module 2 Flashcards

(44 cards)

1
Q

ONLINE SECURITY AND SAFETY

a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems. Its objective is to establish rules and measures to use against attacks over the Internet.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ONLINE SECURITY AND SAFETY

includes knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.

A

e-safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ONLINE SECURITY AND SAFETY

  • Misspelled URLs or strange domain names (e.g.,
    “amaz0n.com” instead of “amazon.com”)
    ▪ Poor grammar and spelling errors throughout the site
    ▪ Unprofessional design or layout
    ▪ Requests for excessive personal information
    ▪ Unbelievable deals or offers that seem too good to be
    true

what do these redflags indicate?

A

fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ONLINE ETHICS

law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

A

data privacy act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ONLINE ETHICS

in the case of online ethics, freedom of expression is not an absolute right and can be subjected to restrictions.

TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ONLINE ETHICS

Defamation involves writing or saying something about someone that damages that person’s reputation. what is a written deflamation called?

A

libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ONLINE ETHICS

Defamation involves writing or saying something about someone that damages that person’s reputation. what is a spoken deflamation called?

A

slander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ONLINE ETHICS

you have the right/s to your work, and anyone who uses it without your consent is punishable by law

A

copyright law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

INTERNET THREATS AND SAFETY

category of cybersecurity risks that may cause an undesirable event or action via the internet. Regardless of intent or cause, the consequences of a web threat may damage both individuals and organizations.

A

internet threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

INTERNET THREATS AND SAFETY

is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

INTERNET THREATS AND SAFETY

type of malware that often take the form of a piece of code inserted in an application, program, or system and they’re deployed by victims themselves

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

INTERNET THREATS AND SAFETY

type of malware that replicates itself.
Unlike viruses, however, it can copy itself without any human
interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

INTERNET THREATS AND SAFETY

a type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices and is often spread via email attachments, website downloads, or direct messages.

A

trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

INTERNET THREATS AND SAFETY

type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

INTERNET THREATS AND SAFETY

a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will. type of malware that gain access to devices through a piece of malicious coding.

A

bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

INTERNET THREATS AND SAFETY

displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

INTERNET THREATS AND SAFETY

type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

INTERNET THREATS AND SAFETY

use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminatel

19
Q

INTERNET THREATS AND SAFETY

identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. Attackers commonly use phishing emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.

20
Q

INTERNET THREATS AND SAFETY

It is a complicated form of phishing. A user can fall victim to pharming even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker. When you type a URL into your browser’s address bar, like www.google.com for example, several background processes have to happen before you see that familiar Google logo and search box on your computer screen.”

21
Q

INTERNET THREATS AND SAFETY

The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.

22
Q

INTERNET THREATS AND SAFETY

The unauthorized access to a computer system or network to gain control, steal data, or disrupt operations. It often involves techniques like password cracking, exploiting software vulnerabilities, or social engineering.

A

cyberstalking

23
Q

INTERNET THREATS AND SAFETY

Using digital platforms to bully someone by posting harmful or
offensive content, sending abusive messages, or excluding them from online communities.
Trolling specifically involves intentionally provoking others with inflammatory or offensive remarks

A

cyberbullying

24
Q

INTERNET THREATS AND SAFETY

The use of the internet to target and exploit vulnerable individuals, often children, for sexual purposes. This may involve grooming, sexting, sharing child sexual abuse material (CSAM), or even arranging in-person meetings for sexual abuse.

A

online predation

25
# INTERNET THREATS AND SAFETY : Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population. This can include hate speech, graphic violence, pornography, or content that exploits children. Defining obscenity often involves legal and cultural considerations.
offensive content
26
# INTERNET THREATS AND SAFETY Fabricated or misleading information presented as news, often with the intention to deceive or manipulate audiences. It can be spread through social media, traditional media, or other online platforms.
fake news (misinformation)
27
# INTERNET THREATS AND SAFETY The act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them. This often involves tricking or coercing someone into sending these images, then threatening to share them unless they comply with demands, often for money or sexual favors.
sextortion (online crimes)
28
# DIGITAL CITIZENSHIP AND NETIQUETTE multifaceted concept encompassing the rights, responsibilities, and ethical practices surrounding the use of technology in our lives, particularly online. It's about being an informed, engaged, and responsible member of the digital community, just as we strive to be in the physical world.
digital citizenship
29
# DIGITAL CITIZENSHIP AND NETIQUETTE The nine elements of digital citizenship are organized under the S3 framework (what is the S3 framework?)
safe, savvy, and social
30
# DIGITAL CITIZENSHIP AND NETIQUETTE Protecting yourself from online threats like malware, hacking, and online scams | SAFE
digital security
31
# DIGITAL CITIZENSHIP AND NETIQUETTE Understanding and protecting your personal information online, practicing good password hygiene, and respecting others' privacy
digital privacy (access) | SAFE
32
# DIGITAL CITIZENSHIP AND NETIQUETTE Understanding and complying with online laws and regulations, copyright and intellectual property rights, and responsible use of technology. | SAFE
digital law
33
# DIGITAL CITIZENSHIP AND NETIQUETTE Developing critical thinking skills to navigate the online world effectively, evaluate information sources, and recognize credible information | SAVVY
digital literacy
34
# DIGITAL CITIZENSHIP AND NETIQUETTE Being honest and truthful online, avoiding plagiarism and spreading misinformation, and contributing original and accurate content. | SAVVY
digital integrity (communication)
35
# DIGITAL CITIZENSHIP AND NETIQUETTE Using technology ethically and constructively, being aware of the consequences of your online actions, and contributing to a positive online environment. | SAVVY
digital responsibilities
36
# DIGITAL CITIZENSHIP AND NETIQUETTE Responsible online buying and selling, understanding online transactions and regulations, and avoiding illegal activities | SOCIAL
digital commerce
37
# DIGITAL CITIZENSHIP AND NETIQUETTE Practicing good online manners, respecting others' opinions and perspectives, and avoiding cyberbullying and online harassment. | SOCIAL
digital etiquette
38
# DIGITAL CITIZENSHIP AND NETIQUETTE Maintaining a healthy balance between online and offline activities, taking breaks from technology, and prioritizing real-world relationships | SOCIAL
digital downtime (health and wellness)
39
# DIGITAL CITIZENSHIP AND NETIQUETTE refers to the set of rules and guidelines for polite and respectful behavior online. It's essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone.
netiquette
40
# DIGITAL CITIZENSHIP AND NETIQUETTE o Thanking someone for their help. o Offering constructive criticism in a respectful manner. o Congratulating someone on their achievements. o Sharing helpful information or resources. these are examples of:
good netiquette
41
# DIGITAL CITIZENSHIP AND NETIQUETTE o Using offensive language or insults. o Making personal attacks or threats. o Sharing someone else's personal information without their permission. o Posting inflammatory or hateful content. o Plagiarism or taking credit for someone else's work. these are examples of:
bad netiquette
42
43
43