Cyber Security FAQ – Part 1

Cyber Security FAQ – Part 1

Q 1)What is Internet ocean churning?

Internet ocean churning is an initiative by WeSeSo.org academy to spread awareness among students, parents and older people about internet safety and how to protect from malicious content and intent of cyber criminals.

Q 2)What are cyber predators?

Cyber predators are the criminals who use internet to hunt their prey to harm, do wrong things, steal money and steal identity of its victim. Cyber predators are people who use the internet to exploit usually younger people for sexual and other purposes. Many cyber predators pretend to be someone else, or lie about details about themselves to gain trust of their victims

Q 3)What are the hate sites?

Hate sites are web portal where an individual or group of people share their ideology specially against a person, religion and country and motivate similar minded people to spread hatred through such sites.

Q 4)What is Malware?

Malware is a software program that has been created to perform an unauthorised — and often harmful — action on a user’s device. Examples of malware include: Computer viruses Word and Excel macro viruses Boot sector viruses Script viruses — including batch, Windows shell, Java and others Keyloggers Password stealers Backdoor Trojan viruses Other Trojan viruses Crimeware Spyware Adware... and many other types of malicious software programs

Q 5)What is the difference between a computer virus and a worm?

Computer virus: This is a type of malicious program that can replicate itself — so that it can spread from file to file on a computer, and can also spread from one computer to another. Computer viruses are often programmed to perform damaging actions — such as corrupting or deleting data. The longer a virus remains undetected on your machine, the greater the number of infected files that may be on your computer. Worms: Worms are generally considered to be a subset of computer viruses — but with some specific differences: A worm is a computer program that replicates, but does not infect other files. The worm will install itself once on a computer — and then look for a way to spread to other computers. Whereas a virus is a set of code that adds itself to existing files, a worm exists as a separate, standalone file.