ETECH|LESSON 2 & 3 Flashcards
(96 cards)
refers to the online security or safety of people and their information when using the internet
Internet Safety
Types of Information Usually Shared Online: (5)
- Name(First, Middle, Last, Parents)
- Address
- Cellphone No.
- Birthdate
- Siblings
Be mindful of what you share online
Tips to Stay Safe Online:
Read terms & conditions
Tips to Stay Safe Online:
Know security features of the site
Tips to Stay Safe Online:
Don’t share password
Tips to Stay Safe Online:
Avoid public networks(Incognito will not protect you)
Tips to Stay Safe Online:
Never post future vacations
Tips to Stay Safe Online:
Don’t talk to strangers
Tips to Stay Safe Online:
Add friends you know irl
Tips to Stay Safe Online:
Avoid untrusted websites
Tips to Stay Safe Online:
Antivirus
Tips to Stay Safe Online:
Make Wi-Fi private by adding a password
Tips to Stay Safe Online:
Don’t reply or click links from suspicious emails
Tips to Stay Safe Online:
Make online purchases from secure sites
Tips to Stay Safe Online:
Dangers in Using Internet: (6)
- Cyber Bullying
- Cyber Stalking
- Identity Theft
- Sexting
- Inappropriate Content
- Online Grooming
Internet Threats:(12)
- Spam
- Phishing
- Social Media Exploits
- Pharming
- Malware
- Virus
- Worm
- Trojan Horse
- Adware
- Spyware
- Keyloggers
- Ransomware
sending email(illegitimate) to scam for private information for identity theft
Phishing
– malicious fb msgs, consisted of SVG(Scalable Vector Graphic), secretly messaging all fb friends
Social Media Exploits
“Phishing without a lure,” more complicated phishing, exploits DNS(Domain Name Service), malicious code is installed on a computer/server, directing users to
fraudulent webs
Pharming
“Malicious software,” software designed to damage/disrupt a system, Virus/Trojan
Malware
– program or piece of code loaded onto a computer without knowledge, runs on its
own, can replicate themselves, man-made, virus that makes copy of own is easy to make
Virus
similar/sub-class to a virus, spread from computer to computer, can travel
without human action, takes advantage of file/info transport features on system
Worm
– appears to be useful, but will damage computer once installed or run
Trojan Horse