Online Safety, Security & Ethics

Cards (17)

  • Email Spam
    unsolicited commercial email sent from one source with identical message sent to multiple recipients usually carries virus; junk email
  • Spammer
    person who creates electronic spam
  • Email Spoofing
    used to deceive people by stealing identity from other/someone you know. it is also used to hide the origin of the spam
  • Phishing
    trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if comes from a trustworthy source.
  • Pharming
    redirects internet users to fake websites to steal personal or financial information
  • Spyware
    computer program that is installed secretly on a personal computer to collect information or even take control over the computer without the knowledge of the user.
  • Computer Worm
    self-replicating malware that duplicates itself to spread to uninfected computers. may delete files, disrupt network function, or send junk mail from infected computer (e.g. i love you virus)
  • Trojan Horse
    pretending to perform a good task, but secretly performs undesirable function with the intention of entering the computer without the user’s consent.
  • Hackers
    person who is able to enter and control other people’s computer without authorization.
  • Windows Security
    necessary to protect important work & personal information stored in the computer
  • Computer Administrator
    kind of account that controls all the contents and users of the computer, installs programs, add, and deletes users.
  • Limited Account
    kind of account that has limited control and only have access to his/her particular account.
  • Guest
    accounts created for transient user and do not have access to the other computer accounts and their content.
  • Firewall
    helps in protecting your computer from unauthorized entries, viruses, or worms from the internet or network
  • Automatic Updates
    feature on Windows which when turned on will automatically download updates from Microsoft Windows Website.
  • Virus Protection
    locate, find, and remove virus threats that are already in the computer
  • Ten Commandments for Computer Ethics
    • Thou shalt not use a computer to harm other people
    • Thou shalt not interfere w/ other people's computer work
    • Thou shalt not snoop around other people's files
    • Thou shalt not use computer to steal
    • Thou shalt not use computer to bear false witness
    • Thou shalt not use/copy software for which u have not paid
    • Thou shalt not use other people's computer resources w/o authorization
    • Thou shalt not appropriate other people's intellectual output
    • Thou shalt think about social consequences of the program you write
    • Thou shalt use computer in ways that show consideration & respect