WEEK 2 Flashcards

(17 cards)

1
Q

is defined as the information superhighway. This means that anyone has access to this highway, can place info, and can grab that info.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TYPES OF INFORMATION WITH RISK:

mother and father’s name
s__________ name
a_________
b__________
e_______ address

A

TYPES OF INFORMATION WITH RISK:

mother and father’s name
sibling’s name
address
birthday
email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SOME TIPS TO STAY SAFE ONLINE:

Be m_________ on what you share online.

Do not just accept t______ and c__________, read it.

Do not share your p________with anyone.

Do not talk to s________ whether online or face-to- face.

Never post anything about a future v________.

Add friends you know in r______ life.

Avoid visiting u__________ websites.

If you have WiFi at home, make it p________ by adding a password.

A

SOME TIPS TO STAY SAFE ONLINE:

Be mindful on what you share online.

Do not just accept terms and conditions, read it.

Do not share your password with anyone.

Do not talk to strangers whether online or face-to- face.

Never post anything about a future vacation.

Add friends you know in real life.

Avoid visiting untrusted websites.

If you have WiFi at home, make it private by adding a password.`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ANTIVIRUS EXAMPLE:

______ NOD32
K___________
AVAST
s________
F-SECURE
N_______

A

ANTIVIRUS EXAMPLE:

ESET NOD32
KASPERSKY
AVAST
SMADAV
F-SECURE
NORTON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SOME TIPS TO STAY SAFE ONLINE:

Buy the software, do not use p________ ones.

Do not reply or click links from s___________ emails.

A

SOME TIPS TO STAY SAFE ONLINE:

Buy the software, do not use pirated ones.

Do not reply or click links from suspicious emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stands for malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malicious program that transfers from one computer to another by any types of means.
Ex. ILOVEYOU Worm

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

,sometimes referred to as Love Bug or Love Letter,was a computer worm that attacked tens of millions of Windowspersonal computers on and afte, r 5 May 2000[1] local time in the Philippines when it started spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.

A

ILOVEYOU WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000, thereafter following daybreak westward across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States.

A

ILOVEYOU WORm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a program designed to send you advertisements, mostly as pop-ups.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an unwanted email mostly from bots or advertisers. It can be used to send malware.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an unwanted acquisition of sensitive personal information like passwords and credit card details.

17
Q

give 5 rules of netiquette

  1. remember the h_____
  2. make yourself look g______
  3. share e______ knowledge
    4 don’t abuse your p______
  4. respect other people’s p_________
A

give 5 rules of netiquette

  1. remember the human
  2. make yourself look good
  3. share expert knowledge
    4 don’t abuse your power
  4. respect other people’s privacy