Skip to Main Content

PLP Minor in Cybersecurity: Topic 3

Online Articles

Proprietary Software: Definition and Examples

In today's fast-paced digital landscape, software plays a pivotal role in shaping our lives and driving businesses forward. Software solutions are available in a variety of formats that accommodate diverse needs and tastes. One such type is proprietary software, developed and distributed by commercial entities. Proprietary software offers distinct features, functionalities, and services that cater to specific user requirements.

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 20

 


Spyware Attacks

Spyware is malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user’s consent. 

Spyware collects personal and sensitive information that it sends to advertisers, data collection firms, or malicious actors for a profit. Attackers use it to track, steal, and sell user data, such as internet usage, credit card, and bank account details, or steal user credentials to spoof their identities.

Spyware is one of the most commonly used cyberattack methods that can be difficult for users and businesses to identify and can do serious harm to networks. It also leaves businesses vulnerable to data breaches and data misuse, often affects device and network performance, and slows down user activity.

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 25

 


Note: Refer to FCN Lecture 3- Security in System Domain: Slide 29

 

eBook

Note: Refer to FCN Lecture 3- Security in System Domain

LinkedIn Learning

Help Desk Handbook for End Users: PC Basics, Hardware, Operating Systems, and Applications by Scott Jernigan

This course provides self-help style guidance for solving beginner-level IT issues. Learn how to troubleshoot issues related to storage, memory usage, computer setup, wiping a computer for resale, installing apps, file management, and backups.

Instructor Scott Jernigan also provides coverage of system peripherals and operating system basics. 

These tips and tricks are valuable for anyone who needs a quick fix, including help desk administrators and tech support personnel who need resources for their end users.

Login here before clicking on the links to the videos or courses below.

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 5 

Videos

What is a Server? Servers vs Desktops Explained by PowerCert Animated Videos

This is an animated video explaining the difference between servers and desktop computers. 

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 12

 

Computer Basics: Understanding Operating Systems it by GCFLearnFree.org

In this video we'll show you what an operating system is and talk about a few of the most common operating systems.

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 15

 

What is a Computer Worm and How Does it Work? by Eye on Tech

In computer networking, a worm is a man-made, malicious software program whose primary function is to infect other computers while remaining active on infected systems. Watch to find out how exactly computer worms work.

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 28

 

Infographics

Computer Components [Infographic]. 

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 6

 

 

What is open source and why does it matter? [Infographic]. 

Note: Refer to FCN Lecture 3- Security in System Domain: Slide 20