etech module 2 n 3

Cards (40)

  • Make sure to double check the email address of the sender especially for finance related messages because phishing scammers can mimic an email from a reputable company that will redirect you to their website stealing your account information without your knowledge.
  • Make sure that the software installed on your gadgets are up-to-date. This will strengthen the security of your device from external attacks such as hacking.
  • Never give out your password. Your password should be kept somewhere safe because it allows you to access your accounts. Never tell anyone or give your password to strangers online.
  • Never agree to meet anyone you just met on online chat rooms. Many predators are looking for their victims on online chat rooms and forums. They will try to get your attention by presenting themselves as good individuals and may ask you to meet them in person. Never agree to meet strangers.
  • Tell your guardian if something is making you uncomfortable online. Whether it is cyberbullying or sexual advancement of predators, always tell an adult if you think something is not right while you are online. They can help you to be safe by confronting the cyberbully or predator.
  • Cover your webcam. Spywares are used to gain access on someone computer without their knowledge and your webcam can also be controlled from a remote server so it is better to cover your camera when not in use. This will prevent the invader from getting your image and using it to harm you.
  • Follow the guidelines for creating a strong password. It is also advisable to turn on the two-factor authentication for your accounts to better safeguard your information even if someone gets a hold of your password accidentally or intentionally.
  • Make sure that all your accounts are logged out before you leave. Unauthorized access to your account can lead to serious problems such as identity theft.
  • Fileless malware is different from the other traditional malware attacks because it does not leave any trace on your computer making it hard to detect. It does not need to install any software on your system in order to work, instead it uses the current vulnerabilities of your computer system.
  • The DNSMessenger is one of the examples of this kind of malware presented by CISCO in 2017.
  • Types of malware
    • Virus
    • Worms
    • Trojan
    • Spyware
    • Adware
    • Ransomware
    • Fileless malware
  • Virus
    Software that inserts its code into files and programs infecting other softwares inside the computer system. When these files and programs are executed, the virus will also run replicating itself on the system disrupting its operation. This can cause major data loss and system malfunction.
  • Worms
    Software that can rapidly spread from one computer to another by replicating itself through the computer network even without human interaction. This kind of malware infects the computer through a downloaded file. Once it has entered the system, it will exponentially multiply causing the same outcome as a virus.
  • Trojan
    Also known as trojan horse, is disguised as a legitimate and helpful software but once it has been installed, it will gain access to private and sensitive information stored in your computer. This kind of virus can affect the performance of the system causing the computer to slow down. This is also often used by hackers to gain access to your information.
  • Spyware
    Secretly invades your computer and targets sensitive information. This kind of malware is used by hackers and identity thieves to steal personal information by having access to the target's computer. While using a spyware, the criminal can gain remote access to the system and control it from a different location.
  • Adware
    Used to gather data from your computer while providing you with advertisements. Although this kind of malware is not always dangerous, it can redirect you to untrusted websites that might contain viruses or worms. One type of adware called keylogger tracks and saves the keystrokes as you type, revealing your password.
  • Ransomware
    Often part of a phishing scam. When you click an untrusted link, it will download a file and encrypts the sensitive information, denying access to your device. The criminals behind the malware will then ask for money before they unlock your files or system.
  • Fileless Malware
    Different from the other traditional malware attacks because it does not leave any trace on your computer making it hard to detect. It does not need to install any software on your system in order to work, instead it uses the current vulnerabilities of your computer system.
  • Criminals are not just found on the streets robbing bags or cell phones; they are also lurking online. The most common criminals found on the internet are hackers, identity thieves, internet predators, and cyberbullies.
  • Hackers
    Specifically black hat hackers, are one of the main security risks online. These criminals will try to access private information, accounts, websites, or servers in order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.
  • Identity Thieves
    Steal important and personal information from their target in order to fake an identity. They use this information to assume an identity to access another person's bank account or to hide from authorities, making them untraceable. The most common way of doing this is through phishing where the criminal sends you a personalized message accompanied by a shortened link asking you to provide personal information or bank account details.
  • Internet Predators
    Individuals who lure children or teenagers into engaging to sexual acts or relationship online. Usually, they pose as a good person and shower their victims with affection and gifts until they gain their trust. Then the predator will start asking for lewd photos, or worse, will ask for a meet-up to commit fraud or crime.
  • Cyberbullies
    An online form of bullying with the aid of the internet and other technology-based communication. Cyberbullying is commonly seen on social networking sites through hate speech, racism, and curse words directed at their target individual. Such activities include humiliating comments, using threats, and even showing degrading photos of a person. This kind of bullying can cause psychological trauma that can lead to more serious problems.
  • Privacy is important online because when you share your personal information, anybody can use that information to harm you. Privacy-related danger occurs due to carelessness of the user or caused by unauthorized access of a person's private information. The criminal's goal is to cause psychological and mental harm to an individual by destroying the reputation of their target. Some examples are circulating a person's private photos on social media, accessing someone's private conversation, and unauthorized tracking of an individual's location or activities.
  • The cyber world provides us with an environment where social interactions such as chatting, sharing ideas on an online community, teaming up with players on an online game, or finding people with similar interests. The cyber world is public and open to anyone who wants to use it. There is no limit to the actions that we can do online.
  • The cyber world contains a lot of information whether it may be factual or not. These data are readily available to anyone as long as they can connect to the internet which is not a hard task nowadays due to the abundance of WiFi internet and cellular data connections. Anyone can contribute to this pool of data by simply sharing photos, blogs, videos, articles, and other kinds of media. Since information on the web is public, anyone can search and use the data you have shared online.
  • Being active in the cyber world has really become the norm because of the flexibility and availability of the internet and its features. We are in the Fourth Industrial Revolution where technology is advancing really fast but with these advancements comes greater responsibility for us using these technologies. In the cyber world, security threats are everywhere so we need to be cautious.
  • The cyber world provides us with a "second life space" where we can make a digital representation of ourselves. It is powerful enough to allow each individual to create several digital personalities depending on the need. We can create various accounts for social networking sites such as Facebook, Twitter, or Instagram for casual activities and Linkedin for professional work.
  • The internet has empowered people by providing them with a way to work without the need to leave the comforts of their home. Many occupations such as teaching, secretarial work, and other office-based jobs can now be done remotely as long as there is an internet connection.
  • Information and communications technology (ICT)

