Lesson 2: Online Safety, Security, Ethics, and Etiquette Flashcards
defined as the
information
superhighway. This
means that anyone has
access to this highway,
can place info, and can
grab that info
Internet
Eight types of information with risk
Mather’s and Father’s Name, Sibling’s Name, Address, Home and Cell Phone Number, Birthday, Email Address, First, Middle, & Last Name, and Current & Previous School
stands for malicious software.
Malware
a malicious program
designed to replicate itself and transfer
from one computer to another (internet,
local networks, FDs, CDs, etc.)
Virus
a malicious
program that transfers
from one computer to
another by any types of
means.
Worm
was
a computer worm that attacked tens of millions of Windowspersonal
computers on and after 5 May 2000[1] local time in the Philippines when it
started spreading as an email message with the subject line “ILOVEYOU” and
the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.
ILOVEYOU worm
The ILOVEYOU worm sometimes is also referred to as
Love Bug or Love Letter
A file extension that was most often hidden by default on Windows
computers of the time (as it is an extension for a file type that is known by
Windows), leading unwitting users to think it was a normal text file.
vbs
What did the ‘vbs’ file extension activate on the computer?
Visual Basic Script
Where did the ILOVEYOU worm originate from?
Pandacan neighborhood of Manila in the Philippines
When was the ILOVEYOU Worm created?
May 5, 2000
Where and when did the ILOVEYOU worm break out?
Following daybreak on May 5, 2000 across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States
a malicious program
that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
Trojan
a program that runs
in the background without you
knowing it. It
has the ability to monitor what
you are currently doing and
typing through keylogging.
Spyware
used to record keystrokes done by the user. This is
done to steal their password or any other sensitive information. The key
logger software typically uses log file to store its recording.
Keylogger