Online Safety, Security & Ethics Flashcards
(23 cards)
Stands for malicious software
Malware
A dangerous computer program that replicates itself through a network
Computer worm
Usually spread through email and running of attachments from suspicious sources
Computer worm
Some deleted files, some disrupt network functions
Computer worm
A malware that fronts to perform a good funtion, but performs undesirable function without the users consent
Trojan Horse
It can disable computers defenses
Trojan horse
Can erase data, corrupt files, allow access to computer
Trojan horse
A program that duplicates itself, then infects the computer. It spread like biological virus
Computer virus
Can be transferred by removable devices
Computer virus
A computer program that is installed on a computer to collect information or even take control without the knowledge of user
Spyware
Can monitor, can collect information from the user
Spyware
Designed to send advertisement; mostly pop ups
Adware
Unwanted email mostly from bots or advertiser. It can be used to send malware
Spam
2 types of spam
Email spam
(Aka junk emails)
Email spoofing
A practice of trying to get confidential information by making it appears from a trustworthy source
Phishing
A person who is able to enter or control other people’s computer
Hacker
Illegal activities/offenses that are commited through the use of internetq
Cybercrime
Repeated harassment, mistreatment, or making fun on someone through the use of gadgets
Cyberbullying
Is the use of gadgets to stalk or harass an individual
Cyberstalking
A true _______ intent is to harm their victim using anonymity and untraceable technology
Cyber stalkers
Occurs when one person takes personal information from another without consent
Identify theft
Reffered to sending/recieving rude messages or videos
Sexting
What are the types of cybercrime
•cyberbullying
•cyberstalking
•Identity theft
•sexting