Podcast
Questions and Answers
Which of these is NOT a type of cybercrime according to the text?
Which of these is NOT a type of cybercrime according to the text?
Which of these is a type of malware that records a user's keyboard activity?
Which of these is a type of malware that records a user's keyboard activity?
What is the primary method by which worms typically spread to computers?
What is the primary method by which worms typically spread to computers?
What is the primary goal of phishing?
What is the primary goal of phishing?
Signup and view all the answers
Which of these accurately describes the relationship between Pharming and Phishing?
Which of these accurately describes the relationship between Pharming and Phishing?
Signup and view all the answers
What is the primary goal of Rogue Security Software?
What is the primary goal of Rogue Security Software?
Signup and view all the answers
Which of these is considered an example of 'Cybercrime Law' in action?
Which of these is considered an example of 'Cybercrime Law' in action?
Signup and view all the answers
How does Adware typically behave on a victim's computer?
How does Adware typically behave on a victim's computer?
Signup and view all the answers
What is the primary purpose of online safety and security practices?
What is the primary purpose of online safety and security practices?
Signup and view all the answers
Which of the following is NOT a recommended online safety practice?
Which of the following is NOT a recommended online safety practice?
Signup and view all the answers
What is a 'Trojan Horse' in the context of online threats?
What is a 'Trojan Horse' in the context of online threats?
Signup and view all the answers
What is the main difference between a virus and a worm?
What is the main difference between a virus and a worm?
Signup and view all the answers
Which of the following practices can help protect against identity theft?
Which of the following practices can help protect against identity theft?
Signup and view all the answers
What is cyberbullying?
What is cyberbullying?
Signup and view all the answers
Which of the following is NOT considered an online threat?
Which of the following is NOT considered an online threat?
Signup and view all the answers
Why is it important to be cautious about sharing personal information online?
Why is it important to be cautious about sharing personal information online?
Signup and view all the answers
Flashcards
Online Safety
Online Safety
The act of maximizing awareness of personal safety and security risks when using the internet.
Password Sharing
Password Sharing
Giving your password to others, which compromises your online safety.
Cyberbullying
Cyberbullying
Intentional abuse or harassment of others using electronic communication.
Identity Theft
Identity Theft
Signup and view all the flashcards
Cyber Stalking
Cyber Stalking
Signup and view all the flashcards
Sexting
Sexting
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Pharming
Pharming
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Keyloggers
Keyloggers
Signup and view all the flashcards
Cybercrime
Cybercrime
Signup and view all the flashcards
Study Notes
Online Safety, Security, Ethics, and Etiquette
- Most Essential Learning Competencies: Apply online safety, security, ethics, and etiquette standards, and practice using ICTs relevant to specific professional tracks.
- Specific Objectives:
- Identify various online threats.
- Identify online safety measures.
- Consider one's and others' reputation when using the internet.
Activity 1: Self-Check on Online Habits
- Instructions: Reflect and assess your online habits. Check "Yes" or "No" on the table.
Self-Check on Online Habits
- I always talk to strangers on social media.: (Example question, check YES or NO)
- Giving your password to your friends: (Example question, check YES or NO)
- Posting about future vacations: (Example question, check YES or NO)
- Visiting unsecured websites: (Example question, check YES or NO)
- Ranting on social media: (Example question, check YES or NO)
- Posting images or videos without permission: (Example question, check YES or NO)
Online Safety and Security
- Definition: The act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and self-protection from computer crime.
Tips on How to be Safe Online
- Do not share your password with anyone.
- Add friends you know in real life.
- Do not visit untrusted websites.
- Add a password to your home Wi-Fi.
- Install and update antivirus software.
- Do not give personal information to anyone.
- Think before clicking links.
- Never post about your future vacation.
Cyberbullying
- Definition: Occurs when someone intentionally abuses, harasses, and mistreats another person using electronic communication.
Identity Theft
- Definition: Stealing personal information to assume a person's identity for transactions.
Cyber Stalking
- Definition: A criminal practice using electronic communication to stalk or harass an individual or group.
Sexting
- Definition: Sending sexually explicit text messages, images, and videos.
Internet Threats
- (A word cloud listing many types of threats)
- Examples include conflict, theft, secrecy, antivirus, phishing, breach, burglar, concept, etc.
Malware (Malicious Software)
- Definition: Software designed to cause harm to a computer system and includes various types.
Types of Malware
- Virus: A malicious program that replicates itself by copying itself to another program.
- Trojan Horse: A malicious program disguised as a legitimate program to gain control over the computer.
- Worm: A malicious program that copies itself and spreads to other computers. Spreads via malicious email attachments or USBs.
- Spyware: A program that gathers information from a victim's computer and sends it back to a hacker.
- Adware: Unwanted advertisements that pop up repeatedly, behaving abnormally and being difficult to close.
Phishing
- Definition: A fraudulent behavior using official-looking emails to impersonate a known source (e.g., a bank) to acquire passwords and credit card information.
Pharming
- Definition: More sophisticated phishing using the DNS system. It involves creating fake web pages (e.g., a bank login page) to steal user credentials.
Rogue Security Software
- Definition: A form of malicious software and internet fraud misleading users into believing their computer has a virus. It attempts to convince users to pay for fake malware removal tools that actually install malware.
Keyloggers
- Definition: Software that records user keyboard operations which can be used to steal bank details and passwords. Similar in nature to spyware.
Ransomware
- Definition: Malicious software that threatens to publish victim data or block access unless a ransom is paid. Part of cryptovirology.
Spam
- Definition: Junk email or unwanted emails sent by advertisers or bots. Often used to deliver malware.
Cybercrime
- Definition: A crime that uses a computer as an object or tool, spanning hacking, phishing, spamming, child pornography, libel, hate crimes, identity theft.
Cybercrime Law
- Definition: A law that addresses all forms of cybercrime.
Netiquette
- Definition: Etiquette applied online, signifying proper manner and behavior.
Core Rules of Netiquette
- Remember the human.
- Adhere to the standards of behavior observed in real life.
- Know where you are in cyberspace.
- Respect other people's time and bandwidth.
- Make a good online presence.
- Share expert knowledge.
- Help control flame wars.
- Respect other people's privacy.
- Do not abuse your power.
- Be forgiving of others' mistakes.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Assess your online habits and understand the importance of safety, security, ethics, and etiquette in the digital world. This quiz will help you identify potential online threats and the measures needed to protect your online reputation. Reflect on your behavior while using ICTs relevant to your professional track.