ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE Flashcards
Defined as the information superhighway.
This means that anyone has access to this
highway, can place information and can
grab that information
Internet
Internet Risks
- Cyberbullying
- Sexting
- Identity Theft
- Cyberstalking
- Is bullying that takes place
over digital devices like cell phones,
computers, and tablets. - It can occur through SMS, Text, and
apps, or online in social media, forums, or
gaming where people can view,
participate in, or share content. - It includes sending, posting, or sharing
negative, harmful, false, or mean content
about someone else. - It can include sharing personal or private
information about someone else causing
embarrassment or humiliation. Some
__________ crosses the line into unlawful
or criminal behavior.
Cyberbullying
- Occurs when someone steals your
personal information and credentials to commit fraud. - There are various forms of __________, but the most common is financial
- _____________ protection is a growing industry that keeps track of people’s credit reports, financial activity, and Social Security Number use
Identity Theft
- Is sending or getting sexually
explicit or suggestive images, messages, or video on a smartphone, computer, tablet, or other device.
Sexting
Internet Threats
- Malware
- Spam
- Phishing
- Cyber Crime
Types of Malware
- Virus
- Trojan Horse
- Worm
- Spyware
- Adware
- Keylogger
- Botnet
- Rootkit
- Ransonware
Is a
software that is
designed to attack,
control and damage
a device’s security
and infrastructure
systems.
Malware
A malicious
program that
replicates itself by
copying itself to
another program
A. Virus
A malicious program
disguised as legitimate
program that user will
accept and use but
take control of your
computer
- Trojan Horse
A malicious program
that copy’s itself
and spreads to
other computers.
- Worm
A malicious program
that gathers
information from
victim’s computer
and send it back to
the hacker
- Spyware
An unwanted
advertisement that will
pop-up several times on
victim’s computer then
behave abnormally and
tedious to close them
- Adware
A program
that runs in the
background and steals
user credentials and
confidential information
and send back to hack by
recording every keystroke
that a user makes on their
computer or device
- Keylogger
A cyberattack that uses
multiple networked
devices to run one or
more bots on each device
and then uses this swarm
of infected devices to
attack a server, company
website, or other devices
or individuals.
- Botnet