Online Safety, Security, Ethics, and Etiquette Flashcards
a network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts
INTERNET BOTS
generic term for spyware and adware
MALWARE
it is the malicious software disguised as real software often secretly installed, intended to transfer and gather private information like passwords without the users permission
MALWARE
advertising, automatically delivers advertisement
ADWARE
that function by spying on user activity without their knowledge
SPYWARE
is a program design to replicate by attaching itself into other computer problems, data files or the boot sector of the hard drive
VIRUS
is can be injected into a network by any type of means like usb
WORM
a type of malware that disguises itself as a normal file or program to think users into downloading and installing malwares
TROJAN HORSE
also known as love bug or love letter
ILOVEYOU VIRUS
a computer worm attached or email that have infected
ILOVEYOU VIRUS
a malfunction on a computer system through its runtime
COMPUTER BUG
the use of the internet or other electronic device to harass or stalk individual, group or organization
CYBER STALKING
the act or tormenting, threatening, harassing or
embarassing another person using the internet or other technologies
CYBER BULLYING
describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information
SPOOFING
happens when malware or spyware places a web users browser homepage that redirects the use to unwanted
BROWSING HIJACKING
happens when criminal impersonates a user by stealing his or her personal information to withdraw money or pay goods online
INDENTITY THEFT
enables a user to obtain information about another computer activities by transmitting data correctly to ones hard drive
SPYWARE
is a destructive program that pretends as a desirable application that tricks user to allow access to computer through downloads or e-mail attachments
TROJAN HORSE
concerned with how computing professionals should make decisions regarding professionals and social conduct
COMPUTER ETHICS
10 CORE RULES OF NETIQUETTE
- Remember the Human
- Adhere to the same stand of behavior online that you would follow in real life
- Know where you are in cyber space
- Respect other people time and bandwith
- Make yourself look good
- Share expert knowledge
- Help keep flames ware under control
- Respect other people’s privacy
- Don’t abuse your power
- Be forgiving of others people’s mistake
SAFEBOOK structure
- THINK before you post
- FRIENDS; only connect with friends
- KIND; be kind to others
- PASSWORD; don’t share your password
- PRIVACY; keep your settings private
- HURT; don’t be hurtful towards others
useful tool that allows you to produce multiple letters using information stored on a list, database, or spreadsheet
MAIL MERGING
two main parts in a MAIL MERGE
DOCUMENT and DATA
was originally designed for Macintosh Computers
POWERPOINT