E-Tech Lesson 2 Flashcards
is the knowledge of maximizing the user’s personal safety against security risks to private information and property associated with using the internet, and the self-protection from computer crime in general
Online Safety or Internet Safety
is an extensive term encompassing a series of steps that companies and individuals take to guard all networks and computers connected to the internet. Whether it’s a personal email message or an online purchase, data sent over the internet can compromise your online safety.
Online Security
is the correct or acceptable way of communicating or behaving on the internet.
Online Etiquette
Danger in the Internet
- Email spam
- Email Spoofing
- Phishing
- Spyware
- Computer Worm
- Trojan Horse
- Computer Virus
- Computer Hacker
AKA junk mail, usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients, usually not dangerous but can be time and space consuming.
Email Spam
it is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know; usually used by spammers to hide the origin of the spam
Email Spoofing
it is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source.
Phishing
A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user; it can monitor and collect information about the user’s internet habits and practices; it can also affect the performance and setting of the computer.
Spyware
it is a dangerous computer program that replicates itself through a network; some delete files, others disrupt the network function; it is usually spread through email and running of attachments from suspicious sources; it spreads by exploiting weaknesses in operating systems.
Computer Worm
a malware fronting to perform a good task, but covertly performs undesirable function with the intervention of entering the computer without the user’s consent; it can disable the computer’s defenses, opening it to unauthorized entry. It can erase data and corrupt files.
Trojan Horse
it is a program that duplicates itself and then infects the computer. It spreads like a biological virus; it can be transferred by the use of removable storage media devices; damages may be mild to severe.
Computer Virus
this is a person who is able to enter and control other people’s computer without authorization; usually vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud; firewalls are able to prevent entry by hacker.
Computer Hacker