ICT module 2 Flashcards
refers to the act of staying safe online
online safety
commonly known as internet safety, e-safety, and cyber safety
online safety
encompasses all tech devices which have access to internet from PCs, smartphones, laptop
online safety
who you are in the cyberspace and how you present yourself to others online
online identity
a layer of online identity of what you share, you do control, and consists of data you feed into socmed and mobile app
first layer
a layer of online identity made of behavioral observations
second layer
a layer of online identity where your data are analyzed by various algo & compare w/ other user’s data. It is what the machine thinks about you
third layer
a law approved on Sept 12, 2012 aiming to address legal issues concerning online interactions in the int.
Cybercrime Prevention Act of 2012 (R.A. No. 10175)
offences against the confidentiality, integrity, and availability of of comp data and systems
cybercrime
occurs when a bully targets a victim using electronic communication methods
cyberbullying
event/action that could damage to computer hardware, software, data, info, or processing capability
computer security risks
types of perpetrator
hackers, cracker, script kiddies, corporate spies, cyberextortionists, cyberterrorists
indiv who uses comp to overcome a tech problem where he/she uses his/her abilities to gain unauthorized access to systems or networks in order to commit crime
hackers
indiv whose purpose is to breach int security/ gain access to software w/o paying royalties
crackers
unskilled indiv who uses scripts/ programs developed by others to attach computer systems and networks and deface websites
script kiddies
indiv practicing the act or spying to gain secret info on a government or a business computer through use of any ICT tools
corporate spies