Understanding Digital Etiquette and PDPA

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Digital etiquette primarily applies to in-person interactions, with minimal relevance to online behavior.

False (B)

E-safety mainly concerns the measures to guard personal safety and the security of networks for netizens.

True (A)

It is acceptable to quote information without context as long as the source is cited.

False (B)

It's perfectly acceptable to share personal information or images of someone else online without their express consent, provided it's for a harmless purpose.

<p>False (B)</p> Signup and view all the answers

Responding to online trolls is a good way to correct misinformation online.

<p>False (B)</p> Signup and view all the answers

Using all caps in online communication is a good way to emphasize a point.

<p>False (B)</p> Signup and view all the answers

Double-checking facts before sharing information online is crucial to prevent spreading misinformation.

<p>True (A)</p> Signup and view all the answers

Sensitive personal data excludes religious beliefs and political opinions.

<p>False (B)</p> Signup and view all the answers

The Personal Data Protection Act 2010 regulates the processing of personal data in regards to commercial transactions.

<p>True (A)</p> Signup and view all the answers

Under the PDPA, explicit consent is not required for processing sensitive personal data.

<p>False (B)</p> Signup and view all the answers

Banks and insurance companies are classified as data processors under the PDPA.

<p>False (B)</p> Signup and view all the answers

The PDPA gives individuals the right to block the processing of their data for direct marketing.

<p>True (A)</p> Signup and view all the answers

Federal and State Government data is protected by the PDPA 2010

<p>False (B)</p> Signup and view all the answers

Sharing your pet's name on social media is a secure practice, as this information cannot be used to access your personal accounts.

<p>False (B)</p> Signup and view all the answers

It is acceptable to connect to the internet using an unsecure Wi-Fi if you need to access your bank information.

<p>False (B)</p> Signup and view all the answers

Phishing is a type of cybercrime where victims may receive messages from seemingly legitimate sources.

<p>True (A)</p> Signup and view all the answers

In a phishing attack, user credentials and banking details are not targeted by the attacker.

<p>False (B)</p> Signup and view all the answers

Cyber criminals never use chat rooms in order to connect with victims.

<p>False (B)</p> Signup and view all the answers

A key characteristic of ransomware is that it guarantees the recovery of blocked data upon payment.

<p>False (B)</p> Signup and view all the answers

A botnet can only be used to mine cryptocurrency.

<p>False (B)</p> Signup and view all the answers

In a DDoS attack, a single computer is used to flood a server with traffic.

<p>False (B)</p> Signup and view all the answers

A DDoS attack aims to make a website resource unavailable.

<p>True (A)</p> Signup and view all the answers

Cybersquatting involves registering a domain name similar to an established brand without authorization with the intent to profit from it.

<p>True (A)</p> Signup and view all the answers

In general, cybersquatting will never result in damage to your brand's reputation.

<p>False (B)</p> Signup and view all the answers

Love scams never occur through social media.

<p>False (B)</p> Signup and view all the answers

You can ignore free USB sticks from an unknown source, because they can not contain viruses.

<p>False (B)</p> Signup and view all the answers

When using public Wi-Fi, it is a good idea to log onto your internet banking for added security.

<p>False (B)</p> Signup and view all the answers

Don't include the year of your birth in the full date of your birth on Facebook.

<p>True (A)</p> Signup and view all the answers

Cybersecurity measures primarily focus on the protection of physical assets, with limited emphasis on digital systems.

<p>False (B)</p> Signup and view all the answers

Victims of identity theft may experience psychological consequences such as stress and fear.

<p>True (A)</p> Signup and view all the answers

Social media accounts are always accurate.

<p>False (B)</p> Signup and view all the answers

According to security experts, you should shred all documents thoroughly containing your name prior to throwing them away.

<p>True (A)</p> Signup and view all the answers

Using a separate password for each of your important online accounts reduces your risk if one account is compromised.

<p>True (A)</p> Signup and view all the answers

Fake news is often spread unintentionally.

<p>True (A)</p> Signup and view all the answers

If you are sent untrue news, this is unlikely to make a story unusual.

<p>False (B)</p> Signup and view all the answers

Always verify the validity of information received via emails and messages.

<p>True (A)</p> Signup and view all the answers

Cybercrime only has financial effects.

<p>False (B)</p> Signup and view all the answers

Cyberattacks like DDoS and malware infection may cause financial damage.

<p>True (A)</p> Signup and view all the answers

There is little risk if your companies pricing strategy is leaked to competitors.

