ict Flashcards
a combination of texts, numbers, and/or special characters to secure accounts
Password
names, common words, birthdates, etc.
Weak Password
combination of all characters
Strong Password
also known as Cyberspace, is virtual in nature and unbounded unlike our physical environment.
Cyber World
a digital representation of humans to interact in virtual world
Virtual Self
data that are available to anyone as long as they have an internet connection
Source of Information
digital socialization using chat, blogs, vlogs, online games, etc.
Social Interaction
Tools for Social Interaction
- Tumblr
- Online games (Mobile Legends, COL, etc.)
features of the Cyber World
- Cyber World
2.Virtual Self - Source of Information
Dangers and Threats on the Internet
- Hacking
- Identity Theft
- Internet Predators
- Cyberbullying
- Malicious Software
stealing and accessing private information of organizations such as government systems, business systems, etc.
Hacking
the act of stealing important information from the target user by accessing online accounts such as bank accounts, etc.
Identity Theft
individuals who lure children or teenagers to engage in sexual acts or relationships online
Internet Predators
an online act of humiliation and/or threats that is done with and by children and teenagers
Cyberbullying
also known as malware, is created to invade and destroy computer systems
Malicious Software
type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
virus