Lesson 1 (emtech)

Cards (34)

  • Online Community - community that is formed on the internet where people interact, share etc.
  • Internet Security - protects the network from threats and attacks
  • Republic act No. 10175- Cybercrime Prevention act of 2012 that aims to address legal issues concerning online interaction and internet
  • Cyber- means relating to, or involving computer or computer work.
  • Cyberspace - The virtual world of the internet, where people can communicate and exchange information.
  • Cybercrime- refers to the criminal activities carried out by means of computer or the internet.
  • Hacking- refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of creator's original objectives
  • Phishing- is the attemp to obtain sensitive information such as usernames and password by pretending to be a trustworthy entity.
  • Illegal Downloading- refers to obtaining files that you do not have the right to use from the Internet.
  • Digital Piracy - refers to practice of illegal and selling digital music, video, computer software, etc.
  • Identity theft - in the deliberate use of someone else's identity, usually a method to gain a financial advantage or obtain it and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
  • Distributed Denial of Services (DDoS)- is one in which a multitude of compromised systems attack a single target thereby causing denial of service for users of the targeted system.
  • Social Engineering - The of manipulating people so they give up confidential information.
  • Trojan Horse - a booby trap in the form of an email attachment. If you download the attachment, it unleashes a virus on your computer. The virus may wipe files from system and suck up personal data for identity thieves.
  • Cyber- harassment - can be Cyberstalking and Cyberbullying. These are not about stealing money or identities. They are personal attacks, targeting someone online just as some bullies and stalkers target victims offline.
  • Cyber-bullying- The use of technology to torment, threaten, harass or embarrass another person using the internet or other technologies such as posting embarrassing pictures on social media or sending hurtful or threatening text messages.
  • Cyber-stalking- a crime using internet, email, or other types of electronic communications to stalk, harass, or threaten another person. It often involves harassing emails, instant or text messages, or social media posts, or creating websites for the sole purpose of tormenting the victim.
  • Cyber Defamation- is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
  • Two types of defamation:
    1. Slander- verbal
    2. Libel- written
  • Cybersex- is a virtual sex encounter in which two or more people (connected remotely via internet) send each other sexually explicit contents or sexually explicit acts.
  • Child Pornography- is a form of child sexual exploitation
  • 419 Scams- is named for a section of the Nigerian legal code, because it often involves emails sent from Nigeria
  • Intrusion- a computer system is compromised by breaking the security of such a system or causing it to enter into an insecure state or other users can gain unauthorized access to a system. The system data are accessed without permission.
  • Virus- a malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives and CD's.
  • Worm- a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.
  • Trojan- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • Spyware- a program that runs in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently doing and typing through keylogging.
  • Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
  • Adware- a program designed to send your advertisements, mostly as pop-ups.
  • Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.
  • 11 types of computer frauds and crimes:
    1. Hacking
    2. Phishing
    3. Illegal Downloading
    4. Digital Piracy
    5. Identity Theft
    6. Distributed Denial of Services DDoS
    7. Social Engineering
    8. Trojan Horses
    9. Cyber-Harassment
    10. 419 Scam
    11. Intrusion
  • Types of Cyber-Harassment:
    1. Cyber-Bullying
    2. Cyber Stalking
    3. Cyber Defamation
    4. Cybersex
    5. Child Pornography
  • 2 types of Internet Threats:
    1. Malware
    2. Spam
  • Types of Malware:
    1. Virus
    2. Worm
    3. Trojan
    4. Spyware
    5. Adware