TLE-ICT III

Cards (10)

  • Malware
    • malicious computer program
  • Computer virus(es)
    • self replicating program that attach to other computer files and spread from one to another
  • Worms
    • these does not attach itself to other computer files to spread.
    • first appeared in 1978
    • it delete files, install programs, and send documents
  • Trojan Horses
    • masquerades as useful program to trick user into installing them in the system
  • Spyware
    • this program works in secret, which may be installed without the user knowing it
  • Crackers
    • a term used to describe people who break to to heir computer system illegally
  • Identity theft
    • systematic attempt to gain personal information that is used illegally
  • Phishing or spoofing
    • obtaining sensitive information through deception
  • Spam
    • general term for unsolicited message that you receive electronically
  • The 10 commandments of computer ethics
    • Thou shalt not use a computer to harm other people.
    • Thou shalt not interfere with other people's computer work.
    • Thou shalt not snoop around in other people's computer files.
    • Thou shalt not use a computer to steal.
    • Thou shalt not use a computer to bear false witness.
    • Thou shalt not copy or use proprietary software for which you have not paid.
    • Thou shalt not use other people's computer resources without authorization or proper compensation.
    • Thou shalt not appropriate other people's intellectual output.
    • Thou shalt think about the social consequences of the program you are writing or the system you are designing.
    • Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans