ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE Flashcards
Defined as the information superhighway.
This means that anyone has access to this
highway, can place information and can
grab that information
Internet
Internet Risks
- Cyberbullying
- Sexting
- Identity Theft
- Cyberstalking
- Is bullying that takes place
over digital devices like cell phones,
computers, and tablets. - It can occur through SMS, Text, and
apps, or online in social media, forums, or
gaming where people can view,
participate in, or share content. - It includes sending, posting, or sharing
negative, harmful, false, or mean content
about someone else. - It can include sharing personal or private
information about someone else causing
embarrassment or humiliation. Some
__________ crosses the line into unlawful
or criminal behavior.
Cyberbullying
- Occurs when someone steals your
personal information and credentials to commit fraud. - There are various forms of __________, but the most common is financial
- _____________ protection is a growing industry that keeps track of people’s credit reports, financial activity, and Social Security Number use
Identity Theft
- Is sending or getting sexually
explicit or suggestive images, messages, or video on a smartphone, computer, tablet, or other device.
Sexting
Internet Threats
- Malware
- Spam
- Phishing
- Cyber Crime
Types of Malware
- Virus
- Trojan Horse
- Worm
- Spyware
- Adware
- Keylogger
- Botnet
- Rootkit
- Ransonware
Is a
software that is
designed to attack,
control and damage
a device’s security
and infrastructure
systems.
Malware
A malicious
program that
replicates itself by
copying itself to
another program
A. Virus
A malicious program
disguised as legitimate
program that user will
accept and use but
take control of your
computer
- Trojan Horse
A malicious program
that copy’s itself
and spreads to
other computers.
- Worm
A malicious program
that gathers
information from
victim’s computer
and send it back to
the hacker
- Spyware
An unwanted
advertisement that will
pop-up several times on
victim’s computer then
behave abnormally and
tedious to close them
- Adware
A program
that runs in the
background and steals
user credentials and
confidential information
and send back to hack by
recording every keystroke
that a user makes on their
computer or device
- Keylogger
A cyberattack that uses
multiple networked
devices to run one or
more bots on each device
and then uses this swarm
of infected devices to
attack a server, company
website, or other devices
or individuals.
- Botnet
A software
tools used by hackers to
gain control over a
computer on a network
without being exposed.
- Rootkit
A virus that block the user
from accessing the
programs or files and
demands to pay the
ransom through online
method for the removal
of the virus
- Ransonware
Also known as
junk email or
unwanted email
send by
advertiser or bot.
It can be used to
send malware.
Spam
A cyber attack
method using
deceptive emails
and websites to
acquiring sensitive
personal information.
Phishing
A crime in which
computer is used as
object and tool in
committing a crime
such as hacking,
phishing, child
pornography, libel,
hate crimes, identity
thief and others.
Cyber Crime
(Cyber Crime Law): penalizes offenses against the privacy, confidentiality, integrity, and availability of computer data and systems, such as illegal access, unauthorized interference, system interference, data interference, misuse of devices, and cybersquatting.
Cybercrime Prevention Act of 2012
Is defined as the acquisition of domain names on the internet in bad faith or with the intent to gain profit, mislead, destroy
one’s reputation or deprive others of registering or creating an account to the domain name involved.
Cybersquatting
- Describes the rules of conduct for respectful and appropriate communication on
the internet. - Often referred to as etiquette for the
internet. These are not legally
binding rules, but recommended rules of
etiquette.
Netiquette
- The golden rule
- When you communicate electronically, all you see is computer screen
- You don’t have the opportunity to use facial expressions, gestures, and tone of voice to communicate your meaning
- To add personality humor to your messages, use smileys, also known as emoticons
Rule 1: Remember the human