Podcast
Questions and Answers
Digital etiquette primarily applies to in-person interactions, with minimal relevance to online behavior.
Digital etiquette primarily applies to in-person interactions, with minimal relevance to online behavior.
False (B)
E-safety mainly concerns the measures to guard personal safety and the security of networks for netizens.
E-safety mainly concerns the measures to guard personal safety and the security of networks for netizens.
True (A)
It is acceptable to quote information without context as long as the source is cited.
It is acceptable to quote information without context as long as the source is cited.
False (B)
It's perfectly acceptable to share personal information or images of someone else online without their express consent, provided it's for a harmless purpose.
It's perfectly acceptable to share personal information or images of someone else online without their express consent, provided it's for a harmless purpose.
Responding to online trolls is a good way to correct misinformation online.
Responding to online trolls is a good way to correct misinformation online.
Using all caps in online communication is a good way to emphasize a point.
Using all caps in online communication is a good way to emphasize a point.
Double-checking facts before sharing information online is crucial to prevent spreading misinformation.
Double-checking facts before sharing information online is crucial to prevent spreading misinformation.
Sensitive personal data excludes religious beliefs and political opinions.
Sensitive personal data excludes religious beliefs and political opinions.
The Personal Data Protection Act 2010 regulates the processing of personal data in regards to commercial transactions.
The Personal Data Protection Act 2010 regulates the processing of personal data in regards to commercial transactions.
Under the PDPA, explicit consent is not required for processing sensitive personal data.
Under the PDPA, explicit consent is not required for processing sensitive personal data.
Banks and insurance companies are classified as data processors under the PDPA.
Banks and insurance companies are classified as data processors under the PDPA.
The PDPA gives individuals the right to block the processing of their data for direct marketing.
The PDPA gives individuals the right to block the processing of their data for direct marketing.
Federal and State Government data is protected by the PDPA 2010
Federal and State Government data is protected by the PDPA 2010
Sharing your pet's name on social media is a secure practice, as this information cannot be used to access your personal accounts.
Sharing your pet's name on social media is a secure practice, as this information cannot be used to access your personal accounts.
It is acceptable to connect to the internet using an unsecure Wi-Fi if you need to access your bank information.
It is acceptable to connect to the internet using an unsecure Wi-Fi if you need to access your bank information.
Phishing is a type of cybercrime where victims may receive messages from seemingly legitimate sources.
Phishing is a type of cybercrime where victims may receive messages from seemingly legitimate sources.
In a phishing attack, user credentials and banking details are not targeted by the attacker.
In a phishing attack, user credentials and banking details are not targeted by the attacker.
Cyber criminals never use chat rooms in order to connect with victims.
Cyber criminals never use chat rooms in order to connect with victims.
A key characteristic of ransomware is that it guarantees the recovery of blocked data upon payment.
A key characteristic of ransomware is that it guarantees the recovery of blocked data upon payment.
A botnet can only be used to mine cryptocurrency.
A botnet can only be used to mine cryptocurrency.
In a DDoS attack, a single computer is used to flood a server with traffic.
In a DDoS attack, a single computer is used to flood a server with traffic.
A DDoS attack aims to make a website resource unavailable.
A DDoS attack aims to make a website resource unavailable.
Cybersquatting involves registering a domain name similar to an established brand without authorization with the intent to profit from it.
Cybersquatting involves registering a domain name similar to an established brand without authorization with the intent to profit from it.
In general, cybersquatting will never result in damage to your brand's reputation.
In general, cybersquatting will never result in damage to your brand's reputation.
Love scams never occur through social media.
Love scams never occur through social media.
You can ignore free USB sticks from an unknown source, because they can not contain viruses.
You can ignore free USB sticks from an unknown source, because they can not contain viruses.
When using public Wi-Fi, it is a good idea to log onto your internet banking for added security.
When using public Wi-Fi, it is a good idea to log onto your internet banking for added security.
Don't include the year of your birth in the full date of your birth on Facebook.
Don't include the year of your birth in the full date of your birth on Facebook.
Cybersecurity measures primarily focus on the protection of physical assets, with limited emphasis on digital systems.
Cybersecurity measures primarily focus on the protection of physical assets, with limited emphasis on digital systems.
Victims of identity theft may experience psychological consequences such as stress and fear.
Victims of identity theft may experience psychological consequences such as stress and fear.
Social media accounts are always accurate.
