lesson 2 Flashcards
The Internet has profoundly impacted virtually all aspects of modern life.
The Internet is one of the most dangerous places, especially if you do not know what you are doing.
TF
TT
FF
FT
TT
The —— has profoundly impacted virtually all aspects of modern life, including communication, education, business, entertainment, research, and more.
Internet
TRUE OR FALSE
THE INTERNTET IS ALSO THE WWW
FALSE
Internet is distinct from the World Wide Web
is a branch of computer security specifically related to the Internet,
often involving browser security but also network security on a more general level as it applies to other applications or operating systems.
Internet Security
Its objective is to establish rules and measures to use against attacks over the Internet. There are different methods that have been used to protect the transfer of data, including encryption.
Internet Security
——— or ‘e-safety’ includes knowing about one’s internet privacy and how
one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.
Internet safety
o Provideyourinformationtoreputablebusinesses,thenensure
that the company’s website uses a Web address that starts with “https” and has a padlock symbol either in the address bar or at the bottom of the browser.
Tip #2: Check for website safety
o Look for these red flags:
▪ Misspelled URLs or strange domain names (e.g.,
“amaz0n.com” instead of “amazon.com”)
▪ Poor grammar and spelling errors throughout the site
▪ Unprofessional design or layout
▪ Requests for excessive personal information
▪ Unbelievable deals or offers that seem too good to be
true
Tip #1: Be Aware of Fake websites.
o Createstrong,complicatedpassphrases(notpasswords)
o Usetwo-factorauthentication(2FA)orbetter,anauthenticator
app
o Make sure you’re using a secure Wi-Fi connection.
Tip #3: Choose strong/varied passwords
▪ law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
DataPrivacyAct
o Having anti-spyware and antivirus programs running on your
computer is a must.
Tip #4: Avoid Spyware
o Limiting the personal information that you share online o Securingyourpassword
o Signinginandout
o Usingsecurednetworks
o Lockingyourscreenordevice
Tip #5: It’s NOT all about spyware and scams
Major Concerns of Online Ethics (4)
the protection of private information
data privacy act
limits of presumed freedom of expression
issues of libel
▪ Freedom of expression is not an absolute right and can be subjected to
restrictions.
The limits of presumed freedom of expression
Defamation involves writing or saying something about someone that damages
that person’s reputation. There are two categories of defamation: libel (written or published defamation) and slander (spoken defamation).
issues of libel
If you create something – an idea, an invention, a form of literary work, or research, you have the right to how it should be used by others. This is called ——-
intellectual property.
is a part of a law, wherein you have the right/s to your work, and anyone who uses it without your consent is punishable by law.
COPYRIGHT LAW
A ——— protects “original works of authorship,” including literary, dramatic, musical, artistic, and other intellectual creations. It gives the creator exclusive rights to reproduce, distribute, adapt, display, and perform their work.
copyright
A ——– protects words, symbols, designs, or phrases that identify and distinguish the source of goods or services. It prevents others from using the same or similar marks that could cause confusion in the marketplace.
trademark
It is a code or
software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
Malware
A ——– information that gives a business a competitive advantage and is protected from unauthorized disclosure. It can include formulas, recipes, customer lists, manufacturing processes, and other confidential information.
trade secret
A ——– grants exclusive rights to the inventor of a new, useful, and non-obvious invention. It prevents others from making, using, selling, or importing the invention without permission.
patent
means that intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.
FAIR USE
——- or online threats are a category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.
Internet threats
types of malwares: 7
Very Wild Tigers Run Beneath A Sky (mnemonic)
viruses
worms
trojans
ransomware
bots
adware
spyware
are a type of malware that often take the form of a piece of code
inserted in an application, program, or system and they’re deployed by victims themselves.
Viruses
these r similar to malware viruses, are a type of malware that replicates itself. Unlike viruses, however, —– can copy itself without any human interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage.
Worms
—— are a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices. —— malware is often spread via email attachments, website downloads, or direct messages.
Trojans
——–, as the name indicates, is a type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
Ransomware
—- might act more as a “spider,” meaning a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
Bots
are a type of malware that gain access to devices through a piece of malicious coding. In some cases, —– directly hack devices, with cyber criminals even taking remote control of devices.
Botnets
——, as the name indicates, is malware that involves advertising. Also known as advertising-supported software, —— displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity.
Adware
is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.
Spamming
—— is a type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes
Spyware
It is identity theft that generally targets users with the aim to con them into revealing
their personal and confidential information. Attackers commonly use —— emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.
phishing
It Is a complicated form of phishing. A user can fall victim to —— even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker. When you type a URL into your browser’s address bar, like www.google.com for example, several background processes have to happen before you see that familiar Google logo and search box on your computer screen.
pharming
The use of the internet to target and exploit vulnerable individuals, often children, for sexual purposes. This may involve grooming, sexting, sharing child sexual abuse material (CSAM), or even arranging in-person meetings for sexual abuse.
Online predation:
: The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.
Hacking
The use of electronic means (internet, email, social media) to harass, intimidate, or threaten someone. This can include sending unwanted messages, tracking someone’s online activity, or even posting personal information to cause embarrassment.
