SlideShare a Scribd company logo
1 of 14
Cyberethics
Malware or malicious software is any
software intentionally designed to cause
damage to a computer, server, client, or
computer network
A wide variety of malware types exist,
including computer viruses, worms, Trojan
horses, ransomware, spyware, adware.
Ransomware is a type of malware from cryptovirology that
threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid. While some simple
ransomware may lock the system in a way which is not
difficult for a knowledgeable person to reverse, more
advanced malware uses a technique called cryptoviral
extortion, in which it encrypts the victim's files, making
them inaccessible, and demands a ransom payment to
decrypt them
Spyware describes software with malicious behavior that
aims to gather information about a person or
organization and send such information to another entity
in a way that harms the user.
Trojan horse is any malware which misleads users of its
true intent. The term is derived from the Ancient Greek
story of the deceptive Trojan Horse that led to the fall of
the city of Troy.
Phishing is a form of fraud in which an attacker masquerades as a
reputable entity or person in email or other forms of
communication. Attackers will commonly use phishing emails to
distribute malicious links or attachments that can perform a variety
of functions. Some will extract login credentials or account
information from victims.
Eavesdropping is the act of secretly listening to the private
conversation or communications of others without their consent in
order to gather information.
Proprietary software consists of software that is licensed by the
copyright holder under very specific conditions. In general, you can use
the software, but you are not allowed to modify the software or
distribute it to others.
The original source code for the software is not available, which means
you can't see the actual code written by the programmers. Proprietary
software is, therefore, also referred to as closed-source software.
Shareware is proprietary software that is made available to users at no
cost under certain conditions. It is distributed on a trial basis with the
understanding that the user may need or want to pay for it later.
Freeware is a software which is distributed for free use but not for
modification to the users. Its source code is not distributed free. Ex.
Google chrome, internet explorer
Open-source software, as the name suggests, is software for which the
source code is released. This means that users can look at exactly how
the software was created using one or more programming languages.
This is done on purpose so that anyone can benefit from using the code.
A typical license for open-source software gives users the right to modify
and distribute the software.
W3C : World Wide Web Consortium is an international organization
committed to improving the web or to set standard for web.
Plagiarism
Plagiarism is the representation of another author's language,
thoughts, ideas, or expressions as one's own original work.
or
Plagiarism is the practice of taking credit for someone else's words
or ideas. It's an act of intellectual dishonesty.
Generally, plagiarism is not in itself a crime, copyright infringement,
violation of moral rights. In academia and industry, it is a serious
ethical offense
Types of Plagiarism –
1. Direct plagiarism is the act of copying another person's work word for
word.
2. Paraphrased plagiarism involves making a few changes to someone else’s
work, then passing it off as your own.
3. Mosaic plagiarism is a combination of direct and paraphrased plagiarism.
This type involves tossing various words, phrases, and sentences into your
essay without providing quotation marks or attributions.
4. Accidental plagiarism occurs when citations are missing, sources are cited
incorrectly, or an author shares an idea without a citation that isn't as common
of knowledge as they thought. Accidental plagiarism is often the result of a
disorganized research process and a last-minute time crunch.
Here are some instances that can be regarded as
plagiarism while using images, videos and music:
• If you copy any image and use it for your work without crediting the
source, then that will be plagiarism.
• If the music produced by someone is partially or exactly similar to already
existing music.
• Using parts of videos in your own video without permission or credit.
• For performing copyrighted music without mentioning the source.
• Recreating any painting or image with the same set-up or precisely the
same idea, then it will be considered plagiarism.
• Illegal distribution of any content that has copyright will be punishable as
it will be considered as plagiarism.
Steps to control plagiarism :
1.Appreciating and recognizing genuine content.
2.Encouraging usage of latest and updated editions of content.
3.Educate the students about policies of plagiarism.
4.Using plagiarism detection application like PlagScan and
iTenticate etc.
5. Cite your source with full name, date of the publication and
any other required information. Using a direct quote always use
quotation marks to mention that the words are not yours and
then mention the sources with it.
SSL – SECURE SOCKET LAYER
It provide security to the data that is transferred between web browser and
server. SSL encrypt the link between a web server and a browser which
ensures that all data passed between them remain private and free from
attack.
• Secure Socket Layer is networking protocol used at transport layer to
provide secure connection between client and sever over internet.
• It is mainly used when using accessing important details like credit card
number, money transfer etc.
• Text transferred between web server and web browser is encrypted.
• Green colored address bar ensures extended validation
• SSL connection requires SSL certificate.
Difference between HTTP and HTTPS :
1.HTTP URL in your browser's address bar is http:// and the
HTTPS URL is https://.
2.HTTP is unsecured while HTTPS is secured.
3.No SSL certificates are required for HTTP, with HTTPS it is
required that you have an SSL certificate and it is signed by a CA.
4.HTTP doesn't require domain validation, where as HTTPS
requires at least domain validation and certain certificates even
require legal document validation.
5.No encryption in HTTP, with HTTPS the data is encrypted
before sending.

