Copyright 2
Device Protection Terms
Cybersecurity
Malware
Device Safety
100
  • Using a direct quote from the source, including song lyrics.
  • Paraphrasing or summarizing the ideas, conclusions or opinions found in the source.
  • Using images, graphs, charts and other visuals found in the source.

Things you need to cite. 

100

Software that looks for malware on a device. It uses code patterns from malware called signatures in its search. 

Antivirus Software

100

keeping a system safe from those who shouldn't have access to it.

Cybersecurity

100

send email messages that contain infected links or attachments.

create fake websites or ads that mimic real ones

use a program, app or file that appears to be useful.

Three ways hackers spread malware

100

Only download from websites, like Google Play or Apple’s App Store, that have a good reputation.

Read each screen carefully when you install software.

Run your antivirus software daily.

Ways to keep device safe 

200

in-text citations and end-of-text citations.

Two types of citations. 

200

Malicious software or code designed to damage or gain illegal access to a computer system.

Malware

200

keeping data confidential

maintaining the integrity of data. 

making sure data is available to the right people and systems

CIA Triad 

200
  • Your device runs slower than usual, freezes or crashes.
  • Access to your system tools, programs or files is blocked.
  • Programs seem to open and close by themselves randomly.
  • Your files disappear and then reappear.

Signs of malware

200

Back up your device often to an external device or the cloud, such as Google Drive or iCloud.

Keep your operating system, software and apps up to date.

  • Run a virus scan on USB drives and external hard drives before using them.

More ways to keep device safe

300

Modern Language Association (MLA)

American Psychological Association (APA)

Two major styles for creating citations. 

300

Malicious software that encrypts a file or folder or system and requires a ransom to unlock it.

Ransomware 

300

Use a unique, strong password for each account.

Use multi-factor authentication.

Use anti-virus software and keep it current.

Open emails from only people you know.

Maintain software updates.

Cybersecurity Best Practices 

300

Software that creates ads and popups by tracking your browser actions.

Adware

300

Use numbers, symbols and upper and lowercase letters in random order.

Use a minimum of 12 characters.

Use a mix of unrelated words for passphrases.

Use spaces if it is allowed.

Elements of a Strong Password 

400

Use only 30 seconds of a song or movie

Use no more than 250 words from a poem

Use no more than 5 pictures by the same creator. 

Guidelines for Fair Use 

400

A practice that requires two pieces of data to prove your identity.

Two-factor authentication 

400

Software that looks useful but actually causes damage. It can also provide illegal access to the device.

Trojan 

400

Software that secretly gathers sensitive information (e.g., passwords). It may track the user’s activities

Spyware

400

Knowledge Something you "know." Your password or a PIN.

Possession Something you "are." Your fingerprint, voice, or face.

Inherence Something you "have." A text code or an email.

Three factors are commonly used to prove you are who you say you are.

500

An online resource that lets you find an image, clip art or sound bite that you can share, use or change.

Creative Commons 

500

Malicious software that when executed causes damage to a device. It can spread from computer to computer.

Virus

500

Software that multiplies on the computer until the device is out of memory. It can spread from computer to computer on a network.

Worm

500
  • Damage or steal information (e.g., usernames and passwords).
  • Take control of it.
  • Spy on its users.
  • Hold it for ransom.

What hackers can do one they infect your computer. 

500
  • Use a personal identification number (PIN) to lock your screen.
  • Only download apps from your device store, such as Google Play, Apple App Store or Microsoft Store.
  • Install operating system and app updates as soon as they are available.
  • Disable Wi-Fi auto-connect and automatic Bluetooth pairing.

Mobile device protection best practices.