Module 2 Flashcards
(41 cards)
9 Netiquette Guidelines
- No Yelling Please!
- Sarcasm can (and will) backfire
- Do not abuse the chatbox.
- Attempt to find your own answer.
- Stop… Grammar time!
- Set a respectful tone.
- Submit files the right way.
- Read first.
- Think before you type.
- Be kind and professional.
Refers to the do’s and don’ts of online communication.
Netiquette - Network Etiquette
What does Netiquette cover?
both common courtesy online and the informal “rules of the road” of cyberspace
Golden Rule of Netiquette
Do unto others as you would have them do unto you
Any threat that uses the World Wide Web to facilitate cybercrime
Internet Threat
Any threat that uses the World Wide Web to facilitate cybercrime
Malware - Malicious Software
Internet Threats
Malware, Spam, Phishing
Types of Malware
Virus, Worm, Trojan
malicious program designed to replicate itself and transfer from one
computer to another either through the Internet and local networks or data
storage like flash drives and CDs
Virus
malicious program that transfers from one computer to another by any
type of means - usually uses a computer network
Worm
malicious program that is disguised as a useful program but once
downloaded, leaves the PC unprotected and allows hackers to get user information
Trojan
Trojan software that looks like a security software
Rogue Security Software
program that runs in the background and has the ability to monitor what the user is currently doing and typing
through keylogging
Spyware
Used to record the keystroke done by the users
Keyloggers
Used to record the keystroke done by the users
Adware
type of malicious software from crypto virology that threatens victim’s data until ransom is paid
Ransomware
Unwanted email mostly from bots or advertisers.
Spam
Sends you an email that will direct the user to visit a website and be asked to
update his/her personal information
Phishing
Voice Phishing done through call
Visihing
Text Phishing
Smishing
A more complicated way of phishing where it exploits the DNS (Domain Name Service) system
Pharming
an act protecting individual personal
information in information and communications systems in the government and the private
sector
Republic Act 10173 – Data Privacy Act of 2012
refers to any individual person who can be identified, directly or indirectly, via an
identifier
Data Subject
Rights of the Data Subject
Article 15 - 21 (no 19)
access, rectification, erasure, restrict processing, data portability, object to processing