L2

Cards (25)

  • Internet Scam misleads users in various ways to cheat them of personal property directly
  • Crimes associated with using the internet
    • Stalking
    • Identity theft
    • Privacy violations
    • Harassment
  • Phishing is an email sent from an internet criminal disguised as a legitimate source to gather sensitive information
  • Online Threats are acts performed by knowledgeable computer users, sometimes referred to as hackers, that illegally browse someone's information
  • Online Safety Measures
    • Never give personal information over the internet
    • Do not give banking or sensitive information unless sure of reputable business with secure service
    • Check for "https://" in website address for security
    • Never open messages or attachments from unknown sources
    • Regularly review privacy settings in online accounts
    • Delete browsing data on public computers
    • Keep software updated
    • Avoid downloading unknown software
  • Pharming is a malicious website resembling a legitimate one used to gather usernames and passwords
  • Types of Threats
    • Phishing
    • Pharming
    • Internet Scam
  • Online Safety includes practices and precautions to ensure users and their computers and personal information are safe from internet-related crimes
  • Trojan Horse
    • Disguises itself as a normal file or program to trick users into downloading and installing malware
  • Computer Ethics
    Concerned with how computing professionals should make decisions regarding professional and social conduct
  • Malware
    • A generic term for spyware and adware
    • A malicious software disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user’s permission
  • Types of threats
    • Internet Scam
    • Malware
  • Spyware
    • Functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. Example: Keylogger
  • User Identification
    • Something you know
  • Authentication
    Process where users verify their identity. Deals with the problem of determining whether a user should be allowed access to a particular system
  • Biometric Device
    • Something you are
  • Other types of threats
    • Computer Bug
    • Cyber Stalking
    • Cyber Bullying
    • Cyber Harassment
    • Spam
    • Spoofing
  • Internet Scam
    A type of scam that misleads the user in many ways attempting to take lead of them. The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more
  • Virus & Worm
    • Virus – a program designed to replicate by attaching itself into other computer programs, data files, or the boot sector of the hard drive. Worm – can be injected into a network by any types of means, like a USB stick or an email attachment
  • Four commonly authentication methods
    • User identification – something you know
    • Possessed objects – something you have
    • Biometric device – something you are
    • Callback system
  • Netiquette
    Comes from the word Network and Etiquette. Set of rules and norms for acceptable conduct or behavior online
  • Iloveyou Virus
    • Known as Love bug or love letter. A computer worm attached on email that infected 10 million of windows personal computers causing shutdown and deletion of files in the year 2000. Created by Filipino students: Onel De Guzman and Reonel Ramones
  • Adware
    • Automatically delivers advertisements. Example: Banner Ads & Pop-up Ads
  • Privacy
    Refers to the right of individuals to deny or restrict the collection and used of information about them
  • Possessed Objects
    • Something you have