lesson 2 Flashcards

1
Q

The Internet has profoundly impacted virtually all aspects of modern life.

The Internet is one of the most dangerous places, especially if you do not know what you are doing.

TF
TT
FF
FT

A

TT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The —— has profoundly impacted virtually all aspects of modern life, including communication, education, business, entertainment, research, and more.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TRUE OR FALSE

THE INTERNTET IS ALSO THE WWW

A

FALSE

Internet is distinct from the World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a branch of computer security specifically related to the Internet,
often involving browser security but also network security on a more general level as it applies to other applications or operating systems.

A

Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Its objective is to establish rules and measures to use against attacks over the Internet. There are different methods that have been used to protect the transfer of data, including encryption.

A

Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

——— or ‘e-safety’ includes knowing about one’s internet privacy and how
one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.

A

Internet safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

o Provideyourinformationtoreputablebusinesses,thenensure
that the company’s website uses a Web address that starts with “https” and has a padlock symbol either in the address bar or at the bottom of the browser.

A

Tip #2: Check for website safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

o Look for these red flags:
▪ Misspelled URLs or strange domain names (e.g.,
“amaz0n.com” instead of “amazon.com”)
▪ Poor grammar and spelling errors throughout the site
▪ Unprofessional design or layout
▪ Requests for excessive personal information
▪ Unbelievable deals or offers that seem too good to be
true

A

Tip #1: Be Aware of Fake websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

o Createstrong,complicatedpassphrases(notpasswords)
o Usetwo-factorauthentication(2FA)orbetter,anauthenticator
app
o Make sure you’re using a secure Wi-Fi connection.

A

Tip #3: Choose strong/varied passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

▪ law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

A

DataPrivacyAct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

o Having anti-spyware and antivirus programs running on your
computer is a must.

A

Tip #4: Avoid Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

o Limiting the personal information that you share online o Securingyourpassword
o Signinginandout
o Usingsecurednetworks
o Lockingyourscreenordevice

A

Tip #5: It’s NOT all about spyware and scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Major Concerns of Online Ethics (4)

A

the protection of private information

data privacy act

limits of presumed freedom of expression

issues of libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

▪ Freedom of expression is not an absolute right and can be subjected to
restrictions.

A

The limits of presumed freedom of expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defamation involves writing or saying something about someone that damages
that person’s reputation. There are two categories of defamation: libel (written or published defamation) and slander (spoken defamation).

A

issues of libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you create something – an idea, an invention, a form of literary work, or research, you have the right to how it should be used by others. This is called ——-

A

intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a part of a law, wherein you have the right/s to your work, and anyone who uses it without your consent is punishable by law.

A

COPYRIGHT LAW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ——— protects “original works of authorship,” including literary, dramatic, musical, artistic, and other intellectual creations. It gives the creator exclusive rights to reproduce, distribute, adapt, display, and perform their work.

A

copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ——– protects words, symbols, designs, or phrases that identify and distinguish the source of goods or services. It prevents others from using the same or similar marks that could cause confusion in the marketplace.

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a code or
software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ——– information that gives a business a competitive advantage and is protected from unauthorized disclosure. It can include formulas, recipes, customer lists, manufacturing processes, and other confidential information.

A

trade secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ——– grants exclusive rights to the inventor of a new, useful, and non-obvious invention. It prevents others from making, using, selling, or importing the invention without permission.

A

patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

means that intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.

A

FAIR USE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

——- or online threats are a category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.

A

Internet threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

types of malwares: 7

Very Wild Tigers Run Beneath A Sky (mnemonic)

A

viruses
worms
trojans
ransomware
bots
adware
spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are a type of malware that often take the form of a piece of code
inserted in an application, program, or system and they’re deployed by victims themselves.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

these r similar to malware viruses, are a type of malware that replicates itself. Unlike viruses, however, —– can copy itself without any human interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

—— are a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices. —— malware is often spread via email attachments, website downloads, or direct messages.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

——–, as the name indicates, is a type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

—- might act more as a “spider,” meaning a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

are a type of malware that gain access to devices through a piece of malicious coding. In some cases, —– directly hack devices, with cyber criminals even taking remote control of devices.

A

Botnets

24
Q

——, as the name indicates, is malware that involves advertising. Also known as advertising-supported software, —— displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity.

A

Adware

25
Q

is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.

A

Spamming

26
Q

—— is a type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes

A

Spyware

27
Q

It is identity theft that generally targets users with the aim to con them into revealing
their personal and confidential information. Attackers commonly use —— emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.

A

phishing

28
Q

It Is a complicated form of phishing. A user can fall victim to —— even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker. When you type a URL into your browser’s address bar, like www.google.com for example, several background processes have to happen before you see that familiar Google logo and search box on your computer screen.

A

pharming

28
Q

The use of the internet to target and exploit vulnerable individuals, often children, for sexual purposes. This may involve grooming, sexting, sharing child sexual abuse material (CSAM), or even arranging in-person meetings for sexual abuse.

A

Online predation:

29
Q

: The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.

A

Hacking

30
Q

The use of electronic means (internet, email, social media) to harass, intimidate, or threaten someone. This can include sending unwanted messages, tracking someone’s online activity, or even posting personal information to cause embarrassment.

A

Cyberstalking (threats):

31
Q

Using digital platforms to bully someone by posting harmful or offensive content, sending abusive messages, or excluding them from online communities. Trolling specifically involves intentionally provoking others with inflammatory or offensive remarks.

