Online Safety and Ethics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following practices contributes to online safety?

  • Downloading software from unknown sources.
  • Using 'http://' websites for banking transactions.
  • Regularly reviewing privacy settings on online accounts. (correct)
  • Sharing your password with close friends.

Sharing your middle name online poses the same level of risk as sharing your full name.

False (B)

What is the primary goal of 'phishing' attacks?

to steal sensitive information

A malicious website that mimics a legitimate site to gather usernames and passwords is known as ______.

<p>pharming</p> Signup and view all the answers

Match the following online threats with their descriptions:

<p>Phishing = Deceptive emails to steal sensitive information Malware = Malicious software designed to harm computer systems Cyber Stalking = Using electronic communication to harass or stalk an individual or group Internet Scam = Misleading users to cheat them of personal property</p> Signup and view all the answers

Which of the following is the MOST secure way to access your bank account online?

<p>Typing the URL directly into your browser. (A)</p> Signup and view all the answers

It is generally safe to open email attachments from senders you do not recognize.

<p>False (B)</p> Signup and view all the answers

What is the term for software that spies on user activity without their knowledge?

<p>spyware</p> Signup and view all the answers

A ______ is a type of malware that replicates by attaching itself to other computer programs or data files.

<p>virus</p> Signup and view all the answers

Match each authentication method with its corresponding description.

<p>User Identification = Using a username and password to verify identity Possessed Objects = Using physical items like ATM cards for verification Biometric Device = Using unique biological traits for authentication Callback System = Verifying identity by calling back a registered phone number</p> Signup and view all the answers

Which of the following is a key component of maintaining privacy online?

<p>Restricting the collection and use of your personal information. (B)</p> Signup and view all the answers

A website with 'https://' in the address bar indicates a secured network.

<p>True (A)</p> Signup and view all the answers

What is 'netiquette'?

<p>online etiquette</p> Signup and view all the answers

Attempting to impersonate someone online with the intent to gather personal information is an example of ______.

<p>spoofing</p> Signup and view all the answers

Match the online threat to its description:

<p>Botnet = Network of infected computers controlled remotely Worm = Malware that self-replicates across networks Trojan Horse = Disguised malware that tricks users into installing it Adware = Software that automatically displays advertisements</p> Signup and view all the answers

Which of the following actions increases vulnerability to identity theft?

<p>Sharing your first and last name, along with a photo, on social media. (C)</p> Signup and view all the answers

Computer ethics primarily concerns itself with the moral conduct of computing professionals.

<p>True (A)</p> Signup and view all the answers

What is CAPTCHA technology used for primarily?

<p>prevent bot attacks</p> Signup and view all the answers

The 'I Love You' virus, which caused widespread computer shutdowns, was a type of ______.

<p>worm</p> Signup and view all the answers

Associate each term with its description regarding online safety.

<p>Online Safety = Practices to ensure users and their information are safe on the internet Online Threat = An act that illegally browses or steals someone's information Privacy = The right to deny or restrict the collection and use of personal information Authentication = Processes to verify a user's identity</p> Signup and view all the answers

What should you do if you encounter a website that requires your mother's maiden name as a security question?

<p>Avoid using the site, as it is a privacy risk. (B)</p> Signup and view all the answers

It is safe to share the names of your siblings on social media if your profile is private.

<p>False (B)</p> Signup and view all the answers

Give an example of a biometric device.

<p>fingerprint scanner</p> Signup and view all the answers

______ is the act of using the internet or electronic devices to harass or stalk an individual, group, or organization.

<p>cyberstalking</p> Signup and view all the answers

Match each online safety measure to its purpose:

<p>Never share personal information = Protects against identity theft and scams Use 'https://' websites = Ensures secure data transmission Keep software updated = Prevents security vulnerabilities Review privacy settings = Controls personal data visibility</p> Signup and view all the answers

Which of the following behaviors aligns with 'netiquette'?

<p>Respecting other people's time and bandwidth. (B)</p> Signup and view all the answers

Downloading software from a trusted source guarantees it is free from malware.

<p>False (B)</p> Signup and view all the answers

What is a 'bug' in the context of computer systems?

<p>system malfunction</p> Signup and view all the answers

A ______ is a type of internet scam where users are misled in various ways, often through fabricated promises.

<p>internet scam</p> Signup and view all the answers

Match the following terms with their appropriate definition

<p>Online Ethics = Moral principles guiding computer professionals' conduct Online Safety Measures = Precautions to protect yourself from online threats Online Threats = Potential dangers and risks encountered online Online Delinquencies = Illegal or harmful acts committed online</p> Signup and view all the answers

Why is it risky to post your cellphone number on the internet?

<p>Because it can be used for identity theft and scams. (C)</p> Signup and view all the answers

Callback systems are primarily used for user identification rather than strong authentication.

