Internet Safety and Security Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is a key recommendation for maintaining password security?

  • Use multiple antivirus programs for better protection.
  • Never share your password with anyone. (correct)
  • Always log into public Wi-Fi networks for convenience.
  • Share your password only with trusted friends.

Which type of malware is known to block access to data unless a ransom is paid?

  • Spyware
  • Virus
  • Adware
  • Ransomware (correct)

What should you do before posting content online?

  • Think about how it might affect your future job opportunities. (correct)
  • Consider if it will generate a lot of likes and shares.
  • Post without thinking to maintain authenticity.
  • Check if it matches trending topics online.

What is a common characteristic of phishing attacks?

<p>They aim to acquire sensitive personal information through fake websites. (D)</p>
Signup and view all the answers

How can you improve home network security?

<p>Make your home Wi-Fi private by adding a password. (D)</p>
Signup and view all the answers

Which of the following is NOT a type of malware?

<p>Firewalls (B)</p>
Signup and view all the answers

What should you do with suspicious emails?

<p>Do not reply or click links in them. (A)</p>
Signup and view all the answers

Why is it important to read terms and conditions before accepting them online?

<p>To understand the potential risks and responsibilities involved. (D)</p>
Signup and view all the answers

Which best describes the primary feature of Web 2.0?

<p>Dynamic content that enables user participation. (C)</p>
Signup and view all the answers

What is a significant trend in ICT that reflects the blending of different technologies?

<p>Convergence. (A)</p>
Signup and view all the answers

What does the term 'cyber citizenship' refer to?

<p>Using technology with proper etiquette and responsibility. (A)</p>
Signup and view all the answers

Which feature distinguishes Web 4.0 from previous web iterations?

<p>Personalized and interactive content using AI. (C)</p>
Signup and view all the answers

What is considered a major ethical concern of Web 5.0?

<p>Potential for technological unemployment. (A)</p>
Signup and view all the answers

Which of the following options is NOT a commonly recognized type of social media?

<p>Visual storytelling. (A)</p>
Signup and view all the answers

Which component is part of Google's advanced search engine features?

<p>Instant information retrieval. (D)</p>
Signup and view all the answers

What does 'electronic libel' refer to?

<p>Libel committed through a computer system. (C)</p>
Signup and view all the answers

What is the implication of the concept of 'fair use'?

<p>Legal usage of copyrighted work without permission for certain cases. (D)</p>
Signup and view all the answers

What role do fact-checking sites play in information seeking?

<p>Confirm the legitimacy of sources and claims. (C)</p>
Signup and view all the answers

Which of the following is NOT a consequence of cyberbullying?

<p>Increased popularity on social media. (A)</p>
Signup and view all the answers

What is the main purpose of using hashtags in social media?

<p>To categorize content and increase visibility. (D)</p>
Signup and view all the answers

What does phishing involve?

<p>Attempts to acquire sensitive information unlawfully. (B)</p>
Signup and view all the answers

In the context of ICT, what crucial aspect emerges from the decentralized nature of Web 5.0?

<p>Enhanced data privacy and control for users. (C)</p>
Signup and view all the answers

Flashcards

Spyware

Software that secretly monitors your computer activity, often gathering personal information.

Trojan

A type of malware that disguised as legitimate programs, but can harm your computer.

Worm

Harmful software that spreads from one computer to another, often through email.

Virus

Software designed to replicate and infect computers, often causing damage or disruption.

Signup and view all the flashcards

Phishing

Software that tries to trick you into giving away personal information, usually through fake websites or emails.

Signup and view all the flashcards

Ransomware

Malware that blocks your access to your computer data until you pay a ransom.

Signup and view all the flashcards

Copyright Infringement

Unauthorized use of copyrighted material without permission, such as music, movies, or books.

Signup and view all the flashcards

Spam

Unwanted emails, often from bots or advertisers, which can spread malware.

Signup and view all the flashcards

What is ICT?

Information and Communication Technology includes technologies like mobile phones and the internet used for finding, storing, sharing, and changing information.

Signup and view all the flashcards

What is the Philippines' ICT standing?

The Philippines is known for its strong ICT industry and has many ICT related jobs.

Signup and view all the flashcards

What is Web 1.0?

Web 1.0 refers to static web pages that users cannot interact with.

Signup and view all the flashcards

What is Web 2.0?

Web 2.0 allows user interaction and includes social media, blogs, and wikis.

Signup and view all the flashcards

What is Web 3.0?

Web 3.0 aims to deliver personalized content by sharing and reusing data.

Signup and view all the flashcards

What is Web 4.0?

Web 4.0 uses technologies like AI and big data to make the internet more intelligent and user-friendly.

Signup and view all the flashcards

What is Web 5.0?

Web 5.0 emphasizes user control over data and identity in a fully decentralized web.

Signup and view all the flashcards

What is social media?

Online platforms for creating, sharing, and exchanging user-generated content.

Signup and view all the flashcards

What is libel?

Libel is a crime defined in the Revised Penal Code and can also be committed through electronic means.

Signup and view all the flashcards

What is electronic libel?

Committing libel through an electronic device like a computer or phone is a crime.

Signup and view all the flashcards

What is the Cybercrime Law?

The Cybercrime Law governs crimes committed using technology.

Signup and view all the flashcards

What is a cyber citizen?

A cyber citizen uses technology responsibly and ethically, considering etiquette, communication, and security issues.