Cyberstalking (threats):
Using digital platforms to bully someone by posting harmful or offensive content, sending abusive messages, or excluding them from online communities. Trolling specifically involves intentionally provoking others with inflammatory or offensive remarks.
Cyberbullying (trolling):
Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population. This can include hate speech, graphic violence, pornography, or content that exploits children. Defining obscenity often involves legal and cultural considerations.
Obscene/offensive content:
Fabricated or misleading information presented as news, often with the intention to deceive or manipulate audiences. It can be spread through social media, traditional media, or other online platforms.
Fake news (misinformation):
The act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them. This often involves tricking or coercing someone into sending these images, then threatening to share them unless they comply with demands, often for money or sexual favors.
Sextortion (online crimes):
——– is a multifaceted concept encompassing the rights, responsibilities, and ethical practices surrounding the use of technology in our lives, particularly online. It’s about being an informed, engaged, and responsible member of the digital community, just as we strive to be in the physical world
Digital citizenship
- Treating others online with the same respect you would in person, regardless of differences in opinion or background.
Recognizing the impact of your words and actions online, and taking responsibility for their consequences.
Protecting people’s privacy and respecting their personal information.
Respect and Responsibility:
- Maintaining a healthy balance between your online and offline life.
- Protecting yourself from online threats like scams, phishing, and malware.
- Recognizing the potential for addiction and mental health implications of
excessive online engagement.
Digital Wellness and Safety
- Developing essential skills for navigating the digital world, including
searching for information effectively, evaluating online sources critically,
and understanding cyber-safety practices. - Recognizing misinformation and disinformation, and learning how to
combat its spread. - Thinking critically about the content you consume and share online.
Technology Literacy and Critical Thinking
- Engaging positively and constructively in online communities and
platforms. - Using technology to collaborate with others, learn, and contribute to
knowledge and understanding. - Advocating for a fair and just online environment for all.
Participation and Collaboration
The nine elements of digital citizenship, often organized under the S3 framework
WHAT R THE 3 S
(Safe, Savvy, and Social).
3 under safe?
digital security
digital privacy
digital law
3 under savvy
digital literacy
digital integrity
digital responsibilities
3 under social
digital commerce
digital etiquette
digital downtime
Protecting yourself from online threats like malware, hacking,
and online scams.
Digital Security:
Understanding and protecting your personal
information online, practicing good password hygiene, and respecting others’
privacy.
Digital Privacy (Access):
Understanding and complying with online laws and regulations,
copyright and intellectual property rights, and responsible use of technology.
Digital Law:
Developing critical thinking skills to navigate the online world
effectively, evaluate information sources, and recognize credible information.
Digital Literacy:
Using technology ethically and constructively, being aware of the consequences of your online actions, and contributing to a positive online environment.
Digital Responsibilities:
Being honest and truthful online, avoiding plagiarism and spreading misinformation, and contributing original and accurate content.
Digital Integrity(Communication):
Responsible online buying and selling, understanding
online transactions and regulations, and avoiding illegal activities.
Digital Commerce:
Practicing good online manners, respecting others’ opinions
and perspectives, and avoiding cyberbullying and online harassment.
- Digital Etiquette:
Treat others online the same way you would in person. Avoid offensive language,
insults, and personal attacks.
Be respectful:
Maintaining a healthy balance between online and offline activities, taking breaks from technology, and
prioritizing real-world relationships.
digital Downtime (Health and Wellness):
Once something is posted online, it’s difficult to erase completely. Consider the potential consequences of your words before hitting “send” or “share.”
Think before you post:
Avoid using excessive slang, abbreviations, and jargon. Not everyone may understand your lingo, and it can come across as unprofessional or rude.
Mind your language:
, a blend of “internet” and “etiquette,” refers to the set of rules and guidelines for polite and respectful behavior online. It’s essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone.
Netiquette
Don’t share personal information about yourself or others without their consent. Respect their privacy boundaries and avoid oversharing.
Be mindful of privacy:
If you share someone else’s content, be sure to credit them properly. Plagiarism is not okay online or offline.
Give credit where it’s due:
This isn’t about being perfect, but making a reasonable effort to communicate clearly and avoid misunderstandings.
Use proper grammar and spelling:
Different online platforms have different norms and expectations. Adjust your behavior accordingly and be respectful of the community you’re interacting with.
Be mindful of the platform:
Don’t bombard people with unwanted messages or emails. Respect their time and attention.
Avoid spam and unsolicited messages:
Promote positive online behavior, report cyberbullying and harassment, and help make the internet a better place for everyone.
Be a good digital citizen:
good or bad netiquette
Thanking someone for their help.
Offering constructive criticism in a respectful manner.
good
good or bad netiquette:
Congratulating someone on their achievements.
Sharinghelpfulinformationorresources.
good
good or bad netiquette:
Using offensive language or insults.
o Makingpersonalattacksorthreats.
o Sharing someone else’s personal information without their permission.
bad
good or bad netiquette:
Postinginflammatoryorhatefulcontent.
o Plagiarism or taking credit for someone else’s work.
abd