<p>False (B)</p> Signup and view all the answers

There is no need to keep a close eye on credit card and bank account activity.

<p>False (B)</p> Signup and view all the answers

Flashcards

Digital Etiquette

A standard of conduct on social media and in the virtual world.

E-access

The privilege of using electronic information and having equal, secure access.

E-literate

Using technology appropriately, understanding online behavior's offline consequences.

E-rule

Governing communication and technology use, respecting ownership and authorship.

Signup and view all the flashcards

E-safety

Measures and practices to protect personal safety and network security online.

Signup and view all the flashcards

Never Plagiarize

Don't replicate someone else's work without giving credit.

Signup and view all the flashcards

Think Before You Post

Consider your words and their potential impact before posting.

Signup and view all the flashcards

Ignore Online Trolls

Avoid engaging, they only want to argue.

Signup and view all the flashcards

Verify Before Sharing

Confirm that something is true before sharing it with others

Signup and view all the flashcards

Ask Permission First

Respect privacy; get permission before sharing personal details.

Signup and view all the flashcards

Mind Your Grammar

Poor grammar can reflect poorly on your communication. Write clearly.

Signup and view all the flashcards

Quiet Your Device

Silence devices to not disrupt

Signup and view all the flashcards

Double Check Before Sending

Ensure a message is accurate before sending.

Signup and view all the flashcards

Personal Data

Any data relating to an identifiable individual.

Signup and view all the flashcards

Sensitive Personal Data

Data about religious beliefs, health, political opinions.

Signup and view all the flashcards

Data Subject

Owner of personal data.

Signup and view all the flashcards

PDPA (Personal Data Protection Act)

Governs personal data processing in commercial transactions.

Signup and view all the flashcards

Data User

Banks, insurance companies, telcos are authorized to process personal data.

Signup and view all the flashcards

Data Subject

Person whose data is being collected.

Signup and view all the flashcards

Data Processor

Holds or processes data on behalf of the data user, like debt collectors.

Signup and view all the flashcards

Third Party (in Data)

Someone other than the data subject, user, or processor.

Signup and view all the flashcards

Block Direct Marketing

A right to refuse to receive promotional materials.

Signup and view all the flashcards

Block Harmful Processing

Right to stop processing that causes harm.

Signup and view all the flashcards

Right to Make Corrections

Correct wrong or inaccurate data/details.

Signup and view all the flashcards

Right to Access

Right to check and confirm what data is held.

Signup and view all the flashcards

Revoke Agreement

Withdraw consent and stop further processing.

Signup and view all the flashcards

Cyber Security

Practice of protecting systems from digital attacks.

Signup and view all the flashcards

Phishing

Cybercrime involving deceptive emails to steal personal information.

Signup and view all the flashcards

Ransomware

Harmful software that blocks computer access and demands ransom.

Signup and view all the flashcards

Botnet

Network of infected computers controlled remotely.

Signup and view all the flashcards

DDoS Attack

Overwhelming a system with traffic to disrupt service.

Signup and view all the flashcards

Cybersquatting

Registering a domain name similar to a known brand for malicious purposes.

Signup and view all the flashcards

Online Love Scam

A catfishing attempt to get money or details.

Signup and view all the flashcards

Fake news

False or misleading information presented as news.

Signup and view all the flashcards

Identity Theft

Stealing personal information to commit fraud.

Signup and view all the flashcards

Knowing How to Recognize Phishing Emails

Know hints to prevent phishing, like a lack of bank

Signup and view all the flashcards

Keep Personal Information Safe Online

Like date of birth, in order to keep from revealing to potential bad actors.

Signup and view all the flashcards

Beware of Public Computers

Software to steal private account, card and account numbers.

Signup and view all the flashcards

Use Credit Cards Instead of Debit Cards

Gives higher protection with refunds in the event of fraud.

Signup and view all the flashcards

Purchase Only From Reputable Websites

Check 'https' to give additional protection from credit card info, can be easily set up by fraud

Signup and view all the flashcards

Study Notes

Digital Etiquette

  • Digital etiquette refers to the accepted standards of behavior on social media and in online interactions
  • It aims to make the internet a safer and better environment

Key Aspects of Digital Etiquette

  • E-access involves understanding the privilege of using electronic resources, includes having reliable access
  • E-literacy means using technology appropriately; highlights that online behavior has significant offline repercussions
  • E-rule governs communication and technology usage, including respecting ownership and authorship
  • E-safety encompasses measures and practices that Netizens use to protect their personal safety and the security of their networks

