lesson 5 Flashcards

(32 cards)

1
Q

network etiquette
- forms or requires good breeding or prescribed by authority to be required in social or official life.
- rules of behaving online

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

treat others with the same respect that you like to receive
- avoid confrontational or offensive language

A

make a good impression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

defined as crime in which a computer is the object of the crime (hacking, phishing, spamming, and child pornography) is used as a tool to commit an offense

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

use of computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes

A

cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common forms of cybercrimes

A

copyright infringement
plagiarism
computer addiction
virtual self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

violation, privacy theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material

A

copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

imitating the language and thoughts of another author without authorization

A

plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

generally used when speaking of excessive gaming behavior

A

offline addiction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

gets more attention in general from scientific research, excessive use of internet

A

online addiction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

persona you create online/virtually

A

Virtual self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Criminal Activities

A

Hacking
Identity Theft
Electronic Theft
Cyber bullying
Cyber Sex
Child Pornography
Cyber Defamation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

interference with computer systems, servers, or other information

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attempt to obtain sensitive information such as usernames, passwords, and credit card details for malicious reasons

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

illegal downloading
obtaining files that have not the right use from the internet

A

electronic theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

use of electronic communication to bully a person
- threats

A

cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

direct/indirectly of any lascivious exhibition of sexual organs or activity with the aid of a computer system

17
Q

child sexual exploitation
republic act no. 9775 - anti child pornography act of 2009

A

child pornography

18
Q

unprivileged false statement of fact to harm a reputation of a person or company

A

cyber defamation

19
Q

internet threats

A

malware
pharming
phishing
ransom ware

20
Q

infiltrate or damage your computer

21
Q

online fraud
- malicious and illegitimate website by redirecting the legitimate URL

22
Q

can produce the result they are looking for with very little effort

23
Q

restricts access to your computer/files and displays a message that demands payment to remove the restriction

24
Q

types of ransom ware

A

lockscreen ransom ware
encryption ransom ware

25
displays an image that prevents you from accessing
lock screen ransom ware
26
encrypts files on your system's hard drive and shared network drives that prevents you from opening them
encryption ransom ware
27
sending information out and collecting it from unsuspecting people
spam
28
third parties to infiltrate your computer - collects your information without your awareness - comes from "free download" and installed automatically without consent
spyware (spyware and adware)
29
malicious program disguised as legitimate software
trojan horse
30
malicious computer programs often sent as an email attachment or download with the intent of infecting your device
viruses
31
virtual listening in on information that is shared over an unsecure wifi network
wifi eavesdropping
32
goes to work on its own without attaching itself to files or programs - does not damage or alter hard drive and propagates by sending itself to other computers in a network
worms