online ethics and etiquette // internet threats Flashcards
this is a set of ideal rules and conduct that a netizen should observe in communicating and/or publishing information and materials over the WWW and in ICT in general.
netiquette
Deals with placing a value on acts according to whether they are good or bad.
ethics
this refers to the person who is a member or part of the online community
netizen
Refers to the transmission of unsolicited messages from various origins using electronic messaging systems such as e-mail and chat messengers.
spam
this is the most common kind of spam
email spam a.k.a. (UBE) Unsolicited Bulk E-mail
Software or program used by an attacker to obtain personal information. Attackers commonly target user passwords to hack and take control of a user account.
phishing
longer term for malware
malicious software
a program sent by attackers to inflict chaos on a computer’s operation and processes. Most of the time, it is disguised as an enticing web site. They are used to spy upon the activity of the computer and steal information.
malware
a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
virus
a malicious program that transfers from one computer to another by any types of means.
worm
was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.
iloveyou
the iloveyou worm is also referred to as _____ or _____
love bug or love letter
The iloveyou malware originated in the _________ neighborhood of _______ in the ________ on _________
Pandacan
Manila
Philippines
May 5 2000
a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
trojan
a program designed to send you advertisements, mostly as pop-ups.
adware
is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
ransomware
This law includes the protection of individuals
from bullying through electronic means.
anti-bullying act of 2013
defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.”
bullying
This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity.
cybercrime prevention act of 2012