ict

Cards (83)

  • Online Safety and Security:
    • Refers to the maximization of internet users' knowledge and awareness of safety protocols, online crimes, and security risks in private property and information connected to the use of the internet
    • Online security involves rules and actions taken to ensure online users and data privacy aren't compromised by cybercriminals
  • Online Crimes:
    • Violations that inflict harm to other people by internet users
    • Forms of online crimes include cyberbullying, identity theft, phishing, plagiarism
  • Cyberbullying:
    • Defined as any severe or repeated use of written, verbal, or electronic expression, or physical act directed at another causing fear of harm
    • Different forms of cyberbullying include flaming, harassment, impersonation, outing, trickery, denigration, exclusion, cyberstalking
  • Identity Theft:
    • US Department of Justice defines identity theft and fraud as crimes involving wrongfully obtaining and using another person's personal data through fraud or deception
    • Identity theft commonly happens when criminals engage in shoulder surfing in public places
  • Identity theft occurs when you receive pre-approved credit cards but discard them improperly
  • Identity theft also happens when you respond to spam mails or unsolicited emails that require you to input personal data
  • Tips to be protected from online fraud:
    • Use a good password that passes the SURP test: Strong, Unique, Recent, and Practical
    • Report identity theft violations to the right authorities responsible for dealing with crimes
  • Phishing is defined as the fraudulent practice of sending emails purporting to be reputable companies to induce individuals to reveal personal information like passwords and credit card numbers
  • Plagiarism is presenting someone else's work or ideas as your own without full acknowledgment, while copyright infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner
  • Common internet security threats:
    • Malwares
    • Computer Worms
    • Spam
    • Phishing
  • Malware is the shortened form of malicious software, including computer viruses, worms, and dishonest spyware
  • Computer worms are programs that can replicate themselves from one computer to another in great volume and spread rapidly without human intervention
  • Spam consists of unwanted messages, sometimes containing links that put you at risk
  • Phishing scams are created by cybercriminals who intend to ask for private or illicit information from the victims
  • Online safety is the knowledge and awareness of safety protocols while using the internet, while online security involves rules and procedures to prevent hackers from harming online users and data privacy
  • Internet security strategies:
    • Browser Selection
    • Email security
    • Multifactor Authentication (MFA)
    • Firewalls
  • The internet is the largest network of networks, connecting millions of computers worldwide.
  • FLAMING IS VULGAR MESSAGES
  • Outing- act of sharing someone’s
    secrets or embarrassing information or
    images online.
  • Harassment- is the act repeatedly
    sending nasty, mean, and insulting
    messages.
  • Flaming- is an online fight using
    electronic messages with angry or
    vulgar languages.
  • Impersonation- someone pretending
    to be someone else.
  • Trickery- when someone talking to a
    person to let him reveal his secrets and
    share sensitive information online.
  • Denigration- sending or posting
    gossips or rumors about a person’s
    reputation or friendship.
  • Exclusion- when one is intentionally
    or cruelly excluded from online group.
  • Cyberstalking- act of repeated,
    intense harassment and denigration
    that includes threats or creates
    significant fear
  • When cyberbully is observed,
    it is best to do the following:
    1. Inform a trusted person
    B. Try to instigate.
    C. Block connection with the
    bully.
    D. Always be aware.
    E. Logout from online
    accounts.
    F. Be not a cyberbully.
  • MALWARE:
    This is the shortened form of malicious
    software. Some examples are computer
    viruses, worms, and dishonest spyware.
  • COMPUTER WORMS:
    These are the programs that can replicate
    themselves from one computer from
    another in great volume and can spread
    themselves rapidly without human
    intervention.
  • SPAM:
    Unwanted messages are harmless. They are
    junk mails sent in your email, but there are
    times they contain links that put you at risk.
  • PHISHING
    These scams are created by cyber criminals
    who intend to ask for private or elicit
    information from the victims.
  • ETHICS deals with what is good and bad.
    It is a set of moral principles that can be
    taken as a guiding philosophy in life.
  • ONLINE ETIQUETTE considered internet
    ethics as guiding principles in using the
    internet, specific and acceptable conduct
    must be observed by the users. This is the
    conduct and polite behaviors and
    respectful manners of internet users.
  • ONLINE SAFETY is knowledge and awareness of safety
    protocols while using the internet.
  • ONLINE SECURITY is the rules to be adhered to and
    procedures to take to prevent hackers from harming
    online users' and data privacy.
  • common internet
    threats?
    1. Malwares
    2. Computer Worms
    3. Spam
    4. Phishing
  • internet security
    strategies?
    1. Browser Selection
    2. Email security
    3. Multifactor Authentication
    (MFA)
    4. Firewalls
  • The World Wide Web (www) was introduced by Tim Berners-Lee in 1989
  • The World Wide Web consists of interconnected documents and resources located from different terminals and web pages with unique Uniform Resource Locator (URL)
  • WWW Consortium is an organization dedicated to promoting www standards and standardizing protocols applied to websites linked to the World Wide Web