The Netiquette and the Computer Ethics - MST Flashcards
The violation, piracy or theft of a copyright holder’s exclusive
rights through the unauthorized use of a copyrighted material or work.
Copyright infringement
An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.
Republic Act No. 10173 Data Privacy Act of 2012
Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site.
Adware
It is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.
Plagiarism
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Cybersex
A law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10175 Cybercrime Prevention Act of 2012
A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work. In simpler terms, copyright is the right to copy
Copyright
An adjective or prefix which means relating to or characteristic
of information technology, virtual reality, and computers
Cyber
Individuals or teams of people who use technology to commit
malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.
Cybercriminals
A more complicated way of phishing where it exploits the Domain Name Service (DNS) system. It is when a hacker directs an internet user to a fake website instead of a legitimate one.
Pharming
Program that runs in the background without knowing it. That’s why it is called “spy”. It has the ability to monitor what are you are currently doing through keylogging.
Spyware
Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD’s)
Virus
A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information. It is an executable file that will install itself and run automatically once it’s downloaded.
Trojan
An unprivileged false statement of fact which tends to harm the reputation of a person or company
Cyber Libel
These were created in 1992 by the Washington, D.C. based Computer Ethics Institute.
Ten Commandments of Computer Ethics
An act is to provide safer communities by creating administrative and court processes that can be used to address and prevent cyberbullying.
Republic Act No. 10627. The Anti-Bullying Act of 2013
Unauthorized access of or interference with computer systems, servers, or information and communication system or any access in order to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent of the owner of the computer or information communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.
Hacking
A form of cybercrime that involves illegal downloading and obtaining files that you do not have the right to use from the internet (Digital Piracy, Practice of illegally copying and selling digital music, video, computer software, etc.)
Electronic theft
The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
Spamming
Malicious program designed that transfer from one computer to another by any type of means. Often, it uses a computer network to spread it.
Worm
A crime in which a computer or the internet is the object of the
crime (hacking, phishing, spamming and child pornography) and used as a tool to commit an offense.
Cybercrime
A form of child sexual exploitation committed through a computer system
Child Pornography
The etiquette of cyberspace and set of rules for behaving properly online.
Netiquette
It is a threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime.
Internet threat
An act defining the crime of child pornography, prescribing penalties therefor and for other purposes.
Republic Act No. 9775. The Anti- Child Pornography Act of 2009
A type of internet threat; it is one of the more common ways to
infiltrate or damage your computer.
Malware
Its goal is to acquire sensitive personal information like password and credit card details; done by sending you email that will direct the user to visit a website and be asked to update his/her username, password, credit card details or personal information
Phishing
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Computer-related forgery, fraud and/or identity theft
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
Cyberbullying