Online Safety and Cybersecurity Standards
13 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes ransomware?

  • A virus that blocks user access to files and demands payment for removal. (correct)
  • A collection of infected devices controlled by malware.
  • A malicious program that gathers information from a victim's computer.
  • A program that steals user credentials by recording keystrokes.
  • What function does spyware serve?

  • To gather information from a victim's computer and send it to a hacker. (correct)
  • To provide users with unwanted advertisements.
  • To block access to programs until a ransom is paid.
  • To control infected devices remotely without detection.
  • Which of the following is NOT a rule of netiquette?

  • Share expert knowledge to assist others.
  • Always use software to gain control over others’ devices. (correct)
  • Respect other people's privacy.
  • Help keep flame wars under control.
  • What defines a botnet?

    <p>A group of infected devices controlled by a common malware. (D)</p> Signup and view all the answers

    Which statement correctly describes phishing?

    <p>A cyberattack that uses deceptive emails and websites to steal personal information. (A)</p> Signup and view all the answers

    What is the most accurate description of a Trojan Horse?

    <p>A type of malware that disguises itself as a legitimate program. (C)</p> Signup and view all the answers

    What is the main purpose of a spam email?

    <p>To advertise or promote something. (D)</p> Signup and view all the answers

    Which of the following is NOT mentioned as a recommended safety practice for online users?

    <p>Limiting the amount of personal information you share on social media. (A)</p> Signup and view all the answers

    What is the legal framework that covers the unauthorized processing of personal or sensitive information?

    <p>RA 10173 (Data Privacy Act of 2012) (D)</p> Signup and view all the answers

    Which of the following is NOT a type of cybercrime mentioned in the content?

    <p>Phishing (B)</p> Signup and view all the answers

    What term describes the criminal practice of using electronic communication to harass an individual or group?

    <p>Cyberstalking (A)</p> Signup and view all the answers

    Based on the content provided, which of these is a good practice to minimize the risk of online safety threats?

    <p>Avoid visiting any websites that you are not familiar with. (C)</p> Signup and view all the answers

    Which of the following acts specifically addresses the issue of cyberbullying?

    <p>RA 10627 (Anti-Bullying Act of 2013) (B)</p> Signup and view all the answers

    Study Notes

    Online Safety, Security, and Etiquette Standards

    • Online Safety Tips:
      • Do not share passwords with anyone.
      • Avoid relying solely on privacy settings.
      • Do not share future vacation plans.
      • Avoid visiting untrusted websites.
      • Install and update antivirus software.
      • Secure home Wi-Fi with a password.
      • Avoid using public Wi-Fi networks.
      • Do not click links or reply to emails from suspicious sources.
      • Read terms and conditions before accepting them.
      • Think before you click.
    • Cyberbullying: Intentionally abusing, harassing, or mistreating others online via electronic communication.
    • Identity Theft: Stealing personal information to assume someone's identity for financial or other transactions.
    • Cyberstalking: Harassing someone via electronic communication.
    • Sexting: Sending explicit text messages, images, or videos of a sexual nature.
    • Internet Threats:
      • Spam: Junk emails or unwanted messages from advertisers or bots.
      • Malware: Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

    Types of Malware

    • Virus: A program that replicates itself by copying itself to another program.
    • Trojan Horse: A program that disguises itself as legitimate software but ultimately gives malicious control over a computer system.
    • Worm: A program that replicates itself and spreads to other computers.
    • Spyware: A program that gathers information from a victim's computer and sends it to the hacker.
    • Adware: Unwanted advertisements that repeatedly pop up on a computer.
    • Keylogger: A program that records keystrokes to steal user credentials or other confidential information.
    • Botnet: A collection of infected devices controlled by a common type of malware.
    • Rootkit: Software tools used by hackers to gain control over a computer without detection.
    • Ransomware: A virus that blocks access to files and demands payment to unlock them.

    Internet Risks/Crimes

    • Phishing: A cyberattack that uses deceptive emails or websites to obtain sensitive information.
    • Cybercrime: Any criminal activity that involves a computer or network. Examples include hacking, phishing, spamming, child pornography, libel, and identity theft.

    Laws and Acts

    • RA 9995 (Anti-Photo and Video Voyeurism Act): Addresses taking unauthorized photographs or videos.
    • RA 11313 (Safe Spaces Act): Encourages respectful interactions online and offline.
    • Article 353 (Libel) and Article 358 (Slander) of the Revised Penal Code: Define and penalize false statements.
    • RA 10173 (Data Privacy Act of 2012): Protects personal and sensitive information from unauthorized processing.
    • RA 10627 (Anti-Bullying Act of 2013): Addresses bullying in various settings, including online.
    • RA 10175 (Cybercrime Prevention Act of 2012): A comprehensive law against cybercrime.

    Netiquette

    • Netiquette: Online etiquette that follows the same standards as in regular life, ensuring respectful interactions in cyberspace.
    • Rules of Netiquette:
      • Be human.
      • Adhere to real-life behavior standards online.
      • Be aware of the online environment.
      • Respect other people's time and bandwidth.
      • Make a good impression.
      • Share expert knowledge.
      • Help prevent online conflicts.
      • Respect others' privacy.
      • Do not abuse power.
      • Be forgiving.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential online safety tips, cyberbullying, identity theft, and common internet threats. Test your knowledge on how to protect yourself and others in the digital world. Make sure you're well-informed to navigate the online environment safely.

    More Like This

    Use Quizgecko on...
    Browser
    Browser