A

Cyberbullying (trolling):

32
Q

Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population. This can include hate speech, graphic violence, pornography, or content that exploits children. Defining obscenity often involves legal and cultural considerations.

A

Obscene/offensive content:

33
Q

Fabricated or misleading information presented as news, often with the intention to deceive or manipulate audiences. It can be spread through social media, traditional media, or other online platforms.

A

Fake news (misinformation):

34
Q

The act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them. This often involves tricking or coercing someone into sending these images, then threatening to share them unless they comply with demands, often for money or sexual favors.

A

Sextortion (online crimes):

35
Q

——– is a multifaceted concept encompassing the rights, responsibilities, and ethical practices surrounding the use of technology in our lives, particularly online. It’s about being an informed, engaged, and responsible member of the digital community, just as we strive to be in the physical world

A

Digital citizenship

36
Q
  • Treating others online with the same respect you would in person, regardless of differences in opinion or background.

Recognizing the impact of your words and actions online, and taking responsibility for their consequences.

Protecting people’s privacy and respecting their personal information.

A

Respect and Responsibility:

37
Q
  • Maintaining a healthy balance between your online and offline life.
  • Protecting yourself from online threats like scams, phishing, and malware.
  • Recognizing the potential for addiction and mental health implications of
    excessive online engagement.
A

Digital Wellness and Safety

37
Q
  • Developing essential skills for navigating the digital world, including
    searching for information effectively, evaluating online sources critically,
    and understanding cyber-safety practices.
  • Recognizing misinformation and disinformation, and learning how to
    combat its spread.
  • Thinking critically about the content you consume and share online.
A

Technology Literacy and Critical Thinking

38
Q
  • Engaging positively and constructively in online communities and
    platforms.
  • Using technology to collaborate with others, learn, and contribute to
    knowledge and understanding.
  • Advocating for a fair and just online environment for all.
A

Participation and Collaboration

39
Q

The nine elements of digital citizenship, often organized under the S3 framework

WHAT R THE 3 S

A

(Safe, Savvy, and Social).

40
Q

3 under safe?

A

digital security
digital privacy
digital law

41
Q

3 under savvy

A

digital literacy
digital integrity
digital responsibilities

42
Q

3 under social

A

digital commerce
digital etiquette
digital downtime

43
Q

Protecting yourself from online threats like malware, hacking,
and online scams.

A

Digital Security:

44
Q

Understanding and protecting your personal
information online, practicing good password hygiene, and respecting others’
privacy.

A

Digital Privacy (Access):

45
Q

Understanding and complying with online laws and regulations,
copyright and intellectual property rights, and responsible use of technology.

A

Digital Law:

46
Q

Developing critical thinking skills to navigate the online world
effectively, evaluate information sources, and recognize credible information.

A

Digital Literacy:

46
Q

Using technology ethically and constructively, being aware of the consequences of your online actions, and contributing to a positive online environment.

A

Digital Responsibilities:

46
Q

Being honest and truthful online, avoiding plagiarism and spreading misinformation, and contributing original and accurate content.

A

Digital Integrity(Communication):

47
Q

Responsible online buying and selling, understanding
online transactions and regulations, and avoiding illegal activities.

A

Digital Commerce:

48
Q

Practicing good online manners, respecting others’ opinions
and perspectives, and avoiding cyberbullying and online harassment.

A
  • Digital Etiquette:
49
Q

Treat others online the same way you would in person. Avoid offensive language,
insults, and personal attacks.

A

Be respectful:

49
Q

Maintaining a healthy balance between online and offline activities, taking breaks from technology, and
prioritizing real-world relationships.

A

digital Downtime (Health and Wellness):

50
Q

Once something is posted online, it’s difficult to erase completely. Consider the potential consequences of your words before hitting “send” or “share.”

A

Think before you post:

50
Q

Avoid using excessive slang, abbreviations, and jargon. Not everyone may understand your lingo, and it can come across as unprofessional or rude.

A

Mind your language:

50
Q

, a blend of “internet” and “etiquette,” refers to the set of rules and guidelines for polite and respectful behavior online. It’s essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone.

A

Netiquette

51
Q

Don’t share personal information about yourself or others without their consent. Respect their privacy boundaries and avoid oversharing.

A

Be mindful of privacy:

52
Q

If you share someone else’s content, be sure to credit them properly. Plagiarism is not okay online or offline.

A

Give credit where it’s due:

52
Q

This isn’t about being perfect, but making a reasonable effort to communicate clearly and avoid misunderstandings.

A

Use proper grammar and spelling:

53
Q

Different online platforms have different norms and expectations. Adjust your behavior accordingly and be respectful of the community you’re interacting with.

A

Be mindful of the platform:

54
Q

Don’t bombard people with unwanted messages or emails. Respect their time and attention.

A

Avoid spam and unsolicited messages:

55
Q

Promote positive online behavior, report cyberbullying and harassment, and help make the internet a better place for everyone.

A

Be a good digital citizen:

56
Q

good or bad netiquette

Thanking someone for their help.

Offering constructive criticism in a respectful manner.

A

good

57
Q

good or bad netiquette:

Congratulating someone on their achievements.

Sharinghelpfulinformationorresources.

A

good

57
Q

good or bad netiquette:

Using offensive language or insults.
o Makingpersonalattacksorthreats.
o Sharing someone else’s personal information without their permission.

A

bad

58
Q

good or bad netiquette:

Postinginflammatoryorhatefulcontent.
o Plagiarism or taking credit for someone else’s work.

A

abd