Online Safety, Security, Ethics, and Etiquette
13 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A company's database is encrypted by a cybercriminal, who demands payment for the decryption key. What type of cyberattack is this?

  • Ransomware attack (correct)
  • Phishing attack
  • Copyright infringement
  • Spam campaign

Which of the following scenarios is the MOST likely example of a phishing attack?

  • A software company encrypting data.
  • Downloading music without paying for it.
  • A fake email that asks to update your account information. (correct)
  • Receiving a promotional email from a clothing store.

Before posting content online, what is the MOST important question to consider to protect your online reputation?

  • Can I make money from this post?
  • Will my future employer approve of this post? (correct)
  • How many likes will this post get?
  • Is this post trending right now?

You find an image online that you want to use in your school presentation. What is the MOST appropriate action to avoid copyright infringement?

<p>Give credit to the image's original creator. (D)</p> Signup and view all the answers

Which activity does NOT significantly contribute to protecting digital copyright?

<p>Sharing content freely without any restrictions. (D)</p> Signup and view all the answers

Which scenario demonstrates the LEAST risky online behavior?

<p>Checking privacy settings and limiting the visibility of your social media profile to friends only. (A)</p> Signup and view all the answers

What distinguishes a worm from a virus in the context of internet threats?

<p>Worms independently transfer from one computer to another, while viruses require a host program to spread. (D)</p> Signup and view all the answers

Why is avoiding public Wi-Fi networks important for online safety?

<p>Data transmitted over public Wi-Fi networks might not be encrypted, making it easier for hackers to intercept sensitive information. (D)</p> Signup and view all the answers

Which action has the LEAST impact on improving your online security?

<p>Routinely posting updates about your daily activities on social media. (A)</p> Signup and view all the answers

How does a Trojan horse primarily compromise computer security?

<p>By disguising itself as legitimate software to gain access to a system. (B)</p> Signup and view all the answers

What is the main function of spyware?

<p>To secretly monitor a user's computer activity and collect personal information. (C)</p> Signup and view all the answers

Why should you avoid clicking on links in suspicious emails?

<p>They could lead to phishing websites designed to steal personal information. (A)</p> Signup and view all the answers

What is the purpose of a keylogger?

<p>To record all keystrokes made by a user, often to capture passwords or sensitive information. (C)</p> Signup and view all the answers

Flashcards

Online Safety Tips

Guidelines to protect yourself while using the internet.

Malware

Harmful software programs that damage computers.

Virus

A type of malware that replicates itself and spreads.

Worm

A type of malware that spreads automatically over networks.

Signup and view all the flashcards

Trojan

Malware disguised as legitimate software, allowing hackers access.

Signup and view all the flashcards

Spyware

Software that secretly monitors user activity and gathers information.

Signup and view all the flashcards

Adware

Software that automatically displays or downloads advertisements.

Signup and view all the flashcards

Public Wi-Fi Risks

Insecure networks that can expose you to threats.

Signup and view all the flashcards

Ransomware

Malicious software that demands payment to restore access to data.

Signup and view all the flashcards

Spam

Unwanted emails, often from bots or advertisers, that may deliver malware.

Signup and view all the flashcards

Phishing

Fraudulent attempts to obtain sensitive information via fake websites.

Signup and view all the flashcards

Copyright Infringement

Using copyrighted works without permission where needed.

Signup and view all the flashcards

Protecting Online Reputation

Consider the impact of what you post on social media.

Signup and view all the flashcards

Study Notes

Online Safety, Security, Ethics, and Etiquette

  • Sharing personal information online carries risks
  • Sharing a first name poses a risk of already known information, vulnerability to search engines, and cybercrimes.
  • Sharing last name is more risky than first name, exposing the user to search engine results. Matching a name with a face can lead to several cybercrimes.
  • Sharing a middle name is less risky than first and last, but full names pose the greatest risk due to identity theft.
  • Sharing current and previous schools can assist identity thieves in verifying information.
  • Cellphone numbers should never be posted online; it's the same as posting a number on a billboard.
  • Mothers' maiden names are risky, especially if required as a security question.
  • Sharing information about siblings can put younger siblings at risk. Strangers can pretend to be a sibling to dupe the user.
  • Sharing addresses is a high-risk action. It makes it easier for criminals to find the person.
  • Sharing home phone numbers is more risky than a phone number, as strangers can deceive users by pretending to know their parents or by impersonating a person.
  • Sharing birthdays can make users vulnerable to identity theft and be used for targeted advertising.
  • To maintain online safety: Be thoughtful about online information sharing, review and understand terms and conditions, keep profiles private, and do not share passwords.
  • Avoid public Wi-Fi; incognito mode does not protect from hackers.
  • Do not talk to strangers online or in person. Do not post anything about future vacations.
  • Add friends who are in real life.
  • Avoid untrusted websites.
  • Install and maintain only one antivirus program.
  • Secure home Wi-Fi with a password.
  • Avoid downloading from untrusted websites.
  • Do not use pirated software. Avoid clicking on links or replying to suspicious emails.
  • Purchase online goods and services from sites with secure settings.

Internet Threats

  • Malware is harmful software for computers.
  • Viruses replicate and spread through different mediums.
  • Worms spread through various networks.
  • Example of a worm: ILOVEYOU Worm (originated in the Philippines).
  • Trojans disguise as useful software, but can compromise computer safety.
  • Spyware secretly monitors activity (e.g., keyloggers). Keyloggers steal passwords and sensitive information.
  • Adware displays unwanted advertisements.
  • Ransomware threatens to harm data unless a ransom is paid.

Spam, Phishing, and Protecting Online Reputation

  • Spam is unwanted email, often from bots or advertisers. It might contain malware.
  • Phishing targets sensitive info (passwords, credit card details) by redirecting users to fake websites.
  • Protecting online reputation involves considering if parents or bosses would see the post. If a post affects someone's reputation, ask the poster to remove it or report it.
  • Copyright infringement is using copyrighted material without permission.
  • Assume all work is copyrighted.
  • Do not copy, share, or modify without permission.
  • Review and keep licensing agreements.
  • Buying content is an alternative to avoiding copyright infringement.
  • Provide credit to original authors.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Learn about online safety, security, ethics, and etiquette. Discover the risks of sharing personal information online, including names, schools, phone numbers, and addresses. Understand how this information can be exploited for identity theft and other cybercrimes.

More Like This

Internet Ethics and Online Safety
24 questions

Internet Ethics and Online Safety

BetterThanExpectedHydrogen avatar
BetterThanExpectedHydrogen
Online Safety and Cybersecurity Standards
13 questions
Use Quizgecko on...
Browser
Browser