ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

Cards (46)

  • INFORMATION YOU MUST LIMIT TO SHARE ONLINE

    PERSONAL
    CONTACT
    EDUCATION
    FINANCIAL
    LOCATION INFORMATION
    TOPIC
  • THE INTERNET
    is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones.
  • LINK
    Use link to search for a page that is link to another page
  • PLUS
    Use + to search pages that contain both words
  • RANGE
    Use ... (range) to search with in a range of numbers
  • QUOTATION
    Use " " (quotation) to search for exact word or phrases.
  • HYPHEN
    Using - (hyphen) to exclude word or phrases In the search bar just type
  • ASTERISK
    Using * (asterisk) to fill the missing word or phrases In the search bar just type
  • SITE
    Using site to search with in specific website In the search bar just type
  • search engine
    are programs that look for documents based from specified keywords and retum these documents where the keyword were found
  • Relevance
    Content is relevant to your topic or research
  • Fairness
    Content is balanced, presenting all sides of an issue and multiple points of view
  • Currency
    Information is current & updated frequently
  • Author
    Defines who created the content, the individual or group's credential/expertise and provides contact information
  • Accuracy
    Content is grammatically correct, verifiable and cited when necessary
  • CONTEXTUALIZED ONLINE SEARCH & RESEARCH SKILLS
    Utilize the Internet as a tool for reliable information gathering and research to best meet particular class objectives or solve a situation. Students will use search engines more effectively. They can have a deeper understanding of search strategies, in particular, that will produce results that are helpful for their academic work and career of choice.
  • FAIR USE
    means that an intellectual property may be used without consent as long as it is used in Fair Uses of Copyrighted Material
  • PLAGIARISM
    is using someone else's work or ideas without giving proper credit.

    Not a legal term
    Plagiarism is using someone else's work or ideas without giving proper credit. Not a legal term Academic crime Claiming ownership of someone else's creative work Not punishable by government, but may be by academic
  • COPYRIGHT INFRIGEMENT
    Copyright infringement includes the unauthorized or unlicensed copying of a work subject to copyright

    Legal term

    Civil crime

    Unauthorized used of someone else's creative work
    Monetary damage for infringement
  • Trademark
    offers legal protection for logo, design, symbol phrase, wordmarks, or a combination of those that represents a source of goods or services. The term of trademark registration can vary but is usually ten years. It can be renewed andefinitely on payment of additional fees
  • Copyright
    protects the original work of authorship. Such works are literature, drawings, paintings, songs, music, computer software fiams, photos, web com The time limit should be equal to or langer th Ito or linger than 50 years after the creator's veus death Longer periods of protection may however be provided at the national level
  • Trade Secret
    is any valuable information that is not publicly known (a well guarded secretjeg... ingredients used in their food products, business methods customer data. Trade secret protection is not limited in time (patents last in general for up to 20 years). It may continue indefinitely as long as the secret is not revealed to the putilic
  • Patent
    Utility patentt protects a process, manufacture, composition of matter, and a useful machine. Design patent it protects the shape, appearance, pattern design. layout and looks of a product. The protection is granted for a limited period. generally 20 years from the filing date of the application
  • INTELLECTUAL PROPERTY RIGHTS
    (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks, and trade secrets
  • SPAM
    an abbreviation for malware spam' or 'malicious

    spam, which refers to spam messages that include malware.

    When readers open an email attachment or click on a link, they

    often download malware such as keyloggers, ransomware,

    Trojan horses, bots, info-stealers, cryptominers, spyware, and
    Trojans
  • PHISHING
    Is the deceiving attempt to obtain sensitive information such as usernames, passwords, credit card details often
    for malicious reasons.
  • ADWARE
    commonly referred to as advertisement-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser. Although it is frequently made for desktops, adware can also be discovered on mobile devices. Some types of adware are extremely manipulative and provide a backdoor for dangerous software.
  • KEYLOGGER
    The act of secretly recording the keys pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture. The person running the logging program can then get the data.
  • SPYWARE
    Malicious software, often known as malware, such as spyware, is placed on a computer without the end user's knowledge. It intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware that is hard to detect.
  • Onel de Guzman
    now 44, says he unleashed the Love Bug computer worm to steal passwords so he could access the intemet without paying Victims received an email attachment entitied LOVE LETTER-FOR- YOU It contained malicious code that would overwrite fles, steal passwords, and automatically send copies of itself to all contacts in the victim's Microsoft Outlook address book Within 24 hours, it was causing major problems across the globe, reportedly infecting 45 million machines.
  • WORM
    A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it.
    It will use this machine as a host to scan and infect other computers.
  • ROGUE SECURITY SOFTWARE
    is a type of malicious software and online fraud that tricks consumers into thinking their computer has a virus and tries to persuade them to pay for a phony malware removal program that in fact installs malware on their computer.
  • TROJAN
    A Trojan Horse Virus is a form of malware that installs into a computer pretending to be a reliable application. In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications
  • malware
    is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed.

    Terms for malicious software
    Any malicious code Harms devices and steal data
  • virus
    is a specific type of malware that self-replicates by inserting its code into other programs.

    One type of malware
    Must be triggered by a user Self-replicating
  • INTERNET THREATS
    Web-based threats, or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet. Web threats are made possible by end- user vulnerabilities, web service developers/operators, or web services themselves.
  • RULE NO. 10: BE FORGIVING OF OTHER PEOPLE'S MISTAKE

    Do not point out mistakes to people online. Remember that you were once the new kid on the block.

    You still need to have a good manners even though you are online and cannot see the person face to face
  • RULE NO. 9: DONT ABUSE YOUR POWER

    Do not take advantage of other people just because you have more knowledge or power than them.
    Treat others as you would want them to treat you if the roles were reversed.
  • RULE NO. 8: RESPECT OTHER PEOPLE'S PRIVACY

    Do not read other people's mail without their permission.

    Going through other people's things could cost you, your job or you could even go to jail. Not respecting other people's privacy is a bad netiquette
  • RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL

    Netiquette does not forgive flaming.

    Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down