Things you need to cite.
Software that looks for malware on a device. It uses code patterns from malware called signatures in its search.
Antivirus Software
keeping a system safe from those who shouldn't have access to it.
Cybersecurity
send email messages that contain infected links or attachments.
create fake websites or ads that mimic real ones
use a program, app or file that appears to be useful.
Three ways hackers spread malware
Only download from websites, like Google Play or Apple’s App Store, that have a good reputation.
Read each screen carefully when you install software.
Run your antivirus software daily.
Ways to keep device safe
in-text citations and end-of-text citations.
Two types of citations.
Malicious software or code designed to damage or gain illegal access to a computer system.
Malware
keeping data confidential
maintaining the integrity of data.
making sure data is available to the right people and systems
CIA Triad
Signs of malware
Back up your device often to an external device or the cloud, such as Google Drive or iCloud.
Keep your operating system, software and apps up to date.
More ways to keep device safe
Modern Language Association (MLA)
American Psychological Association (APA)
Two major styles for creating citations.
Malicious software that encrypts a file or folder or system and requires a ransom to unlock it.
Ransomware
Use a unique, strong password for each account.
Use multi-factor authentication.
Use anti-virus software and keep it current.
Open emails from only people you know.
Maintain software updates.
Cybersecurity Best Practices
Software that creates ads and popups by tracking your browser actions.
Adware
Use numbers, symbols and upper and lowercase letters in random order.
Use a minimum of 12 characters.
Use a mix of unrelated words for passphrases.
Use spaces if it is allowed.
Elements of a Strong Password
Use only 30 seconds of a song or movie
Use no more than 250 words from a poem
Use no more than 5 pictures by the same creator.
Guidelines for Fair Use
A practice that requires two pieces of data to prove your identity.
Two-factor authentication
Software that looks useful but actually causes damage. It can also provide illegal access to the device.
Trojan
Software that secretly gathers sensitive information (e.g., passwords). It may track the user’s activities
Spyware
Knowledge Something you "know." Your password or a PIN.
Possession Something you "are." Your fingerprint, voice, or face.
Inherence Something you "have." A text code or an email.
Three factors are commonly used to prove you are who you say you are.
An online resource that lets you find an image, clip art or sound bite that you can share, use or change.
Creative Commons
Malicious software that when executed causes damage to a device. It can spread from computer to computer.
Virus
Software that multiplies on the computer until the device is out of memory. It can spread from computer to computer on a network.
Worm
What hackers can do one they infect your computer.
Mobile device protection best practices.