Lesson 2 - Rules of Netiquette Flashcards
The 10 most basic information that could be the source of other people that might lead you to riskier and more unsafe when you are sharing those kinds of information
Type of Information
- First Name
- Last Name
- Middle Name
- Current and Previous Schools
- Your Cellphone Number
- Who your Mother and Father are
- Who your Siblings are
- Your address
- Your home phone number
- Your Birthday
Three Types of Internet Threats
- Malware
- Spam
- Phishing
Stands for Malicious Software
Types of Internet Threats
Malware
UNWANTED EMAIL MOSTLY FROM BOTS OR ADVERTISERS. IT CAN BE USED TO SEND MALWARE.
Types of Internet Threats
Spam
ITS GOAL IS TO ACQUIRE SENSITIVE PERSONAL INFORMATION LIKE PASSWORDS AND CREDIT CARD DETAILS.
Types of Internet Threats
Phishing
Six Types of Malware
- Virus
- Worm
- Trojan
- Spyware
- Keyloggers
- Adware
MALICIOUS PROGRAM DESIGNED TO REPLICATE ITSELF AND TRANSFER FROM ONE COMPUTER TO ANOTHER THOUGH STORAGE DEVICE, INTERNET, OR LOCAL NETWORKS.
Types of Malware
Virus
A MALICIOUS PROGRAM TRANSFER FROM ONE COMPUTER TO ANOTHER BY ANY TYPE OF MEANS. OFTEN USED COMPUTER NETWORKS TO SPREAD ITSELF. EX. ILOVEYOU WORM, LOVE BUG WORM. NORMALLY CORRUPT FILES AUTOMATICALLY.
Types of Malware
Worm
A MALICIOUS PROGRAM THAT IS DISGUISED AS A USEFUL PROGRAM, BUT ONCE INSTALLED IT WILL LEAVES YOUR PC UNPROTECTED AND ALLOWS HACKER TO GET YOUR INFORMATION.
Types of Malware
Trojan
A PROGRAM THAT RUNS IN THE BACKGROUND WITHOUT YOU KNOWING IT (SPY). IT HAS THE ABILITY TO MONITOR WHAT YOU ARE DOING AND TYPING THROUGH KEYLOGGING.
Types of Malware
Spyware
USED TO RECORD THE KEYSTROKE DONE BY THE USERS. THIS IS DONE TO STEAL THEIR PASSWORD, OR ANY SENSITIVE INFORMATION.IT CAN RECORD EMAIL, MESSAGES, OR ANY INFORMATION YOU TYPE USING KEYBOARD.
Types of Malware
Keyloggers
A PROGRAM DESIGNED TO SEND YOU ADVERTISEMENTS, MOSTLY AS POP-UPS.
Types of Malware
Adware
Read mo to tas may 5 ka na sakin, lakas mo sakin ‘hal eh
THINK BEFORE YOU CLICK
- BEFORE YOU POST SOMETHING ON THE WEB, ASK THESE QUESTIONS TO YOURSELF: WOULD YOU WANT YOUR PARENTS OR GRANDPARENTS TO SEE IT? WOULD YOU WANT YOUR FUTURE BOSS TO SEE IT? ONCE YOU POST SOMETHING ON THE WEB, YOU HAVE NO CONTROL OF WHO SEES YOUR POSTS.
- YOUR FRIENDS DEPEND ON YOU TO PROTECT THEIR REPUTATION ONLINE. TALK TO YOUR FRIENDS ABOUT THIS SERIOUS RESPONSIBILITY.
- SET YOUR POST TO “PRIVATE.” IN THIS WAY, SEARCH ENGINES WILL NOT BE ABLE TO SCAN THAT POST.
- AVOID USING NAMES. NAMES ARE EASY FOR SEARCH ENGINES TO SCAN.
- IF YOU FEEL THAT A POST CAN AFFECT YOU OR OTHER’S REPUTATION, ASK THE ONE WHO POSTED IT TO PULL IT DOWN OR REPORT IT AS INAPPROPRIATE.
yieee 5 na siya
IS A VIOLATION OF AN INDIVIDUAL OR ORGANIZATION’S COPYRIGHT. IT DESCRIBES THE UNAUTHORIZED USE OF COPYRIGHTED MATERIAL, SUCH AS TEXT, PHOTOS, VIDEOS, MUSIC, SOFTWARE, AND OTHER ORIGINAL CONTENT. VIOLATING INTELLECTUAL PROPERTY.
COPYRIGHT INFRINGEMENT
THE ACTION OF BREAKING THE TERMS OF A LAW, AGREEMENT, ETC.; VIOLATION.
Infringement