Professional Documents
Culture Documents
Netiquette is a combination of the words network and etiquette, and is defined as a set of rules
for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online
resources in an online social environment. Both phrases are frequently interchanged and are
often combined with the concept of a ’netizen’ which itself is a contraction of the words
internet and citizen and refers to both a person who uses the internet to participate in society,
and an individual who has accepted the responsibility of using the internet in productive and
socially responsible ways. Underlying this overall concept of socially responsible internet use
are a few core pillars, though the details underneath each pillar are still subject to debate.
2 Cyber security
Cyber security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access. In a
computing context, security includes both cyber security and physical security.
3 Cyber crime
Cybercrime is an issue which impacts the lives of many Australians. Cybercrimes are crimes
which are: directed at computers or other devices (for example, hacking), and
where computers or other devices are integral to the offence (for example, online fraud, identity
theft and the distribution of child exploitation material). Common types of cybercrime include
hacking, online scams and fraud, identity theft, attacks on computer systems and illegal or
prohibited online content. The effect of cybercrime can be extremely upsetting for victims, and
not necessarily just for financial reasons. Victims may feel that their privacy has been violated,
and that they are powerless. Unfortunately, as Australia’s reliance on technology grows, the
cost and incidence of cybercrime is expected to increase.
4 Virus
Virus, an infectious agent of small size and simple composition that can multiply only in living
cells of animals, plants, or bacteria. The name is from a Latin word meaning “slimy liquid” or
“poison.” Viruses are tiny organisms that may lead to mild to severe illnesses in humans,
animals and plants. This may include flu or a cold to something more life threatening like
HIV/AIDS.
5 Malware
Malware, or malicious software, is any program or file that is harmful to a computer user.
Malware includes computer viruses, worms, Trojan horses and spyware. These malicious
programs can perform a variety of functions, including stealing, encrypting or deleting sensitive
data, altering or hijacking core computing functions and monitoring users' computer activity
without their permission.
6 Worms
A computer worm is a type of malicious software program whose primary function is to infect
other computers while remaining active on infected systems.
A computer worm is self-replicating malware that duplicates itself to spread to uninfected
computers. Worms often use parts of an operating system that are automatic and invisible to the
user. It is common for worms to be noticed only when their uncontrolled replication consumes
system resources, slowing or halting other tasks.
7 Key logger
A key logger (keystroke logging) is a type of surveillance software that once installed on a
system, has the capability to record every keystroke made on that system. The Recording is
saved in a log file, usually encrypted.
A key logger can record instant messages, email, and capture any information you type at any
time using your keyboard, including usernames, passwords and other personally identifiable
information (pii). The log file created by the keylogger can then be sent to a specified receiver.
Some keylogger programs will also record any email addresses you use and the URLs of any
websites you visit.
9 Ransom ware
Ransomware is a type of malware that prevents or limits users from accessing their system,
either by locking the system's screen or by locking the users' files unless a ransom is paid. More
modern ransom ware families, collectively categorized as crypto-ransom ware, encrypt certain
file types on infected systems and forces users to pay the ransom through certain online
payment methods to get a decrypt key.
10 Phishing
11 Pharming
Pharming (pronounced ‘farming’) is a form of online fraud very similar to phishing as pharmers
rely upon the same bogus websites and theft of confidential information. However, where
phishing must entice a user to the website through ‘bait’ in the form of a phony email or link,
pharming re-directs victims to the bogus site even if the victim has typed the correct web
address. This is often applied to the websites of banks or e-commerce sites.
12 References
1 https://www.webroot.com/ca/en/home/resources/tips/ethics-and-legal/ethics-netiquette-and-
online-ethics-what-are-they
2 http://whatis.techtarget.com/definition/cybersecurity
3 https://www.acorn.gov.au/learn-about-cybercrime
4 https://www.britannica.com/science/virus
https://www.news-medical.net/health/What-is-a-Virus.aspx
5 http://searchsecurity.techtarget.com/definition/malware
6 http://searchsecurity.techtarget.com/definition/worm
7 https://www.webopedia.com/TERM/K/keylogger.html
8 https://www.surfeasy.com/blog/7-habits-highly-secure-internet-use/
9 https://www.trendmicro.com/vinfo/us/security/definition/ransomware
10 http://searchsecurity.techtarget.com/definition/phishing
11 https://us.norton.com/cybercrime-pharming