<p>False (B)</p> Signup and view all the answers

In online security, what does the acronym 'URL' stand for?

<p>Uniform Resource Locator</p> Signup and view all the answers

A ______ is a type of malicious software that is disguised as real software, often secretly installed, intended to transfer data or gather private information.

<p>malware</p> Signup and view all the answers

Match the description to the type of social engineering attack.

<p>Phishing = An email sent from an internet criminal disguised as an email from a legitimate, trustworthy source Spoofing = A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host Scam = Is to cheat the target of their personal property directly rather than private information Cyberbullying = The act of tormenting, threatening, harassing, embarrassing another person using the internet or other technologies</p> Signup and view all the answers

In what context is it BEST to consider if something appears "phishy?"

<p>When you receive an unsolicited email asking for your bank details. (D)</p> Signup and view all the answers

Letting people know your birthday is safe as long as no other information is shared.

<p>False (B)</p> Signup and view all the answers

What does a hacker illegally browse to steal?

<p>someone's information</p> Signup and view all the answers

A huge risk, especially if you have younger siblings, is when strangers may pretend or use their ______.

<p>identity</p> Signup and view all the answers

Associate the following risks when sharing information with their descriptions.

<p>First Name = A hacker may already know plenty about you even if you only give out your first name First Name and Last Name = Vulnerable to search engines and matching a name with a face can lead to several cybercrimes like identity theft Cell Phone Number = It is a public place meaning, it is the same as posting your number on a billlboard Your Address = It would be much easier for criminals to find you</p> Signup and view all the answers

Flashcards

Online Safety / Internet Safety

Practices and precautions observed when using the internet to ensure user, computer, and personal information safety.

Online risks

Delinquencies that can be committed on the internet, such as stalking, identity theft, privacy violations and harassment

Online safety measures

Never give personal information out over the internet, and be wary of suspicious links and attachments.

Online Threat

An act performed by a knowledgeable computer user (hacker) that illegally browses or steals someone's information.

Signup and view all the flashcards

Phishing

An email from an internet criminal disguised as an email from a legitimate, trustworthy source to lure you into revealing sensitive, confidential information.

Signup and view all the flashcards

Pharming

A malicious website that resembles a legitimate website, used to gather usernames and passwords.

Signup and view all the flashcards

Internet Scam

A type of scam that misleads the user in many ways while attempting to take lead of them, often using fabricated promises or confidence tricks.

Signup and view all the flashcards

Botnet

A network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts. Captcha can help avoid this.

Signup and view all the flashcards

Malware

A generic term for spyware and adware; malicious software disguised as real software, often secretly installed.

Signup and view all the flashcards

Adware

A type of malware that automatically delivers advertisements.

Signup and view all the flashcards

Spyware

A type of malware that functions by spying on user activity without their knowledge.

Signup and view all the flashcards

Virus

A program designed to replicate by attaching itself into other computer programs, data files, or the boot sector of the hard drive.

Signup and view all the flashcards

Worm

Is can be injected into a network by any type of means, like a USB stick or an email attachment.

Signup and view all the flashcards

Trojan Horse

A type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

Signup and view all the flashcards

Bug

A malfunction on a computer system through runtime.

Signup and view all the flashcards

Cyberstalking

The use of the internet or other electronic devices to harass or stalk an individual, group, or organization.

Signup and view all the flashcards

Cyberbullying

The act of tormenting, threatening, harassing, or embarrassing another person using the internet or other technologies.

Signup and view all the flashcards

SPAM

Unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if opened or responded.

Signup and view all the flashcards

Spoofing

A criminal who impersonates another individual or organization, with the intent to gather personal or business information.

Signup and view all the flashcards

Netiquette

Comes from the word network and etiquette. It is a set of rules and norms for acceptable conduct or behaviour online.

Signup and view all the flashcards

Computer Ethics

Concerned with how computing professionals should make decisions regarding professional and social conduct.

Signup and view all the flashcards

Privacy

Refers to the right of individuals to deny or restrict the collection and used of information about them.

Signup and view all the flashcards

Authentication

Process where a system verifies a user's identity.

Signup and view all the flashcards

User Identification

Authentication method using something the user knows, like a password.

Signup and view all the flashcards

Possessed object

Authentication method using something physically possessed, like a card.

Signup and view all the flashcards

Biometric device

Authentication method using unique biological traits.

Signup and view all the flashcards

Callback System

Authentication method making a call back to verify users.

Signup and view all the flashcards

Study Notes

  • The learners will be able to apply online safety, security, ethics, and etiquette standards and practice using ICTs in their specific professional tracks.
  • The learners will be able to discuss what constitutes appropriate and inappropriate online behavior.
  • The learners will be able to discern possible deceptive information and wrongly evaluated data.
  • The learners will be able to understand the importance of making judgment calls on possible implications and consequences when making certain information public.
  • Topic Outline: Online Safety/Internet Safety, Online Threats & Types, Online Safety Measures, and Online Ethics and Netiquette are to be covered.

