Lesson 4 Flashcards
● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
password
is
virtual in nature
and unbounded
unlike our physical
environment.
Cyber World,
also known as
Cyberspace
Features of the Cyber World
Virtual Self
Source of Information
Social Interaction
a digital representation of
humans to interact in
virtual world
Virtual Self
data that are
available to
anyone as
long as they
have an
internet
connection
Source of
Information
digital
socialization
using chat,
blogs, vlogs,
online games,
etc.
Social
Interaction
Tools for Social
Interaction
● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends, COL,
etc.)
Dangers and
Threats on the
Internet
Hacking
Identity Theft
Internet Predators
Cyberbullying
Malicious Software
stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
Hacking
the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
Identity Theft
individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
Internet
Predators
an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers
Cyberbullying
also known as malware,
is created to invade and
destroy computer
systems
Malicious Software
- Think before you click.
- Do not share personal
information. - Beware of phishing and
scam.
- Keep your device secure.
- Never share passwords.
- Never agree to meet
anyone you just met
online
- Tell your guardian if
something goes wrong
online. - Cover your webcam when
not in used. - Use a strong password.
- Make sure to logout your
account in public devices.
The cyber world allows us to navigate through Wrap Up
a virtual world, interact with other people
through the use of the internet, and retrieve
data from the vast information available
online.
The Internet is very powerful but along with
these advancements, we can encounter risks
such as exposure to unsuitable content,
crime-related dangers, privacy-related
dangers, and malicious software.
Being a generation of technology-dependent
human beings, we need to be more careful on
the internet to avoid risks. We protect
ourselves by simply creating strong passwords,
and by avoiding sharing personal information
with others, especially with strangers.