1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Online safety
appropriate approach, awareness, & education to personal safety when using digital technology
Safety
action to protect yourself or personal info
Focus
protects your device and data from unauthorized access
Goal
prevents hacking & data braches
Tool used
firewall, antivirus software, encryption,
secure passwords
Firewall
enabled shield from threats that may
steal your personal information
Encryption
coded; hides info in form of code
to not be easily stolen
Decryption
translated letters (code➝letters)
Netiquette (Network Etiquette)
proper manner in online environment
Internet threats
Malware, Spam, Phishing
Malware
malicious software, installed
program harmful to computer user
Spam
unwanted emails mostly from
advertisers (10+)
Phishing
aims to acquire sensitive personal info (password, credit card info, etc.)
Virus
- replicate
- has a host program/controller
- will not activate without action
ILOVEYOU Virus
- aims to get WIFI password
- can take down computer
Onel de Guzman
Made the ILOVEYOU Virus
Worm
- transfer; duplicates files
- ex. Go Keyboard
Trojan
- disguise from online games
- cannot be detected by antivirus
Trojan Horse
Original term of Trojan, comes from the greek
Spyware
- surveillance
- hard to detect
Keyloggers
- keystrokes
- can detect what is being typed on keyboard
- invented bcs of DOTA2 (around 2013-2015)
Adware (advertisement malware)
advertising
Fidel V. Ramos
Which president signed the Intellectual Property RA No. 8293 (1997)
Copyright
for literary, artistic, & original works
- legal & liscensed
Plagiarism
non-legal; about morality
Patents
invention & utility models
- innovation from own idea or discoveries
Trademarks & service marks
brands, logo, trade names
Industrial design
unique product design
Trade secrets
confidential business info where
business is known for/thrives from