Online Safety

  • Online safety refers to the practices and precautions that should be observed when using the internet to ensure the users, their computers, and personal information are safe from crimes associated with using the internet.
  • Numerous delinquencies can be committed on the internet including stalking, identity theft, privacy violations, and harassment.

Risks of Sharing Personal Information

  • Sharing your first name still carries risk, as hackers may already know a lot about you.
  • Sharing both your first and last name is riskier, making you vulnerable to searches and potential identity theft.
  • Sharing just your middle name is not the riskiest, but sharing your entire full name would be.
  • Information about current and previous schools can be used for identity verification purposes by those who steal identities.
  • Your cellphone number should never be posted on the Internet.
  • Sharing your mother's maiden name is risky, especially as it's often used for security questions.
  • Sharing details about siblings is risky, as strangers may impersonate them.
  • Sharing your address makes it easier for criminals to find you.
  • Sharing your home phone number is risky because scams often use this information to deceive you.
  • Sharing your birthday on your profile can make you vulnerable to identity theft, but is considered a must to get as many gifts as possible.

Online Safety Measures

  • Never give out personal information over the Internet.
  • Do not provide banking/sensitive information unless you are sure that it is a reputable business having a secure service.
  • Ensure the website address begins with "https://" instead of "http://".
  • Type the URL yourself instead of accessing accounts through email links.
  • Do not open messages/attachments from unknown senders.
  • Regularly review privacy settings in online accounts.
  • Delete browsing data when using a public computer terminal.
  • Keep software updated to avoid security holes.
  • Do not download/install unknown software on your devices.

Online Threats

  • An online threat is an act performed by a knowledgeable computer user, or hacker, who illegally browses or steals someone's information.

Types of Threats

  • Phishing: Emails from internet criminals disguised as a legitimate, trustworthy source to lure you into revealing sensitive information.
  • Pharming: A malicious website that resembles a legitimate website, used to gather usernames and passwords.
  • Internet Scam: Misleads users with fabricated promises and tricks to cheat them of their personal property.
  • Botnet: A network of zombie computers taken over by a robot/bot to perform large-scale malicious acts for the botnet creator
    • Captcha technology is used to avoid this type of security threat.
  • Malware: A generic term for spyware and adware, disguised as real software, often secretly installed to transfer data or gather private information without user permission.
  • Adware, a type of malware, automatically delivers advertisements via banner ads & pop-up ads.
  • Spyware functions by spying on user activity without the user’s knowledge.
    • Spying capabilities may include activity monitoring, keystroke collection, data harvesting, and more.
    • A keylogger is an example of spyware.
  • Virus: A program designed to replicate by attaching itself into other computer programs, data files, and the boot sector of the hard drive.
  • Worm: Worm can be injected into a network by any type of means, like a USB stick or an email attachment.
  • Trojan Horse: A type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
  • Iloveyou Virus (aka Love bug or love letter): A computer worm attached to an email that infected 10 million Windows personal computers, causing computer shutdown and file deletion in 2000
    • Created by Filipino students Onel De Guzman and Reonel Ramones.
  • Bug: A malfunction on a computer system through runtime.
    • The term "bug" originated from a moth found on the Mark II computer by Grace Hopper that caused a system malfunction.
  • Cyberstalking: The use of the internet or other electronic devices to harass or stalk an individual, group, or organization.
  • Cyberbullying: The act of tormenting, threatening, harassing, or embarrassing another person using the internet or other technologies.
  • Spam: Unsolicited email, instant messages, or social media messages that are easy to spot but can be damaging if opened or responded to.
  • Spoofing: A criminal who impersonates an individual or organization with the intent to gather personal or business information.

Online Ethics and Netiquette

  • Netiquette: Comes from the words Network and Etiquette.
    • A set of rules and norms for acceptable conduct/behavior online.
  • Computer Ethics: Concerned with how computing professionals should make decisions regarding professional and social conduct.
  • Privacy: The right of individuals to deny or restrict the collection and use of information about them.

Ten Core Rules of Netiquette

  • Remember the Human.
  • Adhere to the same standards of behavior online that you would follow in real life.
  • Know where you are in cyberspace.
  • Respect other people’s time and bandwidth.
  • Make yourself look good.
  • Share expert knowledge.
  • Help keep flame wars under control.
  • Respect other people's privacy.
  • Don't abuse your power.
  • Be forgiving of other people's mistakes.

Authentication

  • Authentication is a process where users verify their identity.
  • It deals with the problem of determining whether a user should be allowed access to a particular system.
  • Common authentication methods:
    • User Identification.
    • Possessed Objects.
    • Biometric Device.
    • Callback System.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser