E-TECH Flashcards
this is the physical component
hardware
refers to use of communication and telecommunication technologies to create, collect, process, transmit, and store information
ict
what are the functions of ict
communication, date management, marketing, process improvement, enterprise resource planning
this is an integrated set of components that collects, processes, stores, and distributes information to support organizations operations and decision-making
ict system
this is the programs and applications
software
what are the ict components
hardware, software, networks, data, information, people
this is the interconnected devices for communication
networks
this is the raw, unprocessed facts and figures
data
this is the virtual in nature and and unbounded unlike our physical environment
cyber world
the processed and contexualized data
information
users and IT professionals
people
cyber world is also know as
cyber space
what are the features of cyberworld
virtual self, sources of information, social interaction
this is a digital representation/ identity or humans to interact in the virtual world
virtual self
the possibility of maliciouos attempt to damage or disrupt a computer network or system
cyebrthreat
data that is available to anyone as long as they have internet connection
sources of information
this is the process of engaging with other through digital platforms, such as social networking sites, where individuals communicate and express themselves through using visual and verbal cues to convey their personality and social status
social interaction
what are the 5 cyberthreats
social engineered trojans, unpatched software, phishing, network travelling worms, advance persistent threats
exploitation or harmful activity comitted with the intent of destroying , stealing, or disrupting data, critical systems, and digital life in general
cyberattacks
this is a program or file that can harm your computer by stealing data or destroying something in your computer
malware
types of malware
ransomware, spyware, adware, worms, trojans, botnets
this is a form of cyberattack to obtain sensitive information like username and password through malicious emails
phishing
occurs when a malicious actor (hacker) stops legitimate users from gettng into specific computer systems, devices, services or other digital resources
denial of service (DOS) atatcks
happens when a third party is trying to gain acess to your systems by cracking users pasword
password attacks