module 2 Flashcards

1
Q

ONLINE SECURITY AND SAFETY

a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems. Its objective is to establish rules and measures to use against attacks over the Internet.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ONLINE SECURITY AND SAFETY

includes knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.

A

e-safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ONLINE SECURITY AND SAFETY

  • Misspelled URLs or strange domain names (e.g.,
    “amaz0n.com” instead of “amazon.com”)
    ▪ Poor grammar and spelling errors throughout the site
    ▪ Unprofessional design or layout
    ▪ Requests for excessive personal information
    ▪ Unbelievable deals or offers that seem too good to be
    true

what do these redflags indicate?

A

fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ONLINE ETHICS

law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

A

data privacy act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ONLINE ETHICS

in the case of online ethics, freedom of expression is not an absolute right and can be subjected to restrictions.

TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ONLINE ETHICS

Defamation involves writing or saying something about someone that damages that person’s reputation. what is a written deflamation called?

A

libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ONLINE ETHICS

Defamation involves writing or saying something about someone that damages that person’s reputation. what is a spoken deflamation called?

A

slander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ONLINE ETHICS

you have the right/s to your work, and anyone who uses it without your consent is punishable by law

A

copyright law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

INTERNET THREATS AND SAFETY

category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.

A

internet threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

INTERNET THREATS AND SAFETY

is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

INTERNET THREATS AND SAFETY

type of malware that often take the form of a piece of code inserted in an application, program, or system and they’re deployed by victims themselves

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

INTERNET THREATS AND SAFETY

type of malware that replicates itself.
Unlike viruses, however, it can copy itself without any human
interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

INTERNET THREATS AND SAFETY

a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices and is often spread via email attachments, website downloads, or direct messages.

A

trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

INTERNET THREATS AND SAFETY

type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

INTERNET THREATS AND SAFETY

a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will. type of malware that gain access to devices through a piece of malicious coding.

A

bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

INTERNET THREATS AND SAFETY

displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

INTERNET THREATS AND SAFETY

type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

INTERNET THREATS AND SAFETY

use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminatel

A

spamming

19
Q

INTERNET THREATS AND SAFETY

identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. Attackers commonly use phishing emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.

A

phishing

20
Q

INTERNET THREATS AND SAFETY

It is a complicated form of phishing. A user can fall victim to pharming even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker. When you type a URL into your browser’s address bar, like www.google.com for example, several background processes have to happen before you see that familiar Google logo and search box on your computer screen.”

A

pharming

21
Q

INTERNET THREATS AND SAFETY

The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.

A

hacking

22
Q

INTERNET THREATS AND SAFETY

The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.

A

cyberstalking

23
Q

INTERNET THREATS AND SAFETY

Using digital platforms to bully someone by posting harmful or
offensive content, sending abusive messages, or excluding them from online communities.
Trolling specifically involves intentionally provoking others with inflammatory or offensive remarks

A

cyberbullying

24
Q

INTERNET THREATS AND SAFETY

The use of the internet to target and exploit vulnerable individuals, often children, for sexual purposes. This may involve grooming, sexting, sharing child sexual abuse material (CSAM), or even arranging in-person meetings for sexual abuse.

A

online predation

25
Q

INTERNET THREATS AND SAFETY

: Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population. This can include hate speech, graphic violence, pornography, or content that exploits children. Defining obscenity often involves legal and cultural considerations.

A

offensive content

26
Q

INTERNET THREATS AND SAFETY

Fabricated or misleading information presented as news, often with the intention to deceive or manipulate audiences. It can be spread through social media, traditional media, or other online platforms.

A

fake news (misinformation)

27
Q

INTERNET THREATS AND SAFETY

The act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them. This often involves tricking or coercing someone into sending these images, then threatening to share them unless they comply with demands, often for money or sexual favors.

A

sextortion (online crimes)

28
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

multifaceted concept encompassing the rights, responsibilities, and ethical practices surrounding the use of technology in our lives, particularly online. It’s about being an informed, engaged, and responsible member of the digital community, just as we strive to be in the physical world.

A

digital citizenship

29
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

The nine elements of digital citizenship are organized under the S3 framework (what is the S3 framework?)

A

safe, savvy, and social

30
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Protecting yourself from online threats like malware, hacking, and online scams

SAFE

A

digital security

31
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Understanding and protecting your personal information online, practicing good password hygiene, and respecting others’ privacy

A

digital privacy (access)

SAFE

32
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Understanding and complying with online laws and regulations, copyright and intellectual property rights, and responsible use of technology.

SAFE

A

digital law

33
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Developing critical thinking skills to navigate the online world effectively, evaluate information sources, and recognize credible information

SAVVY

A

digital literacy

34
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Being honest and truthful online, avoiding plagiarism and spreading misinformation, and contributing original and accurate content.

SAVVY

A

digital integrity (communication)

35
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Using technology ethically and constructively, being aware of the consequences of your online actions, and contributing to a positive online environment.

SAVVY

A

digital responsibilities

36
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Responsible online buying and selling, understanding online transactions and regulations, and avoiding illegal activities

SOCIAL

A

digital commerce

37
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Practicing good online manners, respecting others’ opinions and perspectives, and avoiding cyberbullying and online harassment.

SOCIAL

A

digital etiquette

38
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

Maintaining a healthy balance between online and offline activities, taking breaks from technology, and prioritizing real-world relationships

SOCIAL

A

digital downtime (health and wellness)

39
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

refers to the set of rules and guidelines for polite and respectful behavior online. It’s essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone.

A

netiquette

40
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

o Thanking someone for their help.
o Offering constructive criticism in a respectful manner.
o Congratulating someone on their achievements.
o Sharing helpful information or resources.

these are examples of:

A

good netiquette

41
Q

DIGITAL CITIZENSHIP AND NETIQUETTE

o Using offensive language or insults.
o Making personal attacks or threats.
o Sharing someone else’s personal information without their permission.
o Posting inflammatory or hateful content.
o Plagiarism or taking credit for someone else’s work.

these are examples of:

A

bad netiquette

42
Q
A
43
Q
A
43
Q
A