Module 17 Flashcards

1
Q

Here are our top 10 tips to stay safe on social media:

A

1.Use a strong password.
2. Use a different password for each of your social media accounts.
3. Set up your security answers.
4. If you have social media apps on your phone, be sure to password protect your device.
5. Be selective with friend requests. If you don’t know the person, don’t accept their request.
6. Click links with caution.
7. Be careful about what you share.
8. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what.
9. Protect your computer by installing antivirus software to safeguard.
10. Remember to log off when you’re done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 Rules You Should Always Follow to Stay Safe on Social Media

A
  1. Privatize your social life
  2. Share your private information intentionally
  3. Avoid posting your location
  4. Do a business account checkup
  5. Treat your online life like your offline life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrime, also called _____ crime,

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 Popular Cybercrimes to Effortlessly Protect Your Computer and Data Against its Impact

A
  1. Phishing scams. Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user. …
  2. Identity Theft scams. …
  3. Online Harassment. …
  4. Cyberstalking. …
  5. Invasion of privacy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Are Some Examples of Cybercrime?

A

• Hacking into personal accounts.
• Hacking into work databases.
• Breaking into competitor databases.
• Various forms of internet theft and fraud.
• Schemes/scams based on fake websites.
• Various credit-related thefts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tops the list of computer crimes as it enables cyber crime on a massive scale.

A

Malicious Software (Malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

can be of different types like Trojans, viruses, worms and any other ow to protect yourself against cybercrime

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious Software (Malware) tops the list of computer crimes as it enables cyber crime on a massive scale. Malware can be of different types like Trojans, viruses, worms and any other ow to protect yourself against cybercrime

A
  1. Use a full-service internet security suite. …
  2. Use strong passwords. …
  3. Keep your software updated. …
  4. Manage your social media settings. …
  5. Strengthen your home network. …
  6. Talk to your children about the internet. …
  7. Keep up to date on major security breaches.
    software that attaches to a computer without individuals being aware of its presence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attempts by cybercriminals to trick users into revealing sensitive information like passwords or credit card details through deceptive emails, messages, or websites.

A

Phishing scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fraudulent activities where someone’s personal information is stolen and used for financial gain or other malicious purposes.

A

Identify theft scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unwanted or abusive behavior directed at someone over the internet, often through social media, messaging platforms, or online forums.

A

Online harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Persistent online monitoring or harassment of an individual, often involving threats, intimidation, or unwanted attention.

A

Cyber stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unauthorized intrusion into someone’s personal life or affairs, often through surveillance, data collection, or dissemination of private information without consent.

A

Invasion of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly