Podcast
Questions and Answers
A company's database is encrypted by a cybercriminal, who demands payment for the decryption key. What type of cyberattack is this?
A company's database is encrypted by a cybercriminal, who demands payment for the decryption key. What type of cyberattack is this?
- Ransomware attack (correct)
- Phishing attack
- Copyright infringement
- Spam campaign
Which of the following scenarios is the MOST likely example of a phishing attack?
Which of the following scenarios is the MOST likely example of a phishing attack?
- A software company encrypting data.
- Downloading music without paying for it.
- A fake email that asks to update your account information. (correct)
- Receiving a promotional email from a clothing store.
Before posting content online, what is the MOST important question to consider to protect your online reputation?
Before posting content online, what is the MOST important question to consider to protect your online reputation?
- Can I make money from this post?
- Will my future employer approve of this post? (correct)
- How many likes will this post get?
- Is this post trending right now?
You find an image online that you want to use in your school presentation. What is the MOST appropriate action to avoid copyright infringement?
You find an image online that you want to use in your school presentation. What is the MOST appropriate action to avoid copyright infringement?
Which activity does NOT significantly contribute to protecting digital copyright?
Which activity does NOT significantly contribute to protecting digital copyright?
Which scenario demonstrates the LEAST risky online behavior?
Which scenario demonstrates the LEAST risky online behavior?
What distinguishes a worm from a virus in the context of internet threats?
What distinguishes a worm from a virus in the context of internet threats?
Why is avoiding public Wi-Fi networks important for online safety?
Why is avoiding public Wi-Fi networks important for online safety?
Which action has the LEAST impact on improving your online security?
Which action has the LEAST impact on improving your online security?
How does a Trojan horse primarily compromise computer security?
How does a Trojan horse primarily compromise computer security?
What is the main function of spyware?
What is the main function of spyware?
Why should you avoid clicking on links in suspicious emails?
Why should you avoid clicking on links in suspicious emails?
What is the purpose of a keylogger?
What is the purpose of a keylogger?
Flashcards
Online Safety Tips
Online Safety Tips
Guidelines to protect yourself while using the internet.
Malware
Malware
Harmful software programs that damage computers.
Virus
Virus
A type of malware that replicates itself and spreads.
Worm
Worm
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Public Wi-Fi Risks
Public Wi-Fi Risks
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Copyright Infringement
Copyright Infringement
Signup and view all the flashcards
Protecting Online Reputation
Protecting Online Reputation
Signup and view all the flashcards
Study Notes
Online Safety, Security, Ethics, and Etiquette
- Sharing personal information online carries risks
- Sharing a first name poses a risk of already known information, vulnerability to search engines, and cybercrimes.
- Sharing last name is more risky than first name, exposing the user to search engine results. Matching a name with a face can lead to several cybercrimes.
- Sharing a middle name is less risky than first and last, but full names pose the greatest risk due to identity theft.
- Sharing current and previous schools can assist identity thieves in verifying information.
- Cellphone numbers should never be posted online; it's the same as posting a number on a billboard.
- Mothers' maiden names are risky, especially if required as a security question.
- Sharing information about siblings can put younger siblings at risk. Strangers can pretend to be a sibling to dupe the user.
- Sharing addresses is a high-risk action. It makes it easier for criminals to find the person.
- Sharing home phone numbers is more risky than a phone number, as strangers can deceive users by pretending to know their parents or by impersonating a person.
- Sharing birthdays can make users vulnerable to identity theft and be used for targeted advertising.
- To maintain online safety: Be thoughtful about online information sharing, review and understand terms and conditions, keep profiles private, and do not share passwords.
- Avoid public Wi-Fi; incognito mode does not protect from hackers.
- Do not talk to strangers online or in person. Do not post anything about future vacations.
- Add friends who are in real life.
- Avoid untrusted websites.
- Install and maintain only one antivirus program.
- Secure home Wi-Fi with a password.
- Avoid downloading from untrusted websites.
- Do not use pirated software. Avoid clicking on links or replying to suspicious emails.
- Purchase online goods and services from sites with secure settings.
Internet Threats
- Malware is harmful software for computers.
- Viruses replicate and spread through different mediums.
- Worms spread through various networks.
- Example of a worm: ILOVEYOU Worm (originated in the Philippines).
- Trojans disguise as useful software, but can compromise computer safety.
- Spyware secretly monitors activity (e.g., keyloggers). Keyloggers steal passwords and sensitive information.
- Adware displays unwanted advertisements.
- Ransomware threatens to harm data unless a ransom is paid.
Spam, Phishing, and Protecting Online Reputation
- Spam is unwanted email, often from bots or advertisers. It might contain malware.
- Phishing targets sensitive info (passwords, credit card details) by redirecting users to fake websites.
- Protecting online reputation involves considering if parents or bosses would see the post. If a post affects someone's reputation, ask the poster to remove it or report it.
Copyright Infringement
- Copyright infringement is using copyrighted material without permission.
- Assume all work is copyrighted.
- Do not copy, share, or modify without permission.
- Review and keep licensing agreements.
- Buying content is an alternative to avoiding copyright infringement.
- Provide credit to original authors.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about online safety, security, ethics, and etiquette. Discover the risks of sharing personal information online, including names, schools, phone numbers, and addresses. Understand how this information can be exploited for identity theft and other cybercrimes.