Lesson 2 Flashcards
- Internet etiquette, courtesy and consideration for others using shared services, mailing list, etc.
Netiquette
– A network consisting of a worldwide network of
computer networks that use the TCP/IP networks protocols to
facilitate data transmission and exchange.
Internet
– an Interconnected system or web.
– a system intersecting lines or channels and use
communicate between one computer to another computer.
Network
a protocol developed
for the internet to get data from one network device to another.
TCP – (Transmission Control Protocol)
it is a unique no. that identifies the
location of a particular computer within a network. (192.168.001.01)
IP – (Internet Protocol)
– stands for malicious software.
Malware
- a malicious program designed to replicate itself and
transfer from one computer to another either through the
internet and local networks or data storage like flash drives
and CD’s.
Virus
– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm
( Love Bug Worm) created by a Filipino.
Worm
- a malicious program that disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
– tricks the user into posting that it is a security software. It asks the user to pay to improve his/her
security but in reality they are not protected at all.
Rogue security software
- a program that runs in the background without you knowing it (thus called spy). It has the ability to monitor what you
are currently doing and typing through keylogging.
Spyware
- used to record the keystroke done by the users.
This is done to steal their password or any other sensitive
information. It can record email, messages, or any information
you time using your keyboard.
Keyloggers
- a program designed to send your advertisements,
mostly popup
Adware
- unwanted email mostly from bots or advertisers. It can be used to send malware
Spam
– it’s goal is to acquire sensitive
personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card , or personal information.
*pharming – a more complicated way of phishing
where it exploits the DNS (Domain Name Service) system.
Phishing
Is the knowledge of maximizing the user’s personal safety and security and security risk to private information, and self- protection from computer crime in general.
online safety
Learn about different kinds of scams and what you can do to avoid them
Know the Scams