More Related Content

What's hot

What's hot (20)

Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Dr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical PasswordsDr. Ziyad Salloum - Geographical Passwords
Dr. Ziyad Salloum - Geographical Passwords
 

Similar to Cyberethics Guide to Malware, Ransomware, Phishing and SSL Security

Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeNithilan1
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02sanjay kumar
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 

Similar to Cyberethics Guide to Malware, Ransomware, Phishing and SSL Security (20)

Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Network security
Network securityNetwork security
Network security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Netiquette
NetiquetteNetiquette
Netiquette
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Plagiarism Preventive Initiatives.pdf
Plagiarism Preventive Initiatives.pdfPlagiarism Preventive Initiatives.pdf
Plagiarism Preventive Initiatives.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

Recently uploaded

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Cyberethics Guide to Malware, Ransomware, Phishing and SSL Security

  • 2. Malware or malicious software is any software intentionally designed to cause damage to a computer, server, client, or computer network A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware.
  • 3. Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them
  • 4. Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. Trojan horse is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
  • 5. Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions. Some will extract login credentials or account information from victims. Eavesdropping is the act of secretly listening to the private conversation or communications of others without their consent in order to gather information.
  • 6. Proprietary software consists of software that is licensed by the copyright holder under very specific conditions. In general, you can use the software, but you are not allowed to modify the software or distribute it to others. The original source code for the software is not available, which means you can't see the actual code written by the programmers. Proprietary software is, therefore, also referred to as closed-source software. Shareware is proprietary software that is made available to users at no cost under certain conditions. It is distributed on a trial basis with the understanding that the user may need or want to pay for it later. Freeware is a software which is distributed for free use but not for modification to the users. Its source code is not distributed free. Ex. Google chrome, internet explorer
  • 7. Open-source software, as the name suggests, is software for which the source code is released. This means that users can look at exactly how the software was created using one or more programming languages. This is done on purpose so that anyone can benefit from using the code. A typical license for open-source software gives users the right to modify and distribute the software. W3C : World Wide Web Consortium is an international organization committed to improving the web or to set standard for web.
  • 8. Plagiarism Plagiarism is the representation of another author's language, thoughts, ideas, or expressions as one's own original work. or Plagiarism is the practice of taking credit for someone else's words or ideas. It's an act of intellectual dishonesty. Generally, plagiarism is not in itself a crime, copyright infringement, violation of moral rights. In academia and industry, it is a serious ethical offense
  • 9. Types of Plagiarism – 1. Direct plagiarism is the act of copying another person's work word for word. 2. Paraphrased plagiarism involves making a few changes to someone else’s work, then passing it off as your own. 3. Mosaic plagiarism is a combination of direct and paraphrased plagiarism. This type involves tossing various words, phrases, and sentences into your essay without providing quotation marks or attributions. 4. Accidental plagiarism occurs when citations are missing, sources are cited incorrectly, or an author shares an idea without a citation that isn't as common of knowledge as they thought. Accidental plagiarism is often the result of a disorganized research process and a last-minute time crunch.
  • 10. Here are some instances that can be regarded as plagiarism while using images, videos and music: • If you copy any image and use it for your work without crediting the source, then that will be plagiarism. • If the music produced by someone is partially or exactly similar to already existing music. • Using parts of videos in your own video without permission or credit. • For performing copyrighted music without mentioning the source. • Recreating any painting or image with the same set-up or precisely the same idea, then it will be considered plagiarism. • Illegal distribution of any content that has copyright will be punishable as it will be considered as plagiarism.
  • 11. Steps to control plagiarism : 1.Appreciating and recognizing genuine content. 2.Encouraging usage of latest and updated editions of content. 3.Educate the students about policies of plagiarism. 4.Using plagiarism detection application like PlagScan and iTenticate etc. 5. Cite your source with full name, date of the publication and any other required information. Using a direct quote always use quotation marks to mention that the words are not yours and then mention the sources with it.
  • 12. SSL – SECURE SOCKET LAYER It provide security to the data that is transferred between web browser and server. SSL encrypt the link between a web server and a browser which ensures that all data passed between them remain private and free from attack. • Secure Socket Layer is networking protocol used at transport layer to provide secure connection between client and sever over internet. • It is mainly used when using accessing important details like credit card number, money transfer etc. • Text transferred between web server and web browser is encrypted. • Green colored address bar ensures extended validation • SSL connection requires SSL certificate.
  • 13.
  • 14. Difference between HTTP and HTTPS : 1.HTTP URL in your browser's address bar is http:// and the HTTPS URL is https://. 2.HTTP is unsecured while HTTPS is secured. 3.No SSL certificates are required for HTTP, with HTTPS it is required that you have an SSL certificate and it is signed by a CA. 4.HTTP doesn't require domain validation, where as HTTPS requires at least domain validation and certain certificates even require legal document validation. 5.No encryption in HTTP, with HTTPS the data is encrypted before sending.