Online Safety, Security, Ethics, and Etiquette Flashcards
(19 cards)
a network of zombie computers that have been taken over by a robot
Internet bots
generic term for spy ware and adware
malware
advertising, automatically delivers advertisements
Adware
that function by spying on user activity without their knowledge
spyware
program design to replicate by attaching itself into other computer problem
virus
it can be injected inti a network bye any type like USB
worm
A TYPE OF MALWARE THAT DISGUISES ITSELF AS
TROJAN HORSE
ALSO KNOWN AS LOVE BUG OR LOVE LETTER.
ILOVEYOU VIRUS
A MALFUNCTION ON A COMPUTER SYSTEM THROUGH ITS RUNTIME.
COMPUTER BUG
THE USE OF THE INTERNET OR OTHER ELECTRONIC DEVICE TO HARASS OR STALK INDIVIDUAL, GROUP OR ORGANIZATION.
CYBER STALKING
THE ACT ORTORMRORT ORMENTING,THREATENING, HARRASSING
CYBER BULLYING
DESCRIBES A CRIMINAL WHO IMPERSONATES ANOTHER INDIVIDUAL OR
SPOOFING
HAPPENS WHEN MALWARE OR SPYWARE REPLACES A WEB USERS BROWSER HOMEPAGE THAT REDIRECTS THE USE TO UNWANTED.
BROWSING HIJACKING
HAPPENS WHEN CRIMINAL IMPERSONATES A USER BY STEALING HIS OR HER PERSONAL INFORMATION TO WITHDRAW MONEY
IDENTITY THEFT
ENABLES A USER TO OBTAIN INFORMATION ABOUT ANOTHER COMPUTER ACTIVITIES BY TRANSMITTING DATA CORRECTLY TO ONES HARD DRIVE.
SPYWARE
IS A DESTRUCTIVE PROGRAM THAT PRETENDS AS A DESIRABLE APPLICATION THAT TRICKS USER TO ALLOW ACCESS TO COMPUTERS THROUGH DOWNLOADS OR E-MAIL ATTACHMENTS.
TROJAN HORSE
CONCERNED WITH HOW COMPUTING PROFESSIONALS SHOULD MAKE DECISIONS REGARDING PROFESSIONALS AND SOCIAL CONDUCT.
COMPUTER ETHICS
10 CORE RULES OF NETIQUETTE
- REMEMBER THE HUMAN
- ADHERE TO THE SAME STAND OF BEHAVIOR ONLINE THAT YOU WOULD FOLLOW IN REAL LIFE.
- KNOW WHERE YOU ARE IN CYBER SPACE.
- RESPECT OTHER PEOPLE TIME AND BANDWITH.
- MAKE YOUSELF LOOK GOOD.
- SHARE EXPERT KNOWLEDGE.
- HELP KEEP FLAMES WARE UNDER CONTROL.
- RESPECT OTHER PEOPLE’S PRIVACY.
- DON’T ABUSE YOUR POWER.
- BE FORGIVING OF OTHERS PEOPLE’S MISTAKE.
Safebook
think
friends
kind
password
privacy
hurt