ICT-2 Flashcards
Combinations of any elements in the keyboard to secure accounts
Can be weak or strong
Password
cyber world is also known as cyberspace, virtual in nature unbounded unlike our physical environment.
Cyber World –
digital representation of humans to interact in virtual world
Virtual Self –
data that are available to anyone as long as they have an internet connection
Source of Information
– digital socialization using chat, blogs, vlogs, online games etc.
Tools for social interaction: facebook, twitter, tumblr, instagram, online games
Social Interaction
– stealing and accessing private information
Hacking
act of stealing information from the target user
Identify theft –
– individuals who lure children and teenagers to engage in sexual acts or relationships online
Internet predators
online humiliation and threats
Cyberbullying –
also known as malware, created to invade and destroy computer systems
Malicious Software –
replicates itself by modifying other computer programs and inserting its own code. VIRUS stands for Vital Information Resources Under Siege
Virus –
can propagate and self replicate from one computer to another without human activation
Worms –
disguises itself as a legitimate code or software
Trojan –
with malicious behavior that aims to gather information about a person or organization and send it to another entity
Spyware –
is the term used for various pop-up advertisements
Adware –