1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Online Safety
appropriate approach, awareness, & education to personal safety when using digital technology
Safety
action to protect yourself or personal info
Focus
protects your device and data from
unauthorized access
Goal
prevents hacking & data braches
Tool used
firewall, antivirus software, encryption,
secure passwords
Firewall
enabled shield from threats that may
steal your personal information
Encryption
coded; hides info in form of code
to not be easily stolen
Decryption
translated letters (code➝letters)
Netiquette
proper manner in online environment
Malware
- malicious software, installed
program harmful to computer user
Spam
- unwanted emails mostly from
advertisers (10+)
Phishing
aims to acquire sensitive
personal info (password, credit card info, etc.)
Virus
replicate
- has a host program/controller
- will not activate without action
ILOVEYOU Virus
aims to get WIFI password
can take down computer
Onel de Guzman
made ILOVE YOU VIRUS
Worm
transfer; duplicates files
- ex. Go Keyboard
- to remove worm, delete the application itself
Trojan
disguise from online games
- term came from ‘Trojan Horse’ from Greek
- cannot be detected by antivirus
Spyware
Surveillance
hard to detect
Keyloggers
keystrokes
- can detect what is being typed on keyboard
- invented bcs of DOTA2 (around 2013-2015)
Adware
advertising
Intellectual Property RA No. 8293 (1997)
signed by former president Fidel V. Ramos
Copyright
for literary, artistic, & original works
legal and licensed
Plagiarism
non-legal; about morality
Patents
invention & utility models
- innovation from own idea or discoveries
Trademarks Service Marks
- brands, logo, trade names
Industrial Design
unique product design
Trade Secrets
confidential business info where
business is known for/thrives from