LESSON 2 Flashcards
it refers to the online security or safety of people and their information when using the internet.
Internet Security
a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting it’s own code.
computer virus
short for malicious software. ________ is the name that is given to any type of software that could harm a computer system, interfere with and gather a user data or make the computer perform actions without
Malware
types of malware
Virus
Adware
Worm
Trojan
Ransomware
Spyware
a piece of malicious code that inserts itself into computer systems, self- replicates, and spreads to other system and devices.
Virus
who is created the ILOVEYOU virus
onel de guzman
a type of malware or malicious software that can replicate rapidly and spread across devices within a network. as it spreads a ______ consume bandwidth, overloading infected system and making them unreliable or unavailable
worm
a malware disguised as harmless and legitimate software, application, or a games, tempting users to download it. once a ______ infiltrates the system, it grants the attacker unauthorized control over devices or spread malware without the users knowledge
trojan
advertising supported software that display unwanted or malicious advertisements on a user’s device. it tracks userd activity online and collect data to provide targeted advertising
Adware
a time sensitive cyber attack when a hacker encrypt user files or devices and hold them for _______ until a certain deadline.
ransomware
software that secretly monitor and collect information about a user’s activities, often without their knowledge or consent
Spyware
also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. _____ can be sent by real humand, which a network of computers
spam
a cyber crime in which a target or target are contacted by email, telephone or text message by someone posing as a legitimate institutions to lure individuals into providing sensitive data such as personally indetifiable information, banking and credit card details anf and password
phishing
ways to protect your computer from viruses
- keep up to data
- antivirus software
- antispyware software
- use strong protection
- choose strong password
- use stronger authentication
- protect your private information
- be careful what you click
- shop safely
- be careful what you share
concerned with the proper manner of communication in the online environment. whenever you communicate in the virtual world, consider the following “rules”, adapted from virginia shea’s core rules of ____
netiquette
when communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the golden rule: do unto others as you would have other do unto you.
rule 1: remember the human
while it can be argued that standard of behavior may be diff in the virtual world, they certainly should not be lower.
rule 2: adhere to the same standards of behavior online that you follow in real life
depending on where you are in the virtual world, the same written communication can be acceptable in one area where it might be considered inappropriate in another
rule 3: know where you are in cyberspace
electronics communication takes time to read and time in which to respond. most people today lead to busy lives, just like you do, and do not have time to read or respond to frivolous email
rule 4: respect others people time and bandwidth
one of the virtual world’s best things is the lack kf judgment associated with your physical appearance, the sound of your voice, or the clothes you wear
rule 5: make yourself look good online
Internet offers it’s user many benefits; one is the ease in which information can be shred or accessed, and in fact this “information sharing”
rule 6: share expert knowledge
what is meant by flaming and flame wars, flaming is what people do when they express a strongly held opinion without holding back any emotion….. bla bla bla
rule 7: help keep flame wars under control
depending on what you are reading in the virtual world, be it an online class discussion forum, facebook page or an email you may be exposed to some private or personal information that needs to be handled with care
rule 8: respect others people’s privacy
like in ftf situation, there are people in cyberspace who have more “power” than othersn
rule 9: dont abuse your power
not everyone has the same amount of experience working in the virtual world. and not everyone knows the rules of netiquette
rule 10: be forgiving of other people’s mistake