ETECH|LESSON 2 & 3 Flashcards
refers to the online security or safety of people and their information when using the internet
Internet Safety
Types of Information Usually Shared Online: (5)
- Name(First, Middle, Last, Parents)
- Address
- Cellphone No.
- Birthdate
- Siblings
Be mindful of what you share online
Tips to Stay Safe Online:
Read terms & conditions
Tips to Stay Safe Online:
Know security features of the site
Tips to Stay Safe Online:
Don’t share password
Tips to Stay Safe Online:
Avoid public networks(Incognito will not protect you)
Tips to Stay Safe Online:
Never post future vacations
Tips to Stay Safe Online:
Don’t talk to strangers
Tips to Stay Safe Online:
Add friends you know irl
Tips to Stay Safe Online:
Avoid untrusted websites
Tips to Stay Safe Online:
Antivirus
Tips to Stay Safe Online:
Make Wi-Fi private by adding a password
Tips to Stay Safe Online:
Don’t reply or click links from suspicious emails
Tips to Stay Safe Online:
Make online purchases from secure sites
Tips to Stay Safe Online:
Dangers in Using Internet: (6)
- Cyber Bullying
- Cyber Stalking
- Identity Theft
- Sexting
- Inappropriate Content
- Online Grooming
Internet Threats:(12)
- Spam
- Phishing
- Social Media Exploits
- Pharming
- Malware
- Virus
- Worm
- Trojan Horse
- Adware
- Spyware
- Keyloggers
- Ransomware
sending email(illegitimate) to scam for private information for identity theft
Phishing
– malicious fb msgs, consisted of SVG(Scalable Vector Graphic), secretly messaging all fb friends
Social Media Exploits
“Phishing without a lure,” more complicated phishing, exploits DNS(Domain Name Service), malicious code is installed on a computer/server, directing users to
fraudulent webs
Pharming
“Malicious software,” software designed to damage/disrupt a system, Virus/Trojan
Malware
– program or piece of code loaded onto a computer without knowledge, runs on its
own, can replicate themselves, man-made, virus that makes copy of own is easy to make
Virus
similar/sub-class to a virus, spread from computer to computer, can travel
without human action, takes advantage of file/info transport features on system
Worm
– appears to be useful, but will damage computer once installed or run
Trojan Horse
– software /w advertisments, considered to be legitimate alternative offered to
consumers who don’t wish to pay for software
Adware
runs in background without knowledge, monitors your activity and typing
through “keylogging”
Spyware
“Keystroke logger/System monitor,” surveillance tech used to monitor and
record keystrokes on a keyboard
Keyloggers
is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.
Ransomware
Good Things to Do in Online Communication: (5)
Common acronyms
smileys
clear subject lines
thinking twice before sending an email or post online
consulting a website’s FAQ
Avoid in Online Communication: (4)
All CAPS
writing lengthy emails
posting spam
sending emails to a large number of recipients
- the forms required by good breeding or prescribed by authority to be required in social or official life
Etiquette
- network etiquette
- etiquette of cyberspace
Netiquette
Core Rules of Netiquette:
(10)
- Remember the human
- Adhere to same standards of behavior online that you follow irl
- Know where you are in the cyberspace
- Respect other’s time and bandwidth
- Make yourself look good online
- Share expert knowledge
- Help keep flame wars under control(Flaming – express strongly held opinion)
- Respect other’s privacy
- Don’t abuse your power
- Be forgiving of other’s mistakes
- “looking something up” (web)
- any activity where a topic is identified, and an effort is made to actively gather
information for the purpose of furthering understanding - may include some post-collection analysis like a concern for quality or synthesis
Research
- a research method in collecting and gathering information via the internet by using a
search engine such as Google
Internet Research
- is a program that allows users to search for content on the internet
Search Engine
Examples of Search Engine:
Google
Aol Search
Wow
Baidu
Web Crawler
Yahoo! Search
MyWebSearch
WolframAlpha
Bing
Info
Dogpile
DuckDuckGo
Ask
Infospace
Contenko
Internet Archive
Common Commands for Search Engines: (4)
- Quotation Marks(“”)
- Addition Sign(+)
- Subtraction Sign(-)
- Asterisk(*)