記憶度
3問
10問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
it refers to the online security or safety of people and their information when using internet.
Internet Safety
2
Tips to Stay Safe
Be mindful of what you share online, Do not just accept terms and conditions;read it, Know the security features of the sns you use, keeping a private profile will prevent search engines to scan your profile, Do not share your passwords with anyone , Avoid logging into public networks/wifis, Do not talk to strangers , Never post about future vacations, Add friends you know irl, Avoid visting untrusted websites, Install and update anti-virus software on your computer, Make wifi at home private by putting a password, Avoid downloading anything form untrusted websites, Buy the software, do no use pirated ones, Do not reply or click links from suspicious links, Make online purchases from secure sites
3
Common Internet Threats
Malware, Spam, Phising, Pharming, Internet Scams, Internet Robots, Cyberstalking, Cyberbullying, Spoofing, Hacking, Identity Theft, Inappropriate Contents, Online grooming, Blended Threats
4
malicious software, is any program or file that is harmful to a computer user.
malware
5
malicious program designed to replicate itself and transfer from one computer to another (local networks, FDs, CDs, etc.
virus
6
malicious program that transfers from one computer to another by any means.
worm
7
malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
trojan
8
program that runs in a background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging
spyware
9
program designed to send you advertisements, mostly as pop-ups.
adware
10
malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
ransomware
11
unwanted email mostly from bots or advertisers. It can be used to send malware.
spam
12
Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a fake website and be asked to update his/her name, username, password, credit card, etc.
phising
13
a hacker (or "pharmer") directs an internet user to a fake website instead of a legitimate one. These "spoofed" sites can capture a victim's confidential information, including usernames, passwords, and credit card data, or install malware on their computer
pharming
14
generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few.
Internet Scams
15
Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities
Internet Robots
16
refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
Cyberstalking
17
refers to the act of tormenting, harassing, or embarrassing another person using the internet.
Cyberbullying
18
happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money. or spread malware.
Spoofing
19
Ten Rules of Netiquette
Remember the Human, Adhere to the same standards online that you follow in real life, Know where you are in cyberspace, Respect other people’s time and bandwidth, Make yourself look good online, Share expert knowledge, Help keep flame wars under control, Respect pther people’s privacy, Don’t abuse your power, Be forgiving to other people’s mistake
20
It aims to address legal issues concerning online interactions and the Internet in the Philippines. It focuses on the pre-emption, prevention, and prosecution of cybercrimes such as offenses against the privacy, confidentiality, integrity, and availability of computer data and systems, computer-related offenses, and content-related offenses.
Republic Act No. 10175, Cybercrime Prevention Act of 2012
21
It is created to penalized people who are proved to be guilty in any form of dishonesty before, during, and after an online transaction.
Republic Act 7394, The Consumer Act
22
It is a law stating that personal information collected from users should only be used for specific purposes, such as online buying, and cannot be shared with anyone else.
Republic Act 10173, Data Privacy Act of 2012
23
It is made to penalize people for theft, swindling or estafa which concern most online scams. Swindling happens when a seller sends a buyer a product that is of a different quality, quantity, or material from what he promised and what the buyer paid for.
The Revised Penal Code