NASK - Poradnik - ABC cyberbezpieczeństwa (2022).pdf

(1324 KB) Pobierz
ABC Cyberbezpieczeństwa
1
A
B
Spis treści
Wstęp ..............................................................................................................................6
A ..................................................................................................................................7
Administrator .................................................................................................................................... 7
Adware .............................................................................................................................................. 7
Aktualizacja ...................................................................................................................................... 8
Anonimowość w sieci ...................................................................................................................... 8
Aplikacja ........................................................................................................................................... 9
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
B ............................................................................................................................... 10
Backdoor ......................................................................................................................................... 10
Backup ............................................................................................................................................ 10
Bańka informacyjna ....................................................................................................................... 10
Baza danych ................................................................................................................................... 11
Bomba logiczna.............................................................................................................................. 11
Bot ................................................................................................................................................... 12
Botnet .............................................................................................................................................. 12
Browser hijacker ............................................................................................................................. 12
Business Email Compromise (BEC) .............................................................................................. 13
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) .. 14
CERT Polska ................................................................................................................................... 14
Chmura............................................................................................................................................ 15
Clickbait .......................................................................................................................................... 15
CRP (stopień alarmowy) ................................................................................................................ 15
CSIRT............................................................................................................................................... 16
Cyberprzemoc ................................................................................................................................ 16
Cyberstalking .................................................................................................................................. 17
Cyfrowy kidnapping........................................................................................................................ 17
Cyfrowy ślad ................................................................................................................................... 18
Dane osobowe ................................................................................................................................ 19
DDoS (Distributed Denial of Service) ............................................................................................ 19
Deepfake ......................................................................................................................................... 20
Dezinformacja ................................................................................................................................ 20
Doomsurfing ................................................................................................................................... 21
Doxing ............................................................................................................................................. 22
Dyżurnet.pl ...................................................................................................................................... 22
Dzień Bezpiecznego Internetu (DBI) ............................................................................................. 23
E-learning ........................................................................................................................................ 24
E-mail .............................................................................................................................................. 24
Exploit ............................................................................................................................................. 25
Emotikon ......................................................................................................................................... 25
Europejski Miesiąc Cyberbezpieczeństwa (ECSM)...................................................................... 25
Fact-checking ................................................................................................................................. 26
Fake news ....................................................................................................................................... 26
Fałszywe domeny ........................................................................................................................... 26
Filtry kontroli rodzicielskiej ............................................................................................................ 27
Firewall ............................................................................................................................................ 27
Flaming ........................................................................................................................................... 27
Flooding .......................................................................................................................................... 28
FOMO .............................................................................................................................................. 28
Fonoholizm ..................................................................................................................................... 29
C ............................................................................................................................... 14
D ............................................................................................................................... 19
E................................................................................................................................ 24
F................................................................................................................................ 26
A
B
G ............................................................................................................................... 30
Gaming ............................................................................................................................................ 30
Generator hasła .............................................................................................................................. 30
Geolokalizacja ................................................................................................................................ 31
Gray hat ........................................................................................................................................... 31
Grooming (child grooming) ........................................................................................................... 31
Haker ............................................................................................................................................... 33
Haktywista ...................................................................................................................................... 33
Happy slapping ............................................................................................................................... 33
Hasło ............................................................................................................................................... 34
Hazard w internecie ....................................................................................................................... 34
Hejt .................................................................................................................................................. 34
Helpline ........................................................................................................................................... 35
Hotline ............................................................................................................................................. 35
ID ..................................................................................................................................................... 37
Incydent bezpieczeństwa .............................................................................................................. 37
Inteligentne urządzenia.................................................................................................................. 38
Internet ............................................................................................................................................ 38
Internet rzeczy (IoT) ....................................................................................................................... 38
IP ..................................................................................................................................................... 39
Jailbreak ......................................................................................................................................... 40
Jamming ......................................................................................................................................... 40
JavaScript injection ........................................................................................................................ 40
JOMO .............................................................................................................................................. 41
Keylogger ........................................................................................................................................ 42
Komunikatory internetowe............................................................................................................. 42
Koń trojański (trojan) ..................................................................................................................... 43
Kradzież danych ............................................................................................................................. 43
Kradzież tożsamości ...................................................................................................................... 44
Kruegerware (kruegerapps) ........................................................................................................... 44
LAN (Local Area Network) ............................................................................................................. 46
Likejacking ...................................................................................................................................... 46
Link .................................................................................................................................................. 46
Login ............................................................................................................................................... 47
Lootbox ........................................................................................................................................... 48
Malware (złośliwe oprogramowanie) ........................................................................................... 49
Media społecznościowe ................................................................................................................ 49
