Lesson 2 Flashcards

1
Q

Core Rules of Netiquette

A
  1. Remember the Human
  2. Adhere to the Same Standard behaviour online that you follow in real like.
  3. Know where you are in Cyberspace
  4. Respect other people’s tome and bandwidth
  5. Make yourself look good online
  6. Share expert knowledge
  7. Help keep flame wars under control
  8. Respect other people’s privacy
  9. Don’t abuse your power
  10. Be forgiving of other people’s mistakes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Net Pioneers and Web Creator

A

Larry Roberts
Bob Kahn
Vint Cerf
Sir Tim Berners-Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Threats

A
  1. Malware
  2. SPAM
  3. Phishing (Pharming)
  4. Evil Twins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Malware

A

Virus, Worm, Trojan, Spyware, Adware, and Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Virus?

A

Malicious program that replicates and transfer from one computer to another.
Example: Short-cut files and Downloadable files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Worm?

A

Malicious program that transfer from one computer to another, by any types of means
Example: ILOVEYOU worm (Love Bug Worm) created by the Filipino Onel De Guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan?

A

Designed as useful program but once downloaded or installed, leaves PC unprotected and allows hackers to get your information
Example: Computer Games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Spyware?

A

Program that runs in the background without you knowing it
Ability to monitor what you are doing and typing through keylogging
e.g Fake Login Forms/Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Adware?

A

Program designed to send you advertisements, mostly as pop-ups
Aka, Click Fraud
E.G Pop-up ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Ransomware?

A

Holds your PC hostage and demand money
Locks computer/threatens to destroy data/demands money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SPAM?

A

Unwanted email mostly from bots and advertisements.
Can be used to send malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

To acquire sensitive personal information like passwords and credit cards detail.
*Pharming- more complicated way of phishing where its exploits the DNS (Domain Name Service) System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Pharming?

A

More complicated way of phishing where its exploits the DNS (Domain Name Service) System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Evil Twins?

A

Wireless network that pretends to offer trusthworthy Wi-fi connections to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Identity Theft?

A

Theft of personal information to impersonate someone.
Example: Posers and Gamers

17
Q

What is Information Leak?

A

When information is revealed to the public
Information given to an unauthorized user
AKA, “Data Breach”
Example: FB and Cambridge Analytica Scandal

18
Q

What is a Hacker?

A

Someone who accesses a computer system by circumventing and breaching its security system.

19
Q

What is Hacking?

A

Defined as showing computer expertise

20
Q

Types of Hacker

A
  1. Professional Hacker (White/Black Hackers)
  2. Script Kiddies
  3. Underemployed Adult Hackers
  4. Ideological Hacker
21
Q

What are Script Kiddies?

A

Mostly students who want to be known

22
Q

What is Underemployed Adult Hacker?

A

Adults who want to have recognition to the hacker’s community.

23
Q

What is Ideological Hackers?

A

Targets government sites for political purposes.

24
Q

What is Criminal Hacker?

A

Will do what they want to get what they want regardless of harming others.

25
Q

What is Corporate Spies?

A

Relatively rare hackers
A spy
Intelligent

26
Q

What is Disgruntled Employees?

A

Employees who wants revenge

27
Q

What is Plagiarism?

A

Copying or stealing an idea or work of others without giving credit

28
Q

Avoiding Copyright Infringement

A

Understand
Be responsible
Be creative
Know the law

29
Q

Copyright Infringement

A

Intellectual Property Code of the Philippines (RA8293)

30
Q

Email Scam/Junk Mail/Spam Mail

A

unsolicited commercial email sent from an unknown source

31
Q

Email Spoofing

A

creation of emails with a forged sender address

32
Q

Cyberstalking

A

giving unwanted obsessive attention to a specific person using technology

33
Q

Online Predation

A

engaging an underage minor into inappropriate sexual relationships through the internet

34
Q

Flaming

A

Saying mean things online, usually in ALL CAPS, public forums with intention to humiliate

35
Q

Republic Act 10173 - Data Privacy Act of 2012

A

protect the fundamental human right of privacy, ensuring free flow of information to promote innovation and growth