1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Spam
Unwanted, unsolicited digital communication, often sent in bulk, wasting time and resources.
Advance-fee scam
A scam where a sender offers a large reward in exchange for an upfront cash payment, but the reward never exists.
Phishing
Cyber Attack where emails trick people into giving up sensitive information by impersonating legitimate senders.
Malspam
Malware spread through spam emails, tricking users into downloading malicious software or opening infected attachments.
Social engineering
Manipulation of individuals to perform actions or disclose confidential information.
Email spoofing
Sending fraudulent emails that appear to come from a trusted source, used in phishing attacks.
Botnet
A network of infected devices controlled by cybercriminals, used for malicious activities like spam or DDoS attacks.
Censorship
Suppression of speech or information deemed objectionable by authorities.
Freedom of speech
The right to express opinions or ideas without government interference.
Cyber Libel
Defamation published on the internet, leading to legal action.
Social media censorship
Restricting or blocking content on social media platforms, often for political reasons.
Political activism movement on Twitter uniting Hong Kong, Taiwan, and Thailand against authoritarianism.
Internet censorship
Restricting or controlling access to online information or communication.
Internet Service Provider (ISP)
A company that provides internet access and manages data transmission.
Political participation
Citizen involvement in activities that influence government decisions, such as voting or activism.
Mobile Apps
Software applications for mobile devices that extend smartphone functionality.
Social network theory
Framework for understanding interactions and influence within social media networks.
Honeypot
Security tool set up to attract cybercriminals and monitor attacks.
Intrusion Detection and Prevention Systems (IDPS)
Systems designed to detect and prevent unauthorized access to networks.
PKI (Public Key Infrastructure)
Framework using cryptographic keys for secure communication over the internet.
Steganography
Hiding secret messages within other content, like digital images, to avoid detection.
Digital signature
Cryptographic method to verify the authenticity and integrity of digital messages or documents.
DDoS (Distributed Denial of Service)
Attack where multiple systems flood a target with traffic, causing it to become unavailable.
Hypertext Transfer Protocol (HTTP)
Protocol for transferring web pages and resources over the internet.
Social media
Online platforms for creating, sharing, and engaging with content, playing a role in political activism.
Apps culture
The rise of mobile applications that offer entertainment, productivity, and social interaction services.
E-commerce
Buying and selling of goods or services online through digital platforms.
Inappropriate Content
Content on the internet that is age or developmentally unsuitable, potentially damaging to children.
Internet Addiction
Excessive and uncontrollable use of the internet, affecting physical and mental well-being.
Intellectual Property (IP)
Creations of the mind such as inventions, literary works, designs, and symbols used in commerce.
Patent
Exclusive right granted for a new, inventive, and useful product or process.
Utility Model
An exclusive right granted for an invention without needing an inventive step.
Industrial Design
Design related to the shape, surface, or patterns of an article, or color patterns.
Trademark
Word, sign, or logo that distinguishes a business’s goods or services.
Copyright
Protection for literary, artistic works, music, films, and computer programs.
Confidentiality Agreement
A legal document ensuring that employees or partners keep specific information private.
Non-Disclosure Agreement (NDA)
A contract preventing the sharing of confidential information.
Licensing Agreement
A contract allowing third parties to use a company’s product, branding, or services.
Fair Use
The right to use copyrighted material for transformative purposes such as criticism, commentary, or parody.
Parody
A work that humorously imitates another work, often used under fair use.
Creative Commons (CC)
Non-profit organization providing free licenses for creators to allow certain uses of their work under specific conditions.
CC License
A license that defines how the public can use a creator’s work, often allowing educational use without seeking permission.
Technostress
Stress caused by the overuse or dependence on technology, such as the internet or computers.
Self-harm Encouraging Sites
Online platforms promoting harmful behaviors like eating disorders or self-injury.
Privacy
A fundamental right essential to autonomy and the protection of human dignity, enabling individuals to establish boundaries and manage access to their personal life, information, and communications.
Harms of Privacy
Includes covering up illegal or immoral activities, burdening the nuclear family, and ignoring marginalized individuals.
Benefits of Privacy
Promotes individual growth, freedom of expression, and the development of intimate, trusting relationships.
Natural Right to Privacy
The idea that privacy rights stem from property rights, individual autonomy, or moral agency, with various philosophers offering different views on privacy.
Information Disclosure
The unintentional exposure of sensitive information on websites, such as user data, business information, and technical details.
Examples of Information Disclosure
Includes revealing hidden directories, providing access to source code, exposing database details, or hard-coding sensitive information in source code.
Data Mining
The process of finding patterns, anomalies, and correlations in large data sets to predict outcomes and create actionable insights.
Hacking
Illegal access to a computer system without the owner’s consent or knowledge.
Malware
Malicious software, including viruses and spyware.
Viruses
Programs that replicate themselves to damage or alter files on a computer.
Spyware
Software that secretly collects user data, including login details.
Identity Theft
Unauthorized access to personal information to commit fraud.
Phishing
Fraudulent messages designed to lure victims to fake websites to steal personal information.
Pharming
Rerouting internet users to fake websites through malware to steal personal details.
Keylogging
Malware that secretly records keystrokes to capture personal data.
Sniffing
Stealing data from unsecured public Wi-Fi networks.
Cyberbullying
Online harassment, including stalking, sexual harassment, and doxxing.
Crypto jacking
Hackers using a device to mine cryptocurrency without the user’s consent.
Cyber extortion
Using threats or ransomware to demand money from victims.
Cyberespionage
State-sponsored hacking to steal intelligence or attack critical systems.
Dark Web
Part of the internet not indexed by search engines, often used for illegal activities.
Cybercrime
Illegal activities carried out using technology.
The most prevalent delivery method for cybercrime.
Public Wi-Fi
Unsecured networks that can be exploited by hackers unless protected by a VPN.
Cybercrime Prevention
Practices like avoiding suspicious emails, using strong passwords, and securing personal data.
Republic Act No. 10175
Philippine law that defines and penalizes cybercrimes.
Illegal Access
Unauthorized access to any part of a computer system.
Illegal Interception
Unlawful interception of non-public data transmissions.
Data Interference
Intentional damage, deletion, or alteration of computer data.
System Interference
Interfering with the functioning of a computer system or network.
Misuse of Devices
The unlawful use or distribution of tools for committing cybercrimes.