Lesson 2 Flashcards
Core Rules of Netiquette
- Remember the Human
- Adhere to the Same Standard behaviour online that you follow in real like.
- Know where you are in Cyberspace
- Respect other people’s tome and bandwidth
- Make yourself look good online
- Share expert knowledge
- Help keep flame wars under control
- Respect other people’s privacy
- Don’t abuse your power
- Be forgiving of other people’s mistakes
Net Pioneers and Web Creator
Larry Roberts
Bob Kahn
Vint Cerf
Sir Tim Berners-Lee
Internet Threats
- Malware
- SPAM
- Phishing (Pharming)
- Evil Twins
Stands for malicious software
Malware
Types of Malware
Virus, Worm, Trojan, Spyware, Adware, and Ransomware
What is a Virus?
Malicious program that replicates and transfer from one computer to another.
Example: Short-cut files and Downloadable files
What is a Worm?
Malicious program that transfer from one computer to another, by any types of means
Example: ILOVEYOU worm (Love Bug Worm) created by the Filipino Onel De Guzman
What is a Trojan?
Designed as useful program but once downloaded or installed, leaves PC unprotected and allows hackers to get your information
Example: Computer Games
What is Spyware?
Program that runs in the background without you knowing it
Ability to monitor what you are doing and typing through keylogging
e.g Fake Login Forms/Sites
What is Adware?
Program designed to send you advertisements, mostly as pop-ups
Aka, Click Fraud
E.G Pop-up ads
What is Ransomware?
Holds your PC hostage and demand money
Locks computer/threatens to destroy data/demands money
What is SPAM?
Unwanted email mostly from bots and advertisements.
Can be used to send malware
What is Phishing?
To acquire sensitive personal information like passwords and credit cards detail.
*Pharming- more complicated way of phishing where its exploits the DNS (Domain Name Service) System.
What is Pharming?
More complicated way of phishing where its exploits the DNS (Domain Name Service) System.
What is Evil Twins?
Wireless network that pretends to offer trusthworthy Wi-fi connections to the internet
What is Identity Theft?
Theft of personal information to impersonate someone.
Example: Posers and Gamers
What is Information Leak?
When information is revealed to the public
Information given to an unauthorized user
AKA, “Data Breach”
Example: FB and Cambridge Analytica Scandal
What is a Hacker?
Someone who accesses a computer system by circumventing and breaching its security system.
What is Hacking?
Defined as showing computer expertise
Types of Hacker
- Professional Hacker (White/Black Hackers)
- Script Kiddies
- Underemployed Adult Hackers
- Ideological Hacker
What are Script Kiddies?
Mostly students who want to be known
What is Underemployed Adult Hacker?
Adults who want to have recognition to the hacker’s community.
What is Ideological Hackers?
Targets government sites for political purposes.
What is Criminal Hacker?
Will do what they want to get what they want regardless of harming others.
What is Corporate Spies?
Relatively rare hackers
A spy
Intelligent
What is Disgruntled Employees?
Employees who wants revenge
What is Plagiarism?
Copying or stealing an idea or work of others without giving credit
Avoiding Copyright Infringement
Understand
Be responsible
Be creative
Know the law
Copyright Infringement
Intellectual Property Code of the Philippines (RA8293)
Email Scam/Junk Mail/Spam Mail
unsolicited commercial email sent from an unknown source
Email Spoofing
creation of emails with a forged sender address
Cyberstalking
giving unwanted obsessive attention to a specific person using technology
Online Predation
engaging an underage minor into inappropriate sexual relationships through the internet
Flaming
Saying mean things online, usually in ALL CAPS, public forums with intention to humiliate
Republic Act 10173 - Data Privacy Act of 2012
protect the fundamental human right of privacy, ensuring free flow of information to promote innovation and growth