EMPTECH Flashcards
deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information.
Information and Communication Technology
When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is “as is” and cannot be manipulated by the user.
WEB 1.0
the evolution of Web1.0 by adding dynamic webpages—the user is able to see a website differently than others.
Allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account.
Examples this include social net working sites, blogs, wikis, video sharing sites, hosted services, and web applications.
WEB 2.0
It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).
Folksonomy
Content is dynamic and is responsive to user’s input.
Rich User Experience
Services are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file-size-based pricing or vice versa.
Long Tail
The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation.
User Participation
Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software.
Software as a Service
It is a diverse information sharing through universal web access.
Mass Participation
is a movement led by the World Wide Web Consortium (W3C)
provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.
WEB 3.0 (Semantic Web)
Technological convergence is the synergy of technological advancements to work on a similar goal or task.
Convergence
a website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user-generated content.
Social Media
These are sites that allow you to connect with other people with the same interests or background.
Social Network
These are sites that allow you to store and manage links to various websites and resources.
Bookmarking Sites
These are sites that allow users to post their own news items or links to other news sources
Social News
These are sites that allow you to upload and share media content like images, music, and video
Media Sharing
These are sites that focus on short updates from the user.
Microblogging
These websites allow users to post their content.
Blogs and Forums
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers
Mobile Technologies
is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
Assistive Media
stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
Malware
unwanted email mostly from bots or advertisers. It can be used to send malware.
Spam
Its goal is to acquire sensitive personal information like passwords and credit card details.
Phishing
refers to a program that induces internet fraud by using security exploits on a target system to mislead, scare or deceive the user into downloading a program, either free for by paying money, in exchange for the removal of malware it claims is on the target system.
Rogue security software
are a type of monitoring software designed to record keystrokes made by a user.
Record the information you type into a website or application and send to back to a third party
Keyloggers
is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
has been called “phishing without a lure.”
Pharming
Is the crime of obtaining the personal or financial information of another person for the sole purposes of assuming that person’s name or identity to make transactions or purchases.
Identity theft
a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record.
Criminal identity theft
someone identifies himself as another person to obtain free medical care.
Medical identity theft
someone uses another person’s identity or information to obtain credit, goods, services or benefits.
This is the most common form of identity theft.
Financial identity theft
someone uses a child’s identity for various forms of personal gain.
Child identity theft
is a type of fraud in which a criminal combines real (usually stolen)and fake information to create anew identity, which is used to open fraudulent accounts and make fraudulent purchases.
Synthetic identity theft
is a cybercrime in which scammers send a malicious email to individual(s) or mass users of any organization by impersonating a known individual or a business partner or a service provider.
Phishing
Appears to come from a well-known company like Netflix and asks you to sign in and correct an issue with your account.
Links points to a website pretending to be a company’s legitimate site and asks for your log in credentials
Account Verification
Contains a link to what appears to be shared file on Google docs, drop box or another filesharing.
Link points to a page pretending to be a file-sharing site and requests you log in.
Cloud File Sharing
Link will prompt you to sign into view the document, giving attackers control of your inbox.
Docusign
Contains document presented as an unpaid invoice and claims service will be terminated if invoice is not paid.
Fake Invoice
Appears to come from a popular delivery service or online retail and includes delivery notification with a malicious link or attachment.
Delivery Notifications
Appears to come from a government tax revenue agency. Claims you are delinquent on your taxes and provide a means to the issue before additional fines or legal actions are pursued.
Tax Scam
is the gaining of unauthorized access to data in a system or computer
Hacking
The implies replicating the original website to that the unsuspecting user enters the information like account password, credit card details, which the hacker seizes and misuses
Virus
This basically uses the cache data of a website or domain that the user might have forgotten about. It then directs the data to another malicious website.
DNS Spoofing
These are released by the hacker into the files of the website once they enter into it. The purpose is to corrupt the information or resources on the website.
UI Redness
A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments.
Ethical Hacker (White Hat)
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
Cracker (Black Hat)
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
Grey Hat
A non-skilled person who gains access to computer systems using already made tools.
Script kiddies
A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
Hacktivist
If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
Copyright Infringement
defined under the Revised Penal Code Section 355
Committed by means of writing, printing, lithography, engraving, radio, phonograph,
painting, theatrical exhibition, cinematographic exhibition, or any similar
means.
Libel
empowered all existing laws to
recognize electronic documents as evidence (commercial /
non-commercial).
E-Commerce Law (Republic Act 8792)