ICT module 2 Flashcards
refers to the act of staying safe online
online safety
commonly known as internet safety, e-safety, and cyber safety
online safety
encompasses all tech devices which have access to internet from PCs, smartphones, laptop
online safety
who you are in the cyberspace and how you present yourself to others online
online identity
a layer of online identity of what you share, you do control, and consists of data you feed into socmed and mobile app
first layer
a layer of online identity made of behavioral observations
second layer
a layer of online identity where your data are analyzed by various algo & compare w/ other user’s data. It is what the machine thinks about you
third layer
a law approved on Sept 12, 2012 aiming to address legal issues concerning online interactions in the int.
Cybercrime Prevention Act of 2012 (R.A. No. 10175)
offences against the confidentiality, integrity, and availability of of comp data and systems
cybercrime
occurs when a bully targets a victim using electronic communication methods
cyberbullying
event/action that could damage to computer hardware, software, data, info, or processing capability
computer security risks
types of perpetrator
hackers, cracker, script kiddies, corporate spies, cyberextortionists, cyberterrorists
indiv who uses comp to overcome a tech problem where he/she uses his/her abilities to gain unauthorized access to systems or networks in order to commit crime
hackers
indiv whose purpose is to breach int security/ gain access to software w/o paying royalties
crackers
unskilled indiv who uses scripts/ programs developed by others to attach computer systems and networks and deface websites
script kiddies
indiv practicing the act or spying to gain secret info on a government or a business computer through use of any ICT tools
corporate spies
indiv/group who uses email as an offensive force sending a company a threatening email
cyberextortionists
indiv who are involved in a politically motivated attack against info, comp systems, comp program, and data resulting in violence
cyberterrorists
the use of a comp network w/o permission
unauthorized access
the use of a comp or its data for unapproved or possibly illegal act
unauthorized use
the act of stealing a computer equipment
hardware theft
the act of defacing or destroying comp equipment
hardware vandalism
occurs when someone steals a software media, intentionally erases programs, illegally copies a program and illegally registers or activates a program
software theft
occurs when someone steals personal/ confidential info
info theft