    All electronic and communication technologies that enable the management and distribution of information
  • There is currently no universally accepted definition of ICT, considering that the various components, concepts, and tools related to ICT are evolving rapidly
  • United Nations Development Program (UNDP) definition of ICT

    Basic information-handling tools, a varied set of goods, applications, and services that are used to produce, store, process, distribute, and exchange information. Includes "old" ICTs like radio, television, and telephone, and "new" ICTs like computers, satellite and wireless technology, and the internet
  • Components of ICT
    • People
    • Data
    • Procedures
    • Hardware
    • Software
    • Information
  • People
    Individuals responsible for the development, improvement, and maintenance of an ICT system. Responsible for input and supply of data, and making decisions from output information. Includes computer programmers, engineers, technicians, designers, developers, encoders, and analysts
  • Data
    Raw facts or figures that can be processed, stored, and transmitted by an ICT system. Examples include numbers, characters, audio, video, and transaction records
  • Procedures
    Actions performed in a certain order and condition to ensure an ICT system runs smoothly, including exchange of data/information between people or systems
  • Hardware
    Physical or tangible parts of an ICT system, including input devices, storage, processors, output devices, and communication devices
  • Software
    Programs and applications installed on personal computers, laptops, or smartphones, responsible for providing sets of instructions for the computer to follow
  • Information
    Result of processed, organized, and structured data, with context and meaning that makes it useful
  • ICT is a combination of its components - people, data, procedures, hardware, software, and information - that has to work hand in hand to create systems that aim to improve our way of performing day-to-day activities and enable us to communicate easily