Lesson 2 Flashcards
(22 cards)
A crime committed or assisted through the use of the Internet.
Cybercrime
It tells the user how the website will handle its data.
Privacy Policy/ Terms of Services (ToS)
stands for malicious software
Malware
A malicious program designed to transfer from one computer to another by any means possible.
Virus
A malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
Worms
A malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
A program that runs in the background without you knowing it. It can monitor what you are currently doing and typing through keylogging.
Spyware
A program designed to send you advertisements, mostly pop-ups.
Adware
Unwanted emails mostly from bots or advertisers.
Spam.
Acquires sensitive personal information like passwords and credit card details.
Phishing
A more complicated way of phishing where it exploits the DNS system.
Pharming.
A part of the law wherein you have the right to work, anyone who uses it without your consent is punishable by law.
Copyright
Means that intellectual property may be used without consent as long as it is used in commentaries, criticism, parodies, research, etc.
Fair use
Used to record the keystrokes done by the user. This is done to steal passwords or any other sensitive information.
Keyloggers
is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with intemet use, and the self-protection from computer harm in general.
Online Safety
is a tree branch of computer security specifically related to the internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems as a whole.
Online Security
refers to patterns of behavior used when on the internet, guided both by law and personal philosophy. The great capabilities of this communication medium allow for the potential of great harm, cruelty, and even crime
Online Ethics
Even though we’re going to list this as a way to avoid plagiarism, it’s also possible to cause it while using this technique. It’s all about doing it right. And just one tiny component added to paraphrasing can help you keep from plagiarizing material. Keep reading to find out how to paraphrase right.
Paraphrasing
It might not seem wrong to reuse works that you’ve written in the past but it is, The problem is that this work has already been evaluated. So, unless you acknowledge that you’re using your previous findings, it will be classified as plagiarism.
Self-plagiarism
It might not seem wrong to reuse works that you’ve written in the past but it is, The problem is that this work has already been evaluated. So, unless you acknowledge that you’re using your previous findings, it will be classified as plagiarism.
Self-plagiarism
this one is more of an unintentional case of plagiarism. The main characteristic of it is that the work only contains source materials.
Piling up sources
the most obvious one. And the name explains it all. It’s using another person’s work completely unaltered and without referencing the source.
Direct copy