E-Tech Lesson 2 Flashcards

1
Q

is the knowledge of maximizing the user’s personal safety against security risks to private information and property associated with using the internet, and the self-protection from computer crime in general

A

Online Safety or Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an extensive term encompassing a series of steps that companies and individuals take to guard all networks and computers connected to the internet. Whether it’s a personal email message or an online purchase, data sent over the internet can compromise your online safety.

A

Online Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the correct or acceptable way of communicating or behaving on the internet.

A

Online Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Danger in the Internet

A
  1. Email spam
  2. Email Spoofing
  3. Phishing
  4. Spyware
  5. Computer Worm
  6. Trojan Horse
  7. Computer Virus
  8. Computer Hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AKA junk mail, usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients, usually not dangerous but can be time and space consuming.

A

Email Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

it is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know; usually used by spammers to hide the origin of the spam

A

Email Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user; it can monitor and collect information about the user’s internet habits and practices; it can also affect the performance and setting of the computer.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

it is a dangerous computer program that replicates itself through a network; some delete files, others disrupt the network function; it is usually spread through email and running of attachments from suspicious sources; it spreads by exploiting weaknesses in operating systems.

A

Computer Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a malware fronting to perform a good task, but covertly performs undesirable function with the intervention of entering the computer without the user’s consent; it can disable the computer’s defenses, opening it to unauthorized entry. It can erase data and corrupt files.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

it is a program that duplicates itself and then infects the computer. It spreads like a biological virus; it can be transferred by the use of removable storage media devices; damages may be mild to severe.

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is a person who is able to enter and control other people’s computer without authorization; usually vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud; firewalls are able to prevent entry by hacker.

A

Computer Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly