module 2 Flashcards
ONLINE SECURITY AND SAFETY
a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems. Its objective is to establish rules and measures to use against attacks over the Internet.
internet security
ONLINE SECURITY AND SAFETY
includes knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.
e-safety
ONLINE SECURITY AND SAFETY
- Misspelled URLs or strange domain names (e.g.,
“amaz0n.com” instead of “amazon.com”)
▪ Poor grammar and spelling errors throughout the site
▪ Unprofessional design or layout
▪ Requests for excessive personal information
▪ Unbelievable deals or offers that seem too good to be
true
what do these redflags indicate?
fake websites
ONLINE ETHICS
law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
data privacy act
ONLINE ETHICS
in the case of online ethics, freedom of expression is not an absolute right and can be subjected to restrictions.
TRUE OR FALSE
TRUE
ONLINE ETHICS
Defamation involves writing or saying something about someone that damages that person’s reputation. what is a written deflamation called?
libel
ONLINE ETHICS
Defamation involves writing or saying something about someone that damages that person’s reputation. what is a spoken deflamation called?
slander
ONLINE ETHICS
you have the right/s to your work, and anyone who uses it without your consent is punishable by law
copyright law
INTERNET THREATS AND SAFETY
category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.
internet threats
INTERNET THREATS AND SAFETY
is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
malware
INTERNET THREATS AND SAFETY
type of malware that often take the form of a piece of code inserted in an application, program, or system and they’re deployed by victims themselves
viruses
INTERNET THREATS AND SAFETY
type of malware that replicates itself.
Unlike viruses, however, it can copy itself without any human
interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage
worms
INTERNET THREATS AND SAFETY
a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices and is often spread via email attachments, website downloads, or direct messages.
trojans
INTERNET THREATS AND SAFETY
type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access
ransomware
INTERNET THREATS AND SAFETY
a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will. type of malware that gain access to devices through a piece of malicious coding.
bots
INTERNET THREATS AND SAFETY
displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity
adware
INTERNET THREATS AND SAFETY
type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes
spyware
INTERNET THREATS AND SAFETY
use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminatel
spamming
INTERNET THREATS AND SAFETY
identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. Attackers commonly use phishing emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.
phishing
INTERNET THREATS AND SAFETY
It is a complicated form of phishing. A user can fall victim to pharming even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker. When you type a URL into your browser’s address bar, like www.google.com for example, several background processes have to happen before you see that familiar Google logo and search box on your computer screen.”
pharming
INTERNET THREATS AND SAFETY
The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.
hacking
INTERNET THREATS AND SAFETY
The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.
cyberstalking
INTERNET THREATS AND SAFETY
Using digital platforms to bully someone by posting harmful or
offensive content, sending abusive messages, or excluding them from online communities.
Trolling specifically involves intentionally provoking others with inflammatory or offensive remarks
cyberbullying
INTERNET THREATS AND SAFETY
The use of the internet to target and exploit vulnerable individuals, often children, for sexual purposes. This may involve grooming, sexting, sharing child sexual abuse material (CSAM), or even arranging in-person meetings for sexual abuse.
online predation
INTERNET THREATS AND SAFETY
: Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population. This can include hate speech, graphic violence, pornography, or content that exploits children. Defining obscenity often involves legal and cultural considerations.
offensive content
INTERNET THREATS AND SAFETY
Fabricated or misleading information presented as news, often with the intention to deceive or manipulate audiences. It can be spread through social media, traditional media, or other online platforms.
fake news (misinformation)
INTERNET THREATS AND SAFETY
The act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them. This often involves tricking or coercing someone into sending these images, then threatening to share them unless they comply with demands, often for money or sexual favors.
sextortion (online crimes)
DIGITAL CITIZENSHIP AND NETIQUETTE
multifaceted concept encompassing the rights, responsibilities, and ethical practices surrounding the use of technology in our lives, particularly online. It’s about being an informed, engaged, and responsible member of the digital community, just as we strive to be in the physical world.
digital citizenship
DIGITAL CITIZENSHIP AND NETIQUETTE
The nine elements of digital citizenship are organized under the S3 framework (what is the S3 framework?)
safe, savvy, and social
DIGITAL CITIZENSHIP AND NETIQUETTE
Protecting yourself from online threats like malware, hacking, and online scams
SAFE
digital security
DIGITAL CITIZENSHIP AND NETIQUETTE
Understanding and protecting your personal information online, practicing good password hygiene, and respecting others’ privacy
digital privacy (access)
SAFE
DIGITAL CITIZENSHIP AND NETIQUETTE
Understanding and complying with online laws and regulations, copyright and intellectual property rights, and responsible use of technology.
SAFE
digital law
DIGITAL CITIZENSHIP AND NETIQUETTE
Developing critical thinking skills to navigate the online world effectively, evaluate information sources, and recognize credible information
SAVVY
digital literacy
DIGITAL CITIZENSHIP AND NETIQUETTE
Being honest and truthful online, avoiding plagiarism and spreading misinformation, and contributing original and accurate content.
SAVVY
digital integrity (communication)
DIGITAL CITIZENSHIP AND NETIQUETTE
Using technology ethically and constructively, being aware of the consequences of your online actions, and contributing to a positive online environment.
SAVVY
digital responsibilities
DIGITAL CITIZENSHIP AND NETIQUETTE
Responsible online buying and selling, understanding online transactions and regulations, and avoiding illegal activities
SOCIAL
digital commerce
DIGITAL CITIZENSHIP AND NETIQUETTE
Practicing good online manners, respecting others’ opinions and perspectives, and avoiding cyberbullying and online harassment.
SOCIAL
digital etiquette
DIGITAL CITIZENSHIP AND NETIQUETTE
Maintaining a healthy balance between online and offline activities, taking breaks from technology, and prioritizing real-world relationships
SOCIAL
digital downtime (health and wellness)
DIGITAL CITIZENSHIP AND NETIQUETTE
refers to the set of rules and guidelines for polite and respectful behavior online. It’s essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone.
netiquette
DIGITAL CITIZENSHIP AND NETIQUETTE
o Thanking someone for their help.
o Offering constructive criticism in a respectful manner.
o Congratulating someone on their achievements.
o Sharing helpful information or resources.
these are examples of:
good netiquette
DIGITAL CITIZENSHIP AND NETIQUETTE
o Using offensive language or insults.
o Making personal attacks or threats.
o Sharing someone else’s personal information without their permission.
o Posting inflammatory or hateful content.
o Plagiarism or taking credit for someone else’s work.
these are examples of:
bad netiquette