lesson 2 Flashcards
The Internet has profoundly impacted virtually all aspects of modern life.
The Internet is one of the most dangerous places, especially if you do not know what you are doing.
TF
TT
FF
FT
TT
The —— has profoundly impacted virtually all aspects of modern life, including communication, education, business, entertainment, research, and more.
Internet
TRUE OR FALSE
THE INTERNTET IS ALSO THE WWW
FALSE
Internet is distinct from the World Wide Web
is a branch of computer security specifically related to the Internet,
often involving browser security but also network security on a more general level as it applies to other applications or operating systems.
Internet Security
Its objective is to establish rules and measures to use against attacks over the Internet. There are different methods that have been used to protect the transfer of data, including encryption.
Internet Security
——— or ‘e-safety’ includes knowing about one’s internet privacy and how
one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.
Internet safety
o Provideyourinformationtoreputablebusinesses,thenensure
that the company’s website uses a Web address that starts with “https” and has a padlock symbol either in the address bar or at the bottom of the browser.
Tip #2: Check for website safety
o Look for these red flags:
▪ Misspelled URLs or strange domain names (e.g.,
“amaz0n.com” instead of “amazon.com”)
▪ Poor grammar and spelling errors throughout the site
▪ Unprofessional design or layout
▪ Requests for excessive personal information
▪ Unbelievable deals or offers that seem too good to be
true
Tip #1: Be Aware of Fake websites.
o Createstrong,complicatedpassphrases(notpasswords)
o Usetwo-factorauthentication(2FA)orbetter,anauthenticator
app
o Make sure you’re using a secure Wi-Fi connection.
Tip #3: Choose strong/varied passwords
▪ law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
DataPrivacyAct
o Having anti-spyware and antivirus programs running on your
computer is a must.
Tip #4: Avoid Spyware
o Limiting the personal information that you share online o Securingyourpassword
o Signinginandout
o Usingsecurednetworks
o Lockingyourscreenordevice
Tip #5: It’s NOT all about spyware and scams
Major Concerns of Online Ethics (4)
the protection of private information
data privacy act
limits of presumed freedom of expression
issues of libel
▪ Freedom of expression is not an absolute right and can be subjected to
restrictions.
The limits of presumed freedom of expression
Defamation involves writing or saying something about someone that damages
that person’s reputation. There are two categories of defamation: libel (written or published defamation) and slander (spoken defamation).
issues of libel
If you create something – an idea, an invention, a form of literary work, or research, you have the right to how it should be used by others. This is called ——-
intellectual property.
is a part of a law, wherein you have the right/s to your work, and anyone who uses it without your consent is punishable by law.
COPYRIGHT LAW
A ——— protects “original works of authorship,” including literary, dramatic, musical, artistic, and other intellectual creations. It gives the creator exclusive rights to reproduce, distribute, adapt, display, and perform their work.
copyright
A ——– protects words, symbols, designs, or phrases that identify and distinguish the source of goods or services. It prevents others from using the same or similar marks that could cause confusion in the marketplace.
trademark
It is a code or
software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
Malware
A ——– information that gives a business a competitive advantage and is protected from unauthorized disclosure. It can include formulas, recipes, customer lists, manufacturing processes, and other confidential information.
trade secret
A ——– grants exclusive rights to the inventor of a new, useful, and non-obvious invention. It prevents others from making, using, selling, or importing the invention without permission.
patent
means that intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.
FAIR USE
——- or online threats are a category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.
Internet threats
types of malwares: 7
Very Wild Tigers Run Beneath A Sky (mnemonic)
viruses
worms
trojans
ransomware
bots
adware
spyware
are a type of malware that often take the form of a piece of code
inserted in an application, program, or system and they’re deployed by victims themselves.
Viruses
these r similar to malware viruses, are a type of malware that replicates itself. Unlike viruses, however, —– can copy itself without any human interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage.
Worms
—— are a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices. —— malware is often spread via email attachments, website downloads, or direct messages.
Trojans
——–, as the name indicates, is a type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
Ransomware
—- might act more as a “spider,” meaning a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
Bots