LESSON-2-ONLINE-SAFETY-SECURITY-ETHICS-AND-NETIQUETTE

Cards (54)

  • Online threats

    • Malware
    • Phishing
    • Spam
    • Adware
    • Ransomware
    • Trojan
    • Spyware
    • Crimeware
    • Pharming
    • Virus
    • Worm
  • Online safety measures
    • Be mindful of what you share
    • Read terms and conditions
    • Check privacy policy
    • Know security features
    • Do not share passwords
    • Avoid public networks
    • Do not talk to strangers
    • Never post about future vacations
    • Add friends you know
    • Avoid untrusted websites
    • Install antivirus software
    • Make home Wi-Fi private
    • Avoid downloading from untrusted websites
    • Buy software, do not use pirated
    • Do not click links from suspicious emails
  • Online Ethics
    Principles governing the appropriate use of technology and online behavior
  • Netiquette
    The correct or acceptable way of communicating on the internet
  • Apply online safety, security, ethics and etiquette standards and practice in the use of ICTs
  • Types of information shared
    • First name
    • Last name
    • Middle name
    • Current and previous school/s
    • Cellphone number
    • Name of mother & father
    • Name of siblings
    • Address
    • Home phone number
    • Birthday
  • Types of information not shared
    • First name
    • Last name
    • Middle name
    • Current and previous school/s
    • Cellphone number
    • Name of mother & father
    • Name of siblings
    • Address
    • Home phone number
    • Birthday
  • There is a risk in sharing your first name
  • Having both your first and last name is more risky
  • Sharing your middle name alone is probably not the most risky
  • Most people who steal identities study their subject
  • Your cellphone number should never be public
  • Disclosing the name of your siblings is a huge risk
  • Giving your address would make it easier for criminals to find you
  • This shared information is more risky than your personal phone number
  • Letting people know your birthday makes you vulnerable to identity theft
  • Malware
    Any program or file that is harmful to a computer user
  • Virus
    A malicious program designed to replicate itself and transfer from one computer to another
  • Worm
    A malicious program that transfers from one computer to another by any type of means
  • Trojan
    A malicious program that is disguised as a useful program
  • Spyware
    A program that runs in the background and monitors user activity
  • Adware
    A program designed to send advertisements, mostly as pop-ups
  • Spam
    Unwanted email mostly from bots or advertisers
  • Phishing
    A method to acquire sensitive personal information by directing users to fraudulent websites
  • Pharming
    A more complicated way of phishing that exploits the DNS system
  • Companies do a background check on applicants
  • Once you post something on the web, you have no control of who sees your posts
  • There are limitations to copyright laws
  • Copyright infringement is the use of works protected by copyright law without permission
  • Ways to avoid copyright infringement
    • Express in your own words
    • Credit the source
    • Understand copyright limitations
    • Know the law
  • There are provisions for “fair use” which allow certain uses of intellectual property without consent
  • Ask yourself whether what you are making is something that came from you or someone else’s creativity
  • Set your post to “private” to protect your reputation online
  • Avoid using names to protect your reputation online
  • If a post can affect your or others' reputation, ask to pull it down or report it
  • Rogue security software tricks the user into thinking it is legitimate
  • Keyloggers are used to record keystrokes to steal sensitive information
  • Crimeware can spread by way of viruses, Trojan horse programs, worms, spyware, or adware
  • Ransomware threatens to publish or block access to data unless a ransom is paid
  • Malware can be spread through questionable file downloads, visiting infected websites, and emails with attachments or links