Social media accounts are always accurate.
According to security experts, you should shred all documents thoroughly containing your name prior to throwing them away.
According to security experts, you should shred all documents thoroughly containing your name prior to throwing them away.
Using a separate password for each of your important online accounts reduces your risk if one account is compromised.
Using a separate password for each of your important online accounts reduces your risk if one account is compromised.
Fake news is often spread unintentionally.
Fake news is often spread unintentionally.
If you are sent untrue news, this is unlikely to make a story unusual.
If you are sent untrue news, this is unlikely to make a story unusual.
Always verify the validity of information received via emails and messages.
Always verify the validity of information received via emails and messages.
Cybercrime only has financial effects.
Cybercrime only has financial effects.
Cyberattacks like DDoS and malware infection may cause financial damage.
Cyberattacks like DDoS and malware infection may cause financial damage.
There is little risk if your companies pricing strategy is leaked to competitors.
There is little risk if your companies pricing strategy is leaked to competitors.
There is no need to keep a close eye on credit card and bank account activity.
There is no need to keep a close eye on credit card and bank account activity.
Flashcards
Digital Etiquette
Digital Etiquette
A standard of conduct on social media and in the virtual world.
E-access
E-access
The privilege of using electronic information and having equal, secure access.
E-literate
E-literate
Using technology appropriately, understanding online behavior's offline consequences.
E-rule
E-rule
Signup and view all the flashcards
E-safety
E-safety
Signup and view all the flashcards
Never Plagiarize
Never Plagiarize
Signup and view all the flashcards
Think Before You Post
Think Before You Post
Signup and view all the flashcards
Ignore Online Trolls
Ignore Online Trolls
Signup and view all the flashcards
Verify Before Sharing
Verify Before Sharing
Signup and view all the flashcards
Ask Permission First
Ask Permission First
Signup and view all the flashcards
Mind Your Grammar
Mind Your Grammar
Signup and view all the flashcards
Quiet Your Device
Quiet Your Device
Signup and view all the flashcards
Double Check Before Sending
Double Check Before Sending
Signup and view all the flashcards
Personal Data
Personal Data
Signup and view all the flashcards
Sensitive Personal Data
Sensitive Personal Data
Signup and view all the flashcards
Data Subject
Data Subject
Signup and view all the flashcards
PDPA (Personal Data Protection Act)
PDPA (Personal Data Protection Act)
Signup and view all the flashcards
Data User
Data User
Signup and view all the flashcards
Data Subject
Data Subject
Signup and view all the flashcards
Data Processor
Data Processor
Signup and view all the flashcards
Third Party (in Data)
Third Party (in Data)
Signup and view all the flashcards
Block Direct Marketing
Block Direct Marketing
Signup and view all the flashcards
Block Harmful Processing
Block Harmful Processing
Signup and view all the flashcards
Right to Make Corrections
Right to Make Corrections
Signup and view all the flashcards
Right to Access
Right to Access
Signup and view all the flashcards
Revoke Agreement
Revoke Agreement
Signup and view all the flashcards
Cyber Security
Cyber Security
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
DDoS Attack
DDoS Attack
Signup and view all the flashcards
Cybersquatting
Cybersquatting
Signup and view all the flashcards
Online Love Scam
Online Love Scam
Signup and view all the flashcards
Fake news
Fake news
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
Knowing How to Recognize Phishing Emails
Knowing How to Recognize Phishing Emails
Signup and view all the flashcards
Keep Personal Information Safe Online
Keep Personal Information Safe Online
Signup and view all the flashcards
Beware of Public Computers
Beware of Public Computers
Signup and view all the flashcards
Use Credit Cards Instead of Debit Cards
Use Credit Cards Instead of Debit Cards
Signup and view all the flashcards
Purchase Only From Reputable Websites
Purchase Only From Reputable Websites
Signup and view all the flashcards
Study Notes
Digital Etiquette
- Digital etiquette refers to the accepted standards of behavior on social media and in online interactions
- It aims to make the internet a safer and better environment
Key Aspects of Digital Etiquette
- E-access involves understanding the privilege of using electronic resources, includes having reliable access
- E-literacy means using technology appropriately; highlights that online behavior has significant offline repercussions
- E-rule governs communication and technology usage, including respecting ownership and authorship
- E-safety encompasses measures and practices that Netizens use to protect their personal safety and the security of their networks
Personal Data Protection Act (PDPA) Objectives
- PDPA seeks to protect personal information while enabling businesses to collect, use, or share data for legitimate reasons
