GEE

Cards (57)

  • Wiki
    A website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
  • Censorship
    The attempt to suppress or regulate public access to material considered offensive or harmful
  • Types of Censorship
    • Direct Censorship - Government monopolization, to monitor government secrets
    • Self-Censorship - Most common form of censorship, group decides for itself not to publish
  • Identity Theft
    When a person uses another person's electronic identity
  • Significant number of people were victims of identity theft due to their online activities
  • Phishing
    Use of email or Web pages to attempt to deceive people into revealing personal information
  • Mill's Principle of Harm
    The only ground on which intervention is justified is to prevent harm to others; the individual's own good is not a sufficient condition
  • Chat room
    Supports real-time discussions among many people connected to network
  • The quality of Web-based information varies widely
  • Cyberbullying
    The use of the Internet or the phone system to inflict psychological harm on another person. Frequently, a group of persons gangs up to cyberbully the victim
  • Factors contributing to Internet Addiction
    • Social factors - Peer groups
    • Situational factors - Stress, Lack of social support and intimacy, Limited opportunities for productive activity
    • Individual factors - Tendency to pursue activities to excess, Lack of achievement, Fear of failure, Feeling of alienation
  • Intellectual property
    Works of the mind—such as art, books, films, formulas, inventions, music, and processes—that are distinct and owned or created by a single person or group
  • Intellectual Property Laws
    • Trade Secrets - rights on confidential information which may be sold or licensed
    • Copyright - Protects authored works
    • Patent - Exclusive right granted for a product, process or an improvement of a product or process which is new, inventive and useful
    • Trademark - Protects a business' brand identity
  • Copyright infringement
    The use or production of copyright-protected material without the permission of the copyright holder
  • The use of copyrights to protect computer software raises many complicated issues of interpretation
  • Fair Use
    The right given to a copyright owner to reproduce a work without permission of the copyright holder
  • Digital rights management (DRM)
    Actions owners of intellectual property may take to protect their rights
  • Peer-to-peer networks
    A transient network allowing computers running the same networking program to connect with each other and access files stored on each other's hard drives
  • Cyberlockers
    Internet-based file-sharing services that allow users to upload password-protected files
  • Plagiarism
    Act of stealing someone's ideas or words as one's own
  • Reverse Engineering
    Process of taking something apart in order to understand it, build a copy of it, or improve it
  • Open-source code

    Any program whose source code is made available for use or modification, as users or other developers see fit
  • Cybersquatting
    Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
  • Data Privacy
    The right of an individual not to have private information about himself disclosed, and to live freely from surveillance and intrusion
  • REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA) is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes
  • Who must comply with the Data Privacy Act
    • Companies with 250 employees or 1000 data subjects
  • Data subject
    An individual whose personal information is processed. It is the customer whom we serviced
  • Types of Identity
    • Offline Identity - Identification cards we use on a day-to-day basis to authenticate identity in the physical world
    • Online identity - A social identity that an internet user establishes in online communities and websites
  • Personal Identifiable Information
    Any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained
  • Who Controls the data
    • Personal Information Controller (PIC) - A person or organization who controls the collection, holding, processing or use of personal information
    • Personal Information Processor (PIP) - Any natural or juridical person or any other body to whom a PIC may outsource or instruct the processing of personal data pertaining to a data subject
  • Consent
    Giving data subjects genuine choice and control over how a Personal Information Controller (PIC) uses their data
  • Hacker (original meaning)
    An explorer, a risk taker, someone who was trying to make a system do something it had never done before
  • Hacker (current meaning)

    A person who gains unauthorized access to computers and computer networks
  • Low-tech techniques for obtaining login names and passwords
    • Eavesdropping - Looking over the shoulder of a legitimate computer user
    • Dumpster diving - Looking through garbage for interesting bits of information
    • Social engineering - Manipulation of a person inside the organization to gain access to confidential information
  • REPUBLIC ACT NO.8792 provides for the recognition and use of electronic commercial and non-commercial transactions, penalties for unlawful use thereof, and other purposes
  • Hacking or cracking
    Unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner
  • Types of Malware
    • Computer viruses
    • Worms
    • Trojan horses
    • Spyware
  • Virus
    A piece of self-replicating code embedded within another program called the host
  • Worm
    A self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network
  • The Sasser worm, launched in April 2004, exploited a previously identified security weakness with PCs running the Windows operating system