Online safety, security, ethics and etiquette Flashcards
Tips on how to safe online
- Do not share your password with anyone.
- Add friends you know in real life.
3.Do not visit untrusted websites.
4.Add passwords to your WIFI at home to make it private.
5.Install and update antivirus in your computer.
6.Do not give your personal information to anyone. - Think before you click.
8.Never post about your future vacation.
happens when someone intentionally abused,harassed and mistreated by other person using elect communication
Cyberbullying
a crime of stealing personal info for the purpose of assuming that persons name of identity to make any form of transaction
Identity Theft
crime practice where elec com is used to stalk or harass individual or group
Cyberstalking
act of sending sexually explicit text messages,images and videos
Sexting
also known as junk email or unwanted email send by adversiter or bot.
Spam
a cyberattack method using deceptive emails and websites to acquiring personal information
Phishing
a crime in which computer is used as object and tool in commiting a crime such as hackingg,phishing, spamming and etc
cybercrime
a law that deals with all forms of cybercrime
cybercrime law
9 Types of malware
1.virus
2.trojan horse
3.worm
4.spyware
5.adware
6.botnet
7.keylogger
8.ransomware
9.rootkit
malicious program that replicate itself by copying itself to another program
virus
a malicious program that disguised as legitimate program, that user will accept and use but take control of your computer
Trojan horse
malicious program that copys itself and spreads to other computer
worm
malicious program gather info about victionms computer then send it back to hacker
spyware
unwanted advertisement that will pop up several times
adware
program runs in the background, steals user credentials and confidential ino then send it back to hacker and every keystroke is recorded
keylogger
collection of infected internet-connected devuces such as PC controlled by a common type of malware
botnet
software tools used by hackers to gain control over a computer on a network without being exposed
rootkit
ransom virus thta block the user from accessing the programs or files and demands to pay the ransiom through online method for removal
ransomware
word that came from two words net amd etiquette, proper manner and behavuior when online + netizen
Netiquette
10.Core rules of netiquette by Seth T. Ross
1.Remember the human
2.Adhere tp the same standards of behavior online that you follow in real life.
3.Know where you are in cyberspace.
4.Respect other peoples time and bandwidth.
5.Make yourself look good online
6.Share expect knowledge
7.Help keep flame wars under control
8. Respect other peoples privacy
9. Dont abuse your power
10.Be forgiving of other peoples mistakes
also known as malicious software
Malware