Part 2

Cards (55)

  • Internet Safety
    • also known as online safety, cyber safety, and E-Safety
    • Minimize a user's ignorance of the security hazards to their personal safety and property associated with using the internet as well as to protect themselves from computer crime
  • Netiquette
    Standards of behavior for polite and appropriate online conversation
  • Information you must limit to share online
    • Personal Information
    • Contact Information
    • Educational Background
    • Financial Account
    • Location
  • Top 10 Commandments of Netiquette
    • Heroes Safeguarding Cyberspace Timely
    • Our Expert Firefighters Preserve Peace and Forgiveness
  • Rule No. 1: 'Remember the human. You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say this to the person’s face'
  • Rule No. 2: 'Adhere to the same standards online that you follow in real life. You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them'
  • Rule No. 3: 'Know where you are in cyberspace. Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it'
  • Rule No. 4: 'Respect other people’s time and bandwidth. Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to a minimum by saying what you want to say. Remember everyone won’t answer your questions'
  • Rule No. 5: 'Make yourself look good online. Be polite and pleasant to everyone. Always check your spelling and grammar before posting. Know what you are talking about and make sense saying it'
  • Rule No. 6: 'Share expert knowledge. Ask questions online. Share what you know online. Post the answers to your questions online because someone may have the same question you do'
  • Rule No. 7: 'Help keep flame wars under control. Netiquette does not forgive flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down'
  • Rule No. 8: 'Respect other people’s privacy. Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or you could even go to jail. Not respecting other people’s privacy is a bad netiquette'
  • Rule No. 9: 'Don’t abuse your power. Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed'
  • Rule No. 10: 'Be forgiving of other people's mistakes. Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have good manners even though you are online and cannot see the person face to face'
  • Malware
  • Virus
  • Trojan
  • Rogue Security Software
  • Worm
  • Spyware
  • Keylogger
  • Malware is placed on a computer without the end user's knowledge
  • Malware intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users
  • This type of malware that is hard to detect
  • Keylogger
    Secretly recording the keys pressed on a keyboard, also known as keystroke logging or keylogging
  • Adware
    Advertisement-supported software displaying banner ads on the screen, typically inside a web browser
  • Adware is extremely manipulative and provides a backdoor for dangerous software
  • Malspam refers to spam messages that include malware
  • Readers can download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans by opening email attachments or clicking on links in malspam
  • How does computer malware spread
    1. Phishing
    2. Spear-Phishing
    3. Networks
    4. Security holes
    5. File sharing
    6. Social networks
    7. Instant messengers (IMs)
    8. External devices
  • Intellectual property (IP) is a category of property that includes intangible creations of the human intellect
  • Types of intellectual property
    • Copyrights
    • Patents
    • Trademarks
    • Trade secrets
  • Intellectual property rights
    Rights granted to individuals over their creative works, often granting exclusive rights to utilize creations for a set length of time
  • Copyright
    Rights that authors and artists have over their literary and artistic creations
  • Examples of literary works under copyright
    • Novels
    • Poems
    • Plays
    • Reference Works
    • Newspaper Articles
    • Computer Programs
    • Databases
    • Films
    • Musical Compositions
    • Choreography
    • Artistic Works
    • Advertisements
    • Maps
    • Technical Drawings
  • The time limit for copyright should be equal to or longer than 50 years after the creator's death
  • Trade secret
    Confidential information commercially valuable because it is secret, known only to a limited group of persons, and subject to reasonable steps to keep it secret
  • Trade secret protection is not limited in time and may continue indefinitely as long as the secret is not revealed to the public
  • Trademark
    A sign capable of distinguishing the goods or services of one enterprise from those of others
  • The term of trademark registration is usually ten years and can be renewed indefinitely on payment of additional fees