Signup and view all the flashcards

What are fact-checking sites?

Fact-checking sites help verify information to determine its accuracy.

Signup and view all the flashcards

What is plagiarism?

Using another person's words or ideas without giving credit is plagiarism.

Signup and view all the flashcards

What is a virtual self?

The online persona you create or present to others.

Signup and view all the flashcards

Study Notes

Internet Safety and Security

  • Online Safety: Be mindful of what and where you share online. Read terms and conditions carefully. Keep social media profiles private.
  • Password Security: Never share passwords. Avoid public Wi-Fi. Incognito mode does not guarantee security.
  • Stranger Danger: Don't talk to strangers online or offline. Avoid posting about future trips. Add only real-life friends.
  • Website and Downloads: Avoid untrusted websites and downloads. Buy software, don't use pirated versions.
  • Email Security: Avoid suspicious emails and links.
  • Antivirus: Use reputable antivirus software; one is sufficient; update regularly.
  • Home Network Security: Secure your home Wi-Fi with a password.
  • Secure Purchases: Make online purchases from secure sites.
  • Privacy: Private profiles may not be foolproof against hackers. You cannot control who might view your profile.

Internet Threats

  • Malware: Harmful software for computers.
  • Viruses: Self-replicating programs that spread to other computers.
  • Worms: Transmit themselves across computer networks.
  • Trojans: Disguised as useful software, endangering your PC.
  • Ransomware: Blocks access to data until a ransom is paid.
  • Adware: Displays unwanted advertisements, often as pop-ups.
  • Spyware: Monitors user activity in the background (e.g., keyloggers).
  • Spam: Unwanted emails (often from bots) used to spread malware.
  • Phishing: Deceiving users into revealing personal information (e.g., passwords, credit card details) on fake websites.

Protecting Online Reputation

  • Consider Consequences: Before posting, imagine how your parents, grandparents, or future boss might react.
  • Respond to Harm: If a post harms you or others, report it, and/or request removal.
  • Copyright: Using copyrighted material without permission is infringement.
  • Avoid Infringement: Assume all work is copyrighted. Do not copy, share, alter, use without permission. Review licenses, buy content, and credit original authors.

Information and Communication Technology (ICT)

  • ICT Definition: Communication technologies (internet, mobile phones) for accessing, storing, sending, and processing information.
  • Philippines ICT: Significant ICT presence in the Philippines, a large number of ICT jobs, large mobile phone ownership.
  • Web Evolution:
    • Web 1.0: Static pages, no user interaction.
    • Web 2.0: Dynamic pages, user interaction (social media, blogs, wikis).
    • Web 3.0: Delivering user-specific content; sharing/reusing data.
    • Web 4.0: Intelligent & personalized; utilizes AI, big data, social networking. Concerns include job losses, and potential for inequalities.
    • Web 5.0: Decentralized, allows user data control, potentially greater social robots.
  • Social Media: Platforms for user-generated content.
  • Social Media Types: Social networks, bookmarking sites, social news, media sharing, microblogging, blogs, forums.
  • ICT Trends: Convergence, social media, mobile tech (smartphones/tablets) and assistive media.
  • Mobile OS: iOS, Android, Blackberry OS, Windows Phone OS, Symbian, WebOS and Windows Mobile.
  • Key Terms: Static, dynamic, folksonomy, hashtag, convergence, and social media.

Electronic Libel and Cybercrime Prevention

  • Libel: Under the Revised Penal Code, libel is a crime, especially when committed using a computer.
  • Cybercrime Law: Penalties include imprisonment and fines.
  • "Likes" and Comments: "Likes" and comments are usually protected expression.
  • Potential Consequences: Avoid libel; consider consequences of statements.

Cyber Citizenship

  • Cyber Citizenship Definition: Appropriate use of technology; etiquette, communication, education, access, commerce, responsibility, rights, safety, and security.
  • Online Gaming: Be a good sportsperson; don't accept downloads from strangers.
  • IM and Email: Follow privacy tips; distrust unknown sources.
  • Social Networking: Be aware of age restrictions.

Contextualized Online Search and Research Skills

  • Search Engines: Google (most widely used), Bing (aids in decisions).
  • Google Features: Onebox results, instant info, conversions, translations.
  • Bing Features: Flight cost predictions, video search.
  • Fact-Checking Sites: Check information accuracy.
  • Fact-Correction Tools Correct misinformation.
    • Image Tools: TinEye, Google Images, and FourAndSix(Izitru).
  • Cyber Definitions: Relating to computers or networks.
  • Cyberspace: Virtual computer world.
  • Cybercrime: Criminal activities using computers or the internet.
  • Cyberbullying: Bullying via electronic communication.
  • Hacking: Unauthorized modification of computer systems.
  • Phishing: Fraudulently obtaining sensitive information.
  • Illegal Activities: Downloading without permission, digital piracy, identity theft, cyber defamation, cybersex, and more.
  • Copyright: Creators' legal right to control reproduction.
  • Plagiarism: Copying another's work without attribution.
  • Fair Use: Limited use of copyrighted material without permission.
  • Virtual Self: Online persona.
  • Netiquette: Guidelines for appropriate online communication.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Privacy Protection and Online Identity
30 questions
Luces y Sombras en la Red
8 questions
Privatsphäre, digitale Sicherheit
28 questions
Use Quizgecko on...
Browser
Browser