question, and advanced searching.

Uploaded by

Rhene Alvarez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Parts of Virus

1. Infection mechanism
2. Trigger
3. Payload

Virus stages
1. Dormant phase
Virus is idle.
2. Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on the disk.
3. Triggering phase
Virus is activated to perform the function for which it was intended. Caused by a variety of system events
4. Execution phase
Function is performed

Key Terms

1. Cyber crime- a crime committed or assisted through the use of the Internet.
2. Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
3. Malware- stands for malicious software.
4. Virus- a malicious program designed to transfer from one computer to another in any means possible.
5. Worms- a malicious program designed to replicate itself and transfer from one file folder to another and also
transfer to other computers.
6. Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information.
7. Spyware- a program that runs in the background without you knowing it. It has the ability to monitor what you
are currently doing and typing through key logging.
8. Adware- a program designed to send you advertisement, mostly pop-ups.
9. Spam- unwanted email mostly from bots or advertisers.
10. Phishing- acquires sensitive personal information like passwords and credits card details.
11. Pharming- a more complicated way of phishing where it exploits the DNS system.
12. Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable
by law.
13. Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
14. Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive
information.
15. Rogue security softwares- is a form of malicious software and internet fraud that misleads users into believing
there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.

Four search strategies


1. Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the ...)
+ and – can be used to include or exclude a word
2. Boolean
AND - enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
OR - requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)
NOT - searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

3. Question - a question may be entered in the search field of search engine


4. Advanced - Features are offered on many engines by going to an "Advanced search" page and making
selections. Effective in narrowing search returns to a specific topic or phrase.

You might also like