Lesson 2: Rules of Netiquette Flashcards

1
Q

Online Safety and Security - Shared Information (10)

A
  1. First name
  2. Last name
  3. Middle name
  4. Current and previous school(s)
  5. Cell phone number
  6. Names of your mother and father
  7. Names of your siblings
  8. Address
  9. Home phone number
  10. Birthday
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • hacker may already know plenty of stuff about you even if you only give this out
A

First name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • more risky than giving your first name
  • you will be vulnerable to being searched for using search engines, which include image search
  • matching name with face
A

Last name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • probably not the most risky of these shared information
A

Middle name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • most people who steal identities study their subject

- use this information for verification purposes

A

Current and previous school(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • should never be posted on the Internet

- random strangers might text or call you, or worse, pretend that they are someone else

A

Cellphone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • mother’s maiden name

- an answer to a secret question whenever you lose a password

A

Names of your mother and father

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • disclosing this is a huge risk

- strangers may pretend or use their identity to dupe you

A

Names of your siblings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • it would be much easier for criminals to find you
A

Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • more risky than sharing your personal information
  • scams usually use this information to deceive you
  • when a stranger pretends to know your parents or be you
A

Home phone number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • makes you vulnerable to identity theft
A

Birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tips to Stay Safe Online no.1

A
  • Be mindful of what you share online….
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tips to Stay Safe Online no.2

A
  • Do not just accept terms and conditions….
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tips to Stay Safe Online no.3

A
  • Check out the privacy policy page….
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tips to Stay Safe Online no.4

A
  • Know the security features of the social networking site you use…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tips to Stay Safe Online no.5

A
  • Do not share any of your passwords….
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tips to Stay Safe Online no.6

A
  • Avoid logging in to a public networks/WiFi…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Tips to Stay Safe Online no.7

A
  • Do not talk to strangers….
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tips to Stay Safe Online no.8

A
  • Never post anything about a future vacation…
20
Q

Tips to Stay Safe Online no.9

A
  • Add friends you know in real life…
21
Q

Tips to Stay Safe Online no.10

A
  • Avoid visiting untrusted websites.
22
Q

Tips to Stay Safe Online no.11

A
  • Install and update an antivirus software on your computer.
23
Q

Tips to Stay Safe Online no.12

A
  • If you have WiFi at home, make it a private network…
24
Q

Tips to Stay Safe Online no.13

A
  • Avoid downloading anything from untrusted websites…
25
Q

Tips to Stay Safe Online no.14

A
  • Buy the software, not pirated ones
26
Q

Tips to Stay Safe Online no.15

A
  • Do not reply or click links from sus emails.
27
Q

Internet Threats (3)

A
  1. Malware
  2. Spam
  3. Phishing
28
Q
  • stands for malicious software
  • a collective name for a number of malicious software variants
  • designed to cause extensive damage to data and systems or to gain unauthorized access to a network
29
Q

Types of Malware (5)

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware
  5. Adware
30
Q
  • a malicious program loaded into a users computer without the user’s knowledge and performs malicious actions and can be transferred from one computer to another through the Internet and local networks or data storage like flash drives and CD’s
  • designed to replicate itself and transfer from one computer to another
31
Q
  • stand-alone malicious programs that can self-replicate and propagate via computer networks without human help
  • it transfers from one computer to another by any type of means
  • ex: ILOVEYOU worm (Love Bug Worm) created by a Filipino
32
Q
  • a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
33
Q
  • example of Trojan Malware
  • tricks the user into posing that it is a security software
  • asks the user to pay to improve his security but in reality, they are not protected at all
A

Rogue security software

34
Q
  • a program that runs in the background without you knowing it
  • thus called a “spy”
  • has the ability to monitor what are you currently doing and typing through keylogging
35
Q
  • example of Spyware
  • used to record the keystroke done by the users
  • done to steal their passwords or any other sensitive information
  • can record email, messages, or any information you type using your keyboard
A

Keyloggers

36
Q
  • a program designed to send you advertisements mostly pop-ups
37
Q
  • unwanted email mostly from bots or advertisers

- can be used to send malware

38
Q
  • its goal is to acquire sensitive personal info like passwords and credit card details
  • is done by sending you an email that will direct the user to visit a website and be asked to update his username, password, credit card, or personal info
  • a cybercrime in which a target is contracted by email, telephone or text message by someone posing a legitimate institution to lure individuals into proving sensitive data such as baking cards, credit card details, and passwords
39
Q
  • a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
  • it redirects a website’s traffic to another fake site
40
Q
  • if you create something like an idea, invention, form of literary work, research, you have the right as to how it should be used by others
A

Intellectual Property

41
Q
  • includes your rights over your work, and anyone who uses it without your consent is punishable by law
A

Copyright law

42
Q

Tips that could help you avoid copyright infringement: (4)

A
  1. Understand
  2. Be responsible
  3. Be creative
  4. Know the law
43
Q
  • protects literary works, photographs, paintings, drawings, film, music and lyrics, choreography, and sculptures, but it generally does not protect underlying ideas and facts
44
Q
  • means that an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, arodies, news reports, research, library archiving, teaching, and education
45
Q

tips in conducting online research: (5)

A
  1. Have a question in mind
  2. Narrow it down
  3. Advanced search
  4. Look for a credible source
  5. Give credit