etech lesson2 Flashcards
it refers to the online security or safety of people and their information when using the internet
internet safety
tips to stay safe online
Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read them.
Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
Do not share your password with anyone
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers.
Do not talk to strangers whether online or face-to-face/
Never post anything about a future vacation. It is like posting, “Rob my house on this date
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update antivirus software on your computer. Use only one anti-virus software to avoid conflicts.
If you have Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites.
But the software does not use pirated ones.
Do not reply or click links from suspicious emails.
Make Online Purchases from Secure Sites
dangers that can be encountered when using the internet
cyberbullying
cyberstalking
identity theft
sexting
inappropriate content
online grooming
internet threats
malware, phishing, spam, pharming, social media exploits, adware, spyware, keyloggers
is usually considered to be electronic junk as defined by many as unsolicited email
spam
the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information t be used for identity theft
phishing
a more complicated way of phishing where it exploits the DNS (Domain Name Service) system by installing malicious code on a personal computer or server
pharming
short for malicious software, designed to specifically damage or disrupt a system such as virus or trojan horse
malware
is a program or piece of code that is loaded onto the computer without the knowledge of the user and runs against it
virus
similar to a virus this design is considered to be a sub-class of a virus, it has the capability to travel without any human action, and takes advantage of files or information transport features on the system
worm
this malware will appear to be useful software but will actually do damage once installed or run on the computer
trojan horse
is the common name used to describe software that is given to the user with advertisements embedded in the application
adware
a program that runs in the background, it has the ability to monitor what you are currently doing and typing through keylogging
spyware
sometimes called as keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a computer’s keyboard
keyloggers
the forms required by good breeding or prescribed by authority to be required in social or official life
etiquette