Netiquette Terms
Netiquette Terms
1. Infection mechanism
2. Trigger
3. Payload
Virus stages
1. Dormant phase
Virus is idle.
2. Propagation phase
Virus places an identical copy of itself into other programs or into certain system areas on the disk.
3. Triggering phase
Virus is activated to perform the function for which it was intended. Caused by a variety of system events
4. Execution phase
Function is performed
Key Terms
1. Cyber crime- a crime committed or assisted through the use of the Internet.
2. Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
3. Malware- stands for malicious software.
4. Virus- a malicious program designed to transfer from one computer to another in any means possible.
5. Worms- a malicious program designed to replicate itself and transfer from one file folder to another and also
transfer to other computers.
6. Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information.
7. Spyware- a program that runs in the background without you knowing it. It has the ability to monitor what you
are currently doing and typing through key logging.
8. Adware- a program designed to send you advertisement, mostly pop-ups.
9. Spam- unwanted email mostly from bots or advertisers.
10. Phishing- acquires sensitive personal information like passwords and credits card details.
11. Pharming- a more complicated way of phishing where it exploits the DNS system.
12. Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable
by law.
13. Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
14. Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive
information.
15. Rogue security softwares- is a form of malicious software and internet fraud that misleads users into believing
there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.