Lesson 2: Rules of Netiquette Flashcards
Online Safety and Security - Shared Information (10)
- First name
- Last name
- Middle name
- Current and previous school(s)
- Cell phone number
- Names of your mother and father
- Names of your siblings
- Address
- Home phone number
- Birthday
- hacker may already know plenty of stuff about you even if you only give this out
First name
- more risky than giving your first name
- you will be vulnerable to being searched for using search engines, which include image search
- matching name with face
Last name
- probably not the most risky of these shared information
Middle name
- most people who steal identities study their subject
- use this information for verification purposes
Current and previous school(s)
- should never be posted on the Internet
- random strangers might text or call you, or worse, pretend that they are someone else
Cellphone number
- mother’s maiden name
- an answer to a secret question whenever you lose a password
Names of your mother and father
- disclosing this is a huge risk
- strangers may pretend or use their identity to dupe you
Names of your siblings
- it would be much easier for criminals to find you
Address
- more risky than sharing your personal information
- scams usually use this information to deceive you
- when a stranger pretends to know your parents or be you
Home phone number
- makes you vulnerable to identity theft
Birthday
Tips to Stay Safe Online no.1
- Be mindful of what you share online….
Tips to Stay Safe Online no.2
- Do not just accept terms and conditions….
Tips to Stay Safe Online no.3
- Check out the privacy policy page….
Tips to Stay Safe Online no.4
- Know the security features of the social networking site you use…
Tips to Stay Safe Online no.5
- Do not share any of your passwords….
Tips to Stay Safe Online no.6
- Avoid logging in to a public networks/WiFi…
Tips to Stay Safe Online no.7
- Do not talk to strangers….
Tips to Stay Safe Online no.8
- Never post anything about a future vacation…
Tips to Stay Safe Online no.9
- Add friends you know in real life…
Tips to Stay Safe Online no.10
- Avoid visiting untrusted websites.
Tips to Stay Safe Online no.11
- Install and update an antivirus software on your computer.
Tips to Stay Safe Online no.12
- If you have WiFi at home, make it a private network…
Tips to Stay Safe Online no.13
- Avoid downloading anything from untrusted websites…
Tips to Stay Safe Online no.14
- Buy the software, not pirated ones
Tips to Stay Safe Online no.15
- Do not reply or click links from sus emails.
Internet Threats (3)
- Malware
- Spam
- Phishing
- stands for malicious software
- a collective name for a number of malicious software variants
- designed to cause extensive damage to data and systems or to gain unauthorized access to a network
Malware
Types of Malware (5)
- Virus
- Worm
- Trojan
- Spyware
- Adware
- a malicious program loaded into a users computer without the user’s knowledge and performs malicious actions and can be transferred from one computer to another through the Internet and local networks or data storage like flash drives and CD’s
- designed to replicate itself and transfer from one computer to another
Virus
- stand-alone malicious programs that can self-replicate and propagate via computer networks without human help
- it transfers from one computer to another by any type of means
- ex: ILOVEYOU worm (Love Bug Worm) created by a Filipino
Worm
- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
Trojan
- example of Trojan Malware
- tricks the user into posing that it is a security software
- asks the user to pay to improve his security but in reality, they are not protected at all
Rogue security software
- a program that runs in the background without you knowing it
- thus called a “spy”
- has the ability to monitor what are you currently doing and typing through keylogging
Spyware
- example of Spyware
- used to record the keystroke done by the users
- done to steal their passwords or any other sensitive information
- can record email, messages, or any information you type using your keyboard
Keyloggers
- a program designed to send you advertisements mostly pop-ups
Adware
- unwanted email mostly from bots or advertisers
- can be used to send malware
Spam
- its goal is to acquire sensitive personal info like passwords and credit card details
- is done by sending you an email that will direct the user to visit a website and be asked to update his username, password, credit card, or personal info
- a cybercrime in which a target is contracted by email, telephone or text message by someone posing a legitimate institution to lure individuals into proving sensitive data such as baking cards, credit card details, and passwords
Phishing
- a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
- it redirects a website’s traffic to another fake site
Pharming
- if you create something like an idea, invention, form of literary work, research, you have the right as to how it should be used by others
Intellectual Property
- includes your rights over your work, and anyone who uses it without your consent is punishable by law
Copyright law
Tips that could help you avoid copyright infringement: (4)
- Understand
- Be responsible
- Be creative
- Know the law
- protects literary works, photographs, paintings, drawings, film, music and lyrics, choreography, and sculptures, but it generally does not protect underlying ideas and facts
Copyright
- means that an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, arodies, news reports, research, library archiving, teaching, and education
Fair use
tips in conducting online research: (5)
- Have a question in mind
- Narrow it down
- Advanced search
- Look for a credible source
- Give credit