暗記メーカー
ログイン
Lesson 5 Online Security and Safety
  • Someone_ 98

  • 問題数 23 • 9/22/2024

    記憶度

    完璧

    3

    覚えた

    10

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    it refers to the online security or safety of people and their information when using internet.

    Internet Safety

  • 2

    Tips to Stay Safe

    Be mindful of what you share online, Do not just accept terms and conditions;read it, Know the security features of the sns you use, keeping a private profile will prevent search engines to scan your profile, Do not share your passwords with anyone , Avoid logging into public networks/wifis, Do not talk to strangers , Never post about future vacations, Add friends you know irl, Avoid visting untrusted websites, Install and update anti-virus software on your computer, Make wifi at home private by putting a password, Avoid downloading anything form untrusted websites, Buy the software, do no use pirated ones, Do not reply or click links from suspicious links, Make online purchases from secure sites

  • 3

    Common Internet Threats

    Malware, Spam, Phising, Pharming, Internet Scams, Internet Robots, Cyberstalking, Cyberbullying, Spoofing, Hacking, Identity Theft, Inappropriate Contents, Online grooming, Blended Threats

  • 4

    malicious software, is any program or file that is harmful to a computer user.

    malware

  • 5

    malicious program designed to replicate itself and transfer from one computer to another (local networks, FDs, CDs, etc.

    virus

  • 6

    malicious program that transfers from one computer to another by any means.

    worm

  • 7

    malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

    trojan

  • 8

    program that runs in a background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging

    spyware

  • 9

    program designed to send you advertisements, mostly as pop-ups.

    adware

  • 10

    malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid

    ransomware

  • 11

    unwanted email mostly from bots or advertisers. It can be used to send malware.

    spam

  • 12

    Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a fake website and be asked to update his/her name, username, password, credit card, etc.

    phising

  • 13

    a hacker (or "pharmer") directs an internet user to a fake website instead of a legitimate one. These "spoofed" sites can capture a victim's confidential information, including usernames, passwords, and credit card data, or install malware on their computer

    pharming

  • 14

    generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few.

    Internet Scams

  • 15

    Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities

    Internet Robots

  • 16

    refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.

    Cyberstalking

  • 17

    refers to the act of tormenting, harassing, or embarrassing another person using the internet.

    Cyberbullying

  • 18

    happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money. or spread malware.

    Spoofing

  • 19

    Ten Rules of Netiquette

    Remember the Human, Adhere to the same standards online that you follow in real life, Know where you are in cyberspace, Respect other people’s time and bandwidth, Make yourself look good online, Share expert knowledge, Help keep flame wars under control, Respect pther people’s privacy, Don’t abuse your power, Be forgiving to other people’s mistake

  • 20

    It aims to address legal issues concerning online interactions and the Internet in the Philippines. It focuses on the pre-emption, prevention, and prosecution of cybercrimes such as offenses against the privacy, confidentiality, integrity, and availability of computer data and systems, computer-related offenses, and content-related offenses.

    Republic Act No. 10175, Cybercrime Prevention Act of 2012

  • 21

    It is created to penalized people who are proved to be guilty in any form of dishonesty before, during, and after an online transaction.

    Republic Act 7394, The Consumer Act

  • 22

    It is a law stating that personal information collected from users should only be used for specific purposes, such as online buying, and cannot be shared with anyone else.

    Republic Act 10173, Data Privacy Act of 2012

  • 23

    It is made to penalize people for theft, swindling or estafa which concern most online scams. Swindling happens when a seller sends a buyer a product that is of a different quality, quantity, or material from what he promised and what the buyer paid for.

    The Revised Penal Code