Internet Safety and Netiquette Flashcards
it refers to the online security or safety of people and their information when using the internet
Internet Safety
is network etiquette, the do’s and don’ts of online communication
Netiquette
- Remember that you are talking face to face with another person when you are online
- Remember that internet let people meet online but not necessarily face to face
- Remember this saying when sending an email: Would I say this to the person’s face
Rule No. 1: Remember the human
- You need to behave the same way online that you do in real life
- You need to remember that you can get caught doing things you should not be doing online just like you can in real life
- You are still talking to a real person with feelings even though you can’t see them
Rule No. 2: Adhere to the same standards online that you follow in real life
- Always take a look around when you enter a new domain when surfing the web
- Get a sense of what the discussion group is about before you join it
Rule No. 3: Know where you are in cyberspace
- Remember people have other things to do besides read your email. You are not the center of their world.
- Keep your post and emails to minimum by saying what you want to say.
- Remember everyone won’t answer your questions.
Rule No. 4: Respect other people’s time and bandwidth
- Be polite and pleasant to everyone.
- Always check your spelling and grammar before posting.
- Know what you are talking about and make sense saying it.
Rule No. 5: Make yourself look good online.
- Ask questions online
- Share what you know online
- Post the answers to your questions online because someone may have the same question you do.
Rule No. 6: Share expert knowledge
- Netiquette does not forgive flaming
- Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down
Rule No. 7: Help keep flame wars under control
- Do not read other people’s mail without their permission
- Going through other people’s things could cost you, your job or you could even go to jail
- Respect other people’s privacy
Rule No. 8: Respect other people’s privacy
- Do not take advantage of other people just because you have more knowledge or power than them
- Treat others as you would want them to treat you if the roles were reversed
Rule No. 9: Don’t abuse your power.
- Do not point out mistake to people online.
- Remember that you were once the new kid on the block. You still need to have good manner even though you are online and cannot see the person face to face.
Rule No. 10: Be forgiving of other people’s mistake
4 Tips to Avoid Copyright Infringement
Understand, Be Responsible, Be Creative, Know the Law
—– may already know a lot of stuff about you even with your first name alone
First Name Hackers
Sharing your —– is riskier than sharing your first name. It is even riskier when you share both. Several cybercrimes are a result of just matching faces with the name.
Last name
This is not as risky as the first name and last name but when hackers know other things about you, it will still be a risk sharing this information
Middle Name
In most cases, people stealing identities study their subject and may use name of schools as verification
Current and previous schools
Posting this in public will cause random strangers to text and call you and may result to scams and fraud activities
Cellphone number
Riskier when their fullnames are provided.
Name of mother and father
— is often asked to be an answer of a secret question whenever you forget your password.
Mother’s maiden name
Sharing this may cause strangers to pretend and dupe you
Name of Siblings
Disclosing this will cause criminals to easily find you
Address
Scams uses this information to deceive you
Home phone number
Having this in your profile causes you to be vulnerable with identity theft
Birthday
replicates itself and transfer from one computer to another
Virus
uses computer network to spread itself
Worm
disguises as a useful program but leaves PC unprotected and allows hacker to get your information
Trojan
unwanted email from advertisers which can also be used to send malware
Spam
acquires sensitive personal information like passwords and credit card numbers
Phishing
a more complicated way of phishing which exploits the Domain Name Service (DNS) system
Pharming
most common strategy when you enter terms to search
Keyword searching
if you require at least one of the terms in the search
OR
when you want to search for the first term and exclude sides that have the second term
NOT
a —- may be entered in the search field of search engine
Question
features are offered on many engines by going to an “—” page and making selections
Advanced Search