Online Safety, Security, and Netiquette Flashcards

1
Q

refers to the practices and precautions that should be observed when using the internet.

A

Online Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a combination of the words network and etiquette. It is a set of rules for behaving properly online.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rule 1: Remember the Human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and
bandwidth.
Rule 5: Make yourself look good online.
Rule 6: Share expert knowledge.
Rule 7: Help keep flame wars under control.
Rule 8: Respect other people’s privacy.
Rule 9: Don’t abuse your power.
Rule 10: Be forgiving of other people’s mistakes.

A

The Core Rules of Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

First & Most Important Rule of Netiquette

A

Remember the Human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to know if a website is reliable?

A

Usually end in .edu or .gov
Don’t have errors
Are up to date
Use facts
Use experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to know which websites are unreliable?

A

Might end in .com
Have errors
Are outdated
Use opinions
Use unreliable sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is deemed any malicious act that attempts to
gain access to a computer network without authorization or permission from the owners

A

Online threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-happens when a hacker directs an internet user to a fake website instead of a legitimate one.
-usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain.

A

Internet Scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-are also known as spiders, crawlers, and web bots.
-are automated, which means they
run according to their instructions without a human user
-other bots are “bad” and
are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities

A

Internet Robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is unwanted software designed to throw advertisements up on your screen. Example, pop-up ads and banner ads.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

are malwares that attach to another program and, when executed—unintentionally by the user—replicates itself by modifying other computer programs and infecting them with its own bits of code.

A

Virus and Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware.

A

Trojan, or Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.

A

Ransomware

17
Q

are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent.

18
Q

refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.

A

Cyberstalking

19
Q

refers to the act of tormenting, harassing, or embarrassing another person using the internet.

A

Cyberbullying

19
Q

happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware.