Online Safety and Cybersecurity Standards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes ransomware?

  • A virus that blocks user access to files and demands payment for removal. (correct)
  • A collection of infected devices controlled by malware.
  • A malicious program that gathers information from a victim's computer.
  • A program that steals user credentials by recording keystrokes.

What function does spyware serve?

  • To gather information from a victim's computer and send it to a hacker. (correct)
  • To provide users with unwanted advertisements.
  • To block access to programs until a ransom is paid.
  • To control infected devices remotely without detection.

Which of the following is NOT a rule of netiquette?

  • Share expert knowledge to assist others.
  • Always use software to gain control over others’ devices. (correct)
  • Respect other people's privacy.
  • Help keep flame wars under control.

What defines a botnet?

<p>A group of infected devices controlled by a common malware. (D)</p> Signup and view all the answers

Which statement correctly describes phishing?

<p>A cyberattack that uses deceptive emails and websites to steal personal information. (A)</p> Signup and view all the answers

What is the most accurate description of a Trojan Horse?

<p>A type of malware that disguises itself as a legitimate program. (C)</p> Signup and view all the answers

What is the main purpose of a spam email?

<p>To advertise or promote something. (D)</p> Signup and view all the answers

Which of the following is NOT mentioned as a recommended safety practice for online users?

<p>Limiting the amount of personal information you share on social media. (A)</p> Signup and view all the answers

What is the legal framework that covers the unauthorized processing of personal or sensitive information?

<p>RA 10173 (Data Privacy Act of 2012) (D)</p> Signup and view all the answers

Which of the following is NOT a type of cybercrime mentioned in the content?

<p>Phishing (B)</p> Signup and view all the answers

What term describes the criminal practice of using electronic communication to harass an individual or group?

<p>Cyberstalking (A)</p> Signup and view all the answers

Based on the content provided, which of these is a good practice to minimize the risk of online safety threats?

<p>Avoid visiting any websites that you are not familiar with. (C)</p> Signup and view all the answers

Which of the following acts specifically addresses the issue of cyberbullying?

<p>RA 10627 (Anti-Bullying Act of 2013) (B)</p> Signup and view all the answers

Flashcards

Online Safety Tips

Guidelines to protect personal information and enhance security while using the internet.

Cyberbullying

Intentional abuse or harassment using electronic communication.

Identity Theft

Stealing personal information to assume someone else's identity for transactions.

Sexting

Sending sexually explicit messages, images, or videos via electronic means.

Signup and view all the flashcards

Spam Emails

Unwanted emails sent by advertisers or bots, often containing malware.

Signup and view all the flashcards

Malware

Malicious software designed to harm, steal, or exploit any device or network.

Signup and view all the flashcards

Virus (Malware Type)

A program that replicates itself by attaching to other files or programs.

Signup and view all the flashcards

Trojan Horse (Malware Type)

A disguised malicious program that appears legitimate to gain user trust.

Signup and view all the flashcards

WORM

A malicious program that copies itself and spreads to other computers.

Signup and view all the flashcards

RANSOMWARE

A virus that blocks access to files and demands payment to remove it.

Signup and view all the flashcards

PHISHING

A cyberattack using deceptive emails and websites to steal personal information.

Signup and view all the flashcards

KEYLOGGERS

Programs that steal user credentials by recording keystrokes.

Signup and view all the flashcards

NETIQUETTE

The code of proper behavior online derived from 'net' and 'etiquette'.

Signup and view all the flashcards

Study Notes

Online Safety, Security, and Etiquette Standards

  • Online Safety Tips:
    • Do not share passwords with anyone.
    • Avoid relying solely on privacy settings.
    • Do not share future vacation plans.
    • Avoid visiting untrusted websites.
    • Install and update antivirus software.
    • Secure home Wi-Fi with a password.
    • Avoid using public Wi-Fi networks.
    • Do not click links or reply to emails from suspicious sources.
    • Read terms and conditions before accepting them.
    • Think before you click.
  • Cyberbullying: Intentionally abusing, harassing, or mistreating others online via electronic communication.
  • Identity Theft: Stealing personal information to assume someone's identity for financial or other transactions.
  • Cyberstalking: Harassing someone via electronic communication.
  • Sexting: Sending explicit text messages, images, or videos of a sexual nature.
  • Internet Threats:
    • Spam: Junk emails or unwanted messages from advertisers or bots.
    • Malware: Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

Types of Malware

  • Virus: A program that replicates itself by copying itself to another program.
  • Trojan Horse: A program that disguises itself as legitimate software but ultimately gives malicious control over a computer system.
  • Worm: A program that replicates itself and spreads to other computers.
  • Spyware: A program that gathers information from a victim's computer and sends it to the hacker.
  • Adware: Unwanted advertisements that repeatedly pop up on a computer.
  • Keylogger: A program that records keystrokes to steal user credentials or other confidential information.
  • Botnet: A collection of infected devices controlled by a common type of malware.
  • Rootkit: Software tools used by hackers to gain control over a computer without detection.
  • Ransomware: A virus that blocks access to files and demands payment to unlock them.

Internet Risks/Crimes

  • Phishing: A cyberattack that uses deceptive emails or websites to obtain sensitive information.
  • Cybercrime: Any criminal activity that involves a computer or network. Examples include hacking, phishing, spamming, child pornography, libel, and identity theft.

Laws and Acts

  • RA 9995 (Anti-Photo and Video Voyeurism Act): Addresses taking unauthorized photographs or videos.
  • RA 11313 (Safe Spaces Act): Encourages respectful interactions online and offline.
  • Article 353 (Libel) and Article 358 (Slander) of the Revised Penal Code: Define and penalize false statements.
  • RA 10173 (Data Privacy Act of 2012): Protects personal and sensitive information from unauthorized processing.
  • RA 10627 (Anti-Bullying Act of 2013): Addresses bullying in various settings, including online.
  • RA 10175 (Cybercrime Prevention Act of 2012): A comprehensive law against cybercrime.

Netiquette

  • Netiquette: Online etiquette that follows the same standards as in regular life, ensuring respectful interactions in cyberspace.
  • Rules of Netiquette:
    • Be human.
    • Adhere to real-life behavior standards online.
    • Be aware of the online environment.
    • Respect other people's time and bandwidth.
    • Make a good impression.
    • Share expert knowledge.
    • Help prevent online conflicts.
    • Respect others' privacy.
    • Do not abuse power.
    • Be forgiving.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser