Lesson 4 Flashcards
● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
password
is
virtual in nature
and unbounded
unlike our physical
environment.
Cyber World,
also known as
Cyberspace
Features of the Cyber World
Virtual Self
Source of Information
Social Interaction
a digital representation of
humans to interact in
virtual world
Virtual Self
data that are
available to
anyone as
long as they
have an
internet
connection
Source of
Information
digital
socialization
using chat,
blogs, vlogs,
online games,
etc.
Social
Interaction
Tools for Social
Interaction
● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends, COL,
etc.)
Dangers and
Threats on the
Internet
Hacking
Identity Theft
Internet Predators
Cyberbullying
Malicious Software
stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
Hacking
the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
Identity Theft
individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
Internet
Predators
an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers
Cyberbullying
also known as malware,
is created to invade and
destroy computer
systems
Malicious Software
- Think before you click.
- Do not share personal
information. - Beware of phishing and
scam.
- Keep your device secure.
- Never share passwords.
- Never agree to meet
anyone you just met
online