- It is applicable to personal information in both electronic and non-electronic formats
- It does not apply to personal/domestic use, employee data or public agencies
- Most Malaysian businesses are considered PDPA data users - due to the frequency of handling personal data
Cyber Security
- It includes protecting systems, networks, and programs from digital attacks
- Cybersecurity threats are conducted by malicious individuals aiming to steal data and disrupt systems
Cyber Crime: Phishing
- Phishing occurs when victims receive emails or SMS from entities impersonating legitimate companies such as banks or LHDN requesting updates to internet banking details
- Clicking on links or attachments within these malicious emails leads to a fake website
- This fake website fools the victim into inputting banking details
- Culminating in the suspect transferring money out of the victim's account
Cyber Crime: Online Fraud
- Cyber criminals make connections with victims through emails, websites, chat rooms, and social media to commit online fraud
- By exploiting victims' trust, criminals deceive and manipulate them into giving up confidential information or money
- Online fraud includes scams; miracle cures; requests for advance fees for credit cards; parcel scams; shopping and auction sites fraud; mule recruitment; fake PC errors; fake check scams; identity theft; business opportunities; fake relatives in distress; foreign lottery schemes; secret shopper scams; phishing emails; prize winner scams; charity donations and love scams
Cyber Crime: Ransomware
- This malware type can block or change the information present on a computer's hard drive
- Cybercriminals request a ransom in exchange for restoring access
- It's not guaranteed that paying the ransom will restore computer access, or blocked data
Cyber Crime: Botnets
- A bot is a type of malware that enables an attacker to take control of a personal computer
- Botnets are networks of infected machines globally
- Computers are infected without owners’ awareness
- Botnets carry out sending spam, viruses, spyware alongside stealing sensitive information (banking credentials and social security numbers)
Cyber Crime: Distributed Denial of Service (DDoS)
- A DDoS attack utilizes thousands of compromised machine using multiple computers to attack the access to a system
- The network resource can be a machine, a website etc
- The end system and all the controlled bots can all be affected and the system is usually worldwide via botnets
Cyber Crime: Denial-of-Service (DoS)
- DoS attacks flood a server with traffic, making sites unavailable
Cyber Crime: DDoS
- A DDoS attack uses multiple computers flood the system
- This overloads the attacked server and causes trade and monetary losses
Cyber Crime: Cybersquatting
- This type of brand abuse is often called domain squatting
- It occurs when a perpetrator registers a domain that resembles a business or celebrity name without permission
Cybersquatting Example
- AAA an ecommerce company uses the URL AAA.com
- An attacker creates a clone website using AAAstore.com - which can potential damage customer relations and confidence in the AAA brand
Cyber Crime: Love Scams
- Suspects contact victims through social media and impersonating foreign professionals from other countries
- Scammers feign overseas gifts to attempt extracting funds
- Scammers then request payment or ask the victim to pay another party
7 Steps to Avoid Cyber Crime
- Do not use USB sticks from unknown sources
- Be aware of unexpected emails
- Protect your cards
- Treat your passwords like underwear
- Watch the WiFi
- Use social media wisely
- Protect your website
How to Avoid Cyber Crime Tips
- Buy secure sleeves to protect your cards
- Have a contingency plan for your website
- Always update passwords
- Be wary of public Wifi
- Always be aware of people around you
- Use a code when protecting your passwords
The Effects of Cyber Crime
- Cyber Crime has had 6 key effects
- Businesses can experience disruption by DDoS and Malware attacks that interrupt Business operations
- Security breaches may result in loss of trust from customers
- The risk of leaking strategies to the competition
- Malware and extorsion cost businesses money
- Legal fees and regulatory processes carry high fees
- Customer loyalty suffers and is hard to win back
Fake News
- Disinformation shared via online platforms may not be entirely true
- People can be misled into believing fake news
- False information is commonly seen on the internet
- Important to trace the origin of the media you consume online
- Double check sources
Fake News Impact
- There can be serious implications from online disinformation
- Government and businesses lack credibility due to fake news
- Online unity is threatened and can result in public unrest - by swayed beliefs
Identity Theft: Definition
- Stealing personal information to commit fraud
Types of Identity Theft
- Offline identity theft involves stealing physical records and compiling data
- Digital encompasses compiling leaked data online
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.