lesson 5 Flashcards
(32 cards)
network etiquette
- forms or requires good breeding or prescribed by authority to be required in social or official life.
- rules of behaving online
netiquette
treat others with the same respect that you like to receive
- avoid confrontational or offensive language
make a good impression
defined as crime in which a computer is the object of the crime (hacking, phishing, spamming, and child pornography) is used as a tool to commit an offense
cybercrime
use of computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes
cybercriminals
Common forms of cybercrimes
copyright infringement
plagiarism
computer addiction
virtual self
violation, privacy theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material
copyright infringement
imitating the language and thoughts of another author without authorization
plagiarism
generally used when speaking of excessive gaming behavior
offline addiction
gets more attention in general from scientific research, excessive use of internet
online addiction
persona you create online/virtually
Virtual self
Criminal Activities
Hacking
Identity Theft
Electronic Theft
Cyber bullying
Cyber Sex
Child Pornography
Cyber Defamation
interference with computer systems, servers, or other information
hacking
attempt to obtain sensitive information such as usernames, passwords, and credit card details for malicious reasons
identity theft
illegal downloading
obtaining files that have not the right use from the internet
electronic theft
use of electronic communication to bully a person
- threats
cyber bullying
direct/indirectly of any lascivious exhibition of sexual organs or activity with the aid of a computer system
cyber sex
child sexual exploitation
republic act no. 9775 - anti child pornography act of 2009
child pornography
unprivileged false statement of fact to harm a reputation of a person or company
cyber defamation
internet threats
malware
pharming
phishing
ransom ware
infiltrate or damage your computer
malware
online fraud
- malicious and illegitimate website by redirecting the legitimate URL
pharming
can produce the result they are looking for with very little effort
phishing
restricts access to your computer/files and displays a message that demands payment to remove the restriction
ransom ware
types of ransom ware
lockscreen ransom ware
encryption ransom ware