Menedżery haseł ............................................................................................................................ 50
mLegitymacja ................................................................................................................................. 50
mOchrona ....................................................................................................................................... 51
Mowa nienawiści............................................................................................................................ 51
Nadużywanie nowych technologii................................................................................................. 52
Naruszenia prawa autorskiego...................................................................................................... 52
Naruszenia prywatności ................................................................................................................ 53
NASK ............................................................................................................................................... 54
„Nastolatki 3.0” ............................................................................................................................... 54
Netykieta ......................................................................................................................................... 54
Nielegalne treści ............................................................................................................................. 55
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
H ............................................................................................................................... 33
I ................................................................................................................................. 37
J................................................................................................................................ 40
K ............................................................................................................................... 42
L ................................................................................................................................ 46
M .............................................................................................................................. 49
N ............................................................................................................................... 52
A
B
Nomofobia ...................................................................................................................................... 55
Niebezpieczne kontakty ................................................................................................................. 56
Offline challenge ............................................................................................................................ 57
Ogólnopolska Sieć Edukacyjna (OSE) ........................................................................................... 57
Oprogramowanie antywirusowe ................................................................................................... 58
Oprogramowanie szyfrujące ......................................................................................................... 59
Oszustwa internetowe ................................................................................................................... 59
OUCH!.............................................................................................................................................. 60
Oversharing..................................................................................................................................... 60
Patotreści........................................................................................................................................ 62
Pan European Game Information (PEGI) ...................................................................................... 62
Password spraying ......................................................................................................................... 63
Pełnomocnik Rządu ds. Cyberbezpieczeństwa ........................................................................... 63
Pharming ........................................................................................................................................ 64
Phishing .......................................................................................................................................... 64
Phubbing ......................................................................................................................................... 65
Polskie Centrum Programu Safer Internet (PCPSI)...................................................................... 66
Propaganda .................................................................................................................................... 66
Prywatność w sieci ........................................................................................................................ 67
Quishing .......................................................................................................................................... 68
Ransomware ................................................................................................................................... 69
Regulamin ....................................................................................................................................... 69
Rootkit ............................................................................................................................................. 70
Rozporządzenie o ochronie danych osobowych (RODO) ............................................................ 70
Równowaga online–offline ............................................................................................................ 71
Scam ............................................................................................................................................... 73
Self generated sexual content ....................................................................................................... 73
Sexting ............................................................................................................................................ 74
Sextortion ....................................................................................................................................... 75
Sharenting....................................................................................................................................... 75
Skimming ........................................................................................................................................ 76
Smishing ......................................................................................................................................... 76
Smombie ......................................................................................................................................... 77
Social media sabbatical................................................................................................................. 77
Spam ............................................................................................................................................... 78
Spoofing .......................................................................................................................................... 79
Spyware (oprogramowanie szpiegujące) ..................................................................................... 80
Stalking ........................................................................................................................................... 80
Stealware ........................................................................................................................................ 81
Szkodliwe treści ............................................................................................................................. 81
Tabnabbing ..................................................................................................................................... 83
Techniczny Reprezentant Szkoły (TRS) ........................................................................................ 83
Teorie spiskowe ............................................................................................................................. 83
Troll parenting................................................................................................................................. 84
Trolling w sieci ................................................................................................................................ 85
User experience (UX) ..................................................................................................................... 86
Usługi bezpieczeństwa OSE .......................................................................................................... 86
Ustawa o krajowym systemie cyberbezpieczeństwa .................................................................. 86
O ............................................................................................................................... 57
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
P ............................................................................................................................... 62
Q ............................................................................................................................... 68
R ............................................................................................................................... 69
S ............................................................................................................................... 73
T................................................................................................................................ 83
U ............................................................................................................................... 86
A
B
Uwierzytelnianie dwuskładnikowe ................................................................................................ 87
Uzależnienie od gier komputerowych ........................................................................................... 88
Użytkownik...................................................................................................................................... 88
Virtual Private Network (VPN) ....................................................................................................... 90
Vishing ............................................................................................................................................ 90
Wellbeing ........................................................................................................................................ 92
Wideokonferencje .......................................................................................................................... 92
Wi-Fi ................................................................................................................................................ 93
Wirus komputerowy ....................................................................................................................... 93
Wizerunek online ............................................................................................................................ 94
Wyzwanie (challenge) .................................................................................................................... 94
Zabezpieczenia biometryczne....................................................................................................... 96
Zakupy online ................................................................................................................................. 96
Zespół ds. nadużyć (zespół abuse) .............................................................................................. 97
Zniesławienie.................................................................................................................................. 97
Zespół uzależnienia od internetu (ZUI) ......................................................................................... 98
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
V ............................................................................................................................... 90
W .............................................................................................................................. 92
Z ............................................................................................................................... 96
Bibliografia................................................................................................................... 99
Zgłoś jeśli naruszono regulamin