Online Safety, Security, Ethics, and Etiquette (1st quart

Cards (22)

  • likelihood of anyone being exposed to a danger or adverse situation while using the internet.
    Internet risk
  • It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.
    Cyberbullying
  • It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
    Identity Theft
  • A criminal practice where electronic communication is used to stalk or harass individual or group
    Cyber stalking
  • The act of sending sexually explicit text messages, images, and videos.
    Sexting
  • is a threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime
    Internet threat
  • also known as malicious software. It is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system

    Malware
  • malicious program that replicate itself by copying itself to another program
    Virus
  • malicious program that disguised as legitimate program that user will accept and use but take control of your computer
    Trojan
  • malicious program that copy’s itself and spreads to other computers
    Worm
  • malicious program that gathers information from victim’s computer and send it back to the hacker
    Spyware
  • unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them
    Adware
  • program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.
    Keylogger
  • collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware
    Botnet
  • software tools used by hackers to gain control over a computer on a network without being expo
    Rootkit
  • ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
    Ransomware
  • Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. 

    Spam
  • A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
    Phishing
  • A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others
    Cybercrime
  • the law that deals with all forms of cybercrime.
    Cybercrime law
  • t is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media, you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
    Netiquette
  • What are the trends in ict?
    Convergence
    Social media
    Mobile technologies
    Assistive media
    Cloud computing