E-TECH Flashcards
this is the physical component
hardware
refers to use of communication and telecommunication technologies to create, collect, process, transmit, and store information
ict
what are the functions of ict
communication, date management, marketing, process improvement, enterprise resource planning
this is an integrated set of components that collects, processes, stores, and distributes information to support organizations operations and decision-making
ict system
this is the programs and applications
software
what are the ict components
hardware, software, networks, data, information, people
this is the interconnected devices for communication
networks
this is the raw, unprocessed facts and figures
data
this is the virtual in nature and and unbounded unlike our physical environment
cyber world
the processed and contexualized data
information
users and IT professionals
people
cyber world is also know as
cyber space
what are the features of cyberworld
virtual self, sources of information, social interaction
this is a digital representation/ identity or humans to interact in the virtual world
virtual self
the possibility of maliciouos attempt to damage or disrupt a computer network or system
cyebrthreat
data that is available to anyone as long as they have internet connection
sources of information
this is the process of engaging with other through digital platforms, such as social networking sites, where individuals communicate and express themselves through using visual and verbal cues to convey their personality and social status
social interaction
what are the 5 cyberthreats
social engineered trojans, unpatched software, phishing, network travelling worms, advance persistent threats
exploitation or harmful activity comitted with the intent of destroying , stealing, or disrupting data, critical systems, and digital life in general
cyberattacks
this is a program or file that can harm your computer by stealing data or destroying something in your computer
malware
types of malware
ransomware, spyware, adware, worms, trojans, botnets
this is a form of cyberattack to obtain sensitive information like username and password through malicious emails
phishing
occurs when a malicious actor (hacker) stops legitimate users from gettng into specific computer systems, devices, services or other digital resources
denial of service (DOS) atatcks
happens when a third party is trying to gain acess to your systems by cracking users pasword
password attacks
This may happen by impersonating the endpoints in an online information exchange via
smartphone to a website.
Man in the Middle(MITHM)
are done by malicious actors that upload infected ads to different websites using an advertising network
malvertising
pretends as legitimate and necessary security software that will keep your system safe
rogue software
individuals who lure children or teenagers to engage in sexual acts
internet predators
online act of humiliation and/ or threats that is done with and by children and teenager
cyberbullying is
cyber security is also known as
information technology security or electronic information security
practice of defending computers, servers, mobile devices, electronic systems, network, and data from malicious attacks
cybersecurity
things to consider to avoid cyber attacks
make a strong and unique password, clear cache, turn off save password
protects your device from malware from the web and external devices attached to yours
all-inclusive protection
it has to conduct regular security scans without user trigger and automatically rejects data from unwanted sources
relaible protection
in order fot you to maximize the capabilities of the program, you have to be able to understand all of its components just by navigating it
easy to use
some anti virus programs tend to make devices lag thus making it inefficient to sue
performance impact
sometimes even if the programs users interface is well done, there are certain things that we still need help with support for the program should always be available and easy to connect
available support