Personal Data Protection Act (PDPA) Objectives

  • PDPA seeks to protect personal information while enabling businesses to collect, use, or share data for legitimate reasons
  • It is applicable to personal information in both electronic and non-electronic formats
  • It does not apply to personal/domestic use, employee data or public agencies
  • Most Malaysian businesses are considered PDPA data users - due to the frequency of handling personal data

Cyber Security

  • It includes protecting systems, networks, and programs from digital attacks
  • Cybersecurity threats are conducted by malicious individuals aiming to steal data and disrupt systems

Cyber Crime: Phishing

  • Phishing occurs when victims receive emails or SMS from entities impersonating legitimate companies such as banks or LHDN requesting updates to internet banking details
  • Clicking on links or attachments within these malicious emails leads to a fake website
  • This fake website fools the victim into inputting banking details
  • Culminating in the suspect transferring money out of the victim's account

Cyber Crime: Online Fraud

  • Cyber criminals make connections with victims through emails, websites, chat rooms, and social media to commit online fraud
  • By exploiting victims' trust, criminals deceive and manipulate them into giving up confidential information or money
  • Online fraud includes scams; miracle cures; requests for advance fees for credit cards; parcel scams; shopping and auction sites fraud; mule recruitment; fake PC errors; fake check scams; identity theft; business opportunities; fake relatives in distress; foreign lottery schemes; secret shopper scams; phishing emails; prize winner scams; charity donations and love scams

Cyber Crime: Ransomware

  • This malware type can block or change the information present on a computer's hard drive
  • Cybercriminals request a ransom in exchange for restoring access
  • It's not guaranteed that paying the ransom will restore computer access, or blocked data

Cyber Crime: Botnets

  • A bot is a type of malware that enables an attacker to take control of a personal computer
  • Botnets are networks of infected machines globally
  • Computers are infected without owners’ awareness
  • Botnets carry out sending spam, viruses, spyware alongside stealing sensitive information (banking credentials and social security numbers)

Cyber Crime: Distributed Denial of Service (DDoS)

  • A DDoS attack utilizes thousands of compromised machine using multiple computers to attack the access to a system
  • The network resource can be a machine, a website etc
  • The end system and all the controlled bots can all be affected and the system is usually worldwide via botnets

Cyber Crime: Denial-of-Service (DoS)

  • DoS attacks flood a server with traffic, making sites unavailable

Cyber Crime: DDoS

  • A DDoS attack uses multiple computers flood the system
  • This overloads the attacked server and causes trade and monetary losses

Cyber Crime: Cybersquatting

  • This type of brand abuse is often called domain squatting
  • It occurs when a perpetrator registers a domain that resembles a business or celebrity name without permission

Cybersquatting Example

  • AAA an ecommerce company uses the URL AAA.com
  • An attacker creates a clone website using AAAstore.com - which can potential damage customer relations and confidence in the AAA brand

Cyber Crime: Love Scams

  • Suspects contact victims through social media and impersonating foreign professionals from other countries
  • Scammers feign overseas gifts to attempt extracting funds
  • Scammers then request payment or ask the victim to pay another party

7 Steps to Avoid Cyber Crime

  • Do not use USB sticks from unknown sources
  • Be aware of unexpected emails
  • Protect your cards
  • Treat your passwords like underwear
  • Watch the WiFi
  • Use social media wisely
  • Protect your website

How to Avoid Cyber Crime Tips

  • Buy secure sleeves to protect your cards
  • Have a contingency plan for your website
  • Always update passwords
  • Be wary of public Wifi
  • Always be aware of people around you
  • Use a code when protecting your passwords

The Effects of Cyber Crime

  • Cyber Crime has had 6 key effects
  • Businesses can experience disruption by DDoS and Malware attacks that interrupt Business operations
  • Security breaches may result in loss of trust from customers
  • The risk of leaking strategies to the competition
  • Malware and extorsion cost businesses money
  • Legal fees and regulatory processes carry high fees
  • Customer loyalty suffers and is hard to win back

Fake News

  • Disinformation shared via online platforms may not be entirely true
  • People can be misled into believing fake news
  • False information is commonly seen on the internet
  • Important to trace the origin of the media you consume online
  • Double check sources

Fake News Impact

  • There can be serious implications from online disinformation
  • Government and businesses lack credibility due to fake news
  • Online unity is threatened and can result in public unrest - by swayed beliefs

Identity Theft: Definition

  • Stealing personal information to commit fraud

Types of Identity Theft

  • Offline identity theft involves stealing physical records and compiling data
  • Digital encompasses compiling leaked data online

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser