ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE Flashcards

1
Q

Defined as the information superhighway.
This means that anyone has access to this
highway, can place information and can
grab that information

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet Risks

A
  1. Cyberbullying
  2. Sexting
  3. Identity Theft
  4. Cyberstalking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Is bullying that takes place
    over digital devices like cell phones,
    computers, and tablets.
  • It can occur through SMS, Text, and
    apps, or online in social media, forums, or
    gaming where people can view,
    participate in, or share content.
  • It includes sending, posting, or sharing
    negative, harmful, false, or mean content
    about someone else.
  • It can include sharing personal or private
    information about someone else causing
    embarrassment or humiliation. Some
    __________ crosses the line into unlawful
    or criminal behavior.
A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Occurs when someone steals your
    personal information and credentials to commit fraud.
  • There are various forms of __________, but the most common is financial
  • _____________ protection is a growing industry that keeps track of people’s credit reports, financial activity, and Social Security Number use
A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Is sending or getting sexually
    explicit or suggestive images, messages, or video on a smartphone, computer, tablet, or other device.
A

Sexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Threats

A
  1. Malware
  2. Spam
  3. Phishing
  4. Cyber Crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Malware

A
  1. Virus
  2. Trojan Horse
  3. Worm
  4. Spyware
  5. Adware
  6. Keylogger
  7. Botnet
  8. Rootkit
  9. Ransonware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a
software that is
designed to attack,
control and damage
a device’s security
and infrastructure
systems.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A malicious
program that
replicates itself by
copying itself to
another program

A

A. Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A malicious program
disguised as legitimate
program that user will
accept and use but
take control of your
computer

A
  1. Trojan Horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious program
that copy’s itself
and spreads to
other computers.

A
  1. Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A malicious program
that gathers
information from
victim’s computer
and send it back to
the hacker

A
  1. Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An unwanted
advertisement that will
pop-up several times on
victim’s computer then
behave abnormally and
tedious to close them

A
  1. Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A program
that runs in the
background and steals
user credentials and
confidential information
and send back to hack by
recording every keystroke
that a user makes on their
computer or device

A
  1. Keylogger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cyberattack that uses
multiple networked
devices to run one or
more bots on each device
and then uses this swarm
of infected devices to
attack a server, company
website, or other devices
or individuals.

A
  1. Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A software
tools used by hackers to
gain control over a
computer on a network
without being exposed.

A
  1. Rootkit
17
Q

A virus that block the user
from accessing the
programs or files and
demands to pay the
ransom through online
method for the removal
of the virus

A
  1. Ransonware
18
Q

Also known as
junk email or
unwanted email
send by
advertiser or bot.
It can be used to
send malware.

A

Spam

19
Q

A cyber attack
method using
deceptive emails
and websites to
acquiring sensitive
personal information.

A

Phishing

20
Q

A crime in which
computer is used as
object and tool in
committing a crime
such as hacking,
phishing, child
pornography, libel,
hate crimes, identity
thief and others.

A

Cyber Crime

21
Q

(Cyber Crime Law): penalizes offenses against the privacy, confidentiality, integrity, and availability of computer data and systems, such as illegal access, unauthorized interference, system interference, data interference, misuse of devices, and cybersquatting.

A

Cybercrime Prevention Act of 2012

22
Q

Is defined as the acquisition of domain names on the internet in bad faith or with the intent to gain profit, mislead, destroy
one’s reputation or deprive others of registering or creating an account to the domain name involved.

A

Cybersquatting

23
Q
  • Describes the rules of conduct for respectful and appropriate communication on
    the internet.
  • Often referred to as etiquette for the
    internet. These are not legally
    binding rules, but recommended rules of
    etiquette.
A

Netiquette

24
Q
  • The golden rule
  • When you communicate electronically, all you see is computer screen
  • You don’t have the opportunity to use facial expressions, gestures, and tone of voice to communicate your meaning
  • To add personality humor to your messages, use smileys, also known as emoticons
A

Rule 1: Remember the human

25
Q
  • Be ethical. if you encounter an ethical dilemma in cyberspace, consult the code you follow in real life.
  • Netiquette mandates that you do your best to act within the laws of society and cyberspace
A

Rule 2: Adhere to the same standards of behavior online that you follow in real life

26
Q

When you enter a domain of cyberspace that’s new to you

  1. Take a look around
  2. Spend a while listening to the chat/ reading
  3. Get the sense of how the people who are already there act
  4. Then go ahead and participate
A

Rule 3: Know where you are in cyberspace

27
Q

When you send email or post to a discussion group, you’re taking up other people’s time

A

Rule 4. Respect other people’s time and bandwidth

28
Q
  • You will be judged by the quality of your writing
  • Spelling & grammar do cound
A

Rule 5: Make yourself look good online

29
Q

Sharing your knowledge is fun. It’s long time net tradition, and makes the world a better place.

A

Rule 6: Share expert knowledge

30
Q

Netiquette does forbid the perpetuation of flame wars

A

Rule 7: Help keep flame wars under control

31
Q
  • It includes password, full names, addresses, interests, files or equipment
A

Rule 8: Respect other people’s privacy

32
Q
  • Some people in cyberspace have more power than others
A

Rule 9: Don’t abuse your power

33
Q
  • If you decide to inform someone ofa mistake, point it out politely, and preferable by private email.
A

Rule 10: Be forgiving of other people’s mistake