The Netiquette and the Computer Ethics - MST Flashcards
The violation, piracy or theft of a copyright holder’s exclusive
rights through the unauthorized use of a copyrighted material or work.
Copyright infringement
An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.
Republic Act No. 10173 Data Privacy Act of 2012
Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site.
Adware
It is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.
Plagiarism
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Cybersex
A law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10175 Cybercrime Prevention Act of 2012
A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work. In simpler terms, copyright is the right to copy
Copyright
An adjective or prefix which means relating to or characteristic
of information technology, virtual reality, and computers
Cyber
Individuals or teams of people who use technology to commit
malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.
Cybercriminals
A more complicated way of phishing where it exploits the Domain Name Service (DNS) system. It is when a hacker directs an internet user to a fake website instead of a legitimate one.
Pharming
Program that runs in the background without knowing it. That’s why it is called “spy”. It has the ability to monitor what are you are currently doing through keylogging.
Spyware
Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD’s)
Virus
A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information. It is an executable file that will install itself and run automatically once it’s downloaded.
Trojan
An unprivileged false statement of fact which tends to harm the reputation of a person or company
Cyber Libel
These were created in 1992 by the Washington, D.C. based Computer Ethics Institute.
Ten Commandments of Computer Ethics