GEE 002 Midterm Reviewer

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

Spam

Unwanted, unsolicited digital communication, often sent in bulk, wasting time and resources.

2
New cards

Advance-fee scam

A scam where a sender offers a large reward in exchange for an upfront cash payment, but the reward never exists.

3
New cards

Phishing

Cyber Attack where emails trick people into giving up sensitive information by impersonating legitimate senders.

4
New cards

Malspam

Malware spread through spam emails, tricking users into downloading malicious software or opening infected attachments.

5
New cards

Social engineering

Manipulation of individuals to perform actions or disclose confidential information.

6
New cards

Email spoofing

Sending fraudulent emails that appear to come from a trusted source, used in phishing attacks.

7
New cards

Botnet

A network of infected devices controlled by cybercriminals, used for malicious activities like spam or DDoS attacks.

8
New cards

Censorship

Suppression of speech or information deemed objectionable by authorities.

9
New cards

Freedom of speech

The right to express opinions or ideas without government interference.

10
New cards

Cyber Libel

Defamation published on the internet, leading to legal action.

11
New cards

Social media censorship

Restricting or blocking content on social media platforms, often for political reasons.

12
New cards

MilkTeaAlliance

Political activism movement on Twitter uniting Hong Kong, Taiwan, and Thailand against authoritarianism.

13
New cards

Internet censorship

Restricting or controlling access to online information or communication.

14
New cards

Internet Service Provider (ISP)

A company that provides internet access and manages data transmission.

15
New cards

Political participation

Citizen involvement in activities that influence government decisions, such as voting or activism.

16
New cards

Mobile Apps

Software applications for mobile devices that extend smartphone functionality.

17
New cards

Social network theory

Framework for understanding interactions and influence within social media networks.

18
New cards

Honeypot

Security tool set up to attract cybercriminals and monitor attacks.

19
New cards

Intrusion Detection and Prevention Systems (IDPS)

Systems designed to detect and prevent unauthorized access to networks.

20
New cards

PKI (Public Key Infrastructure)

Framework using cryptographic keys for secure communication over the internet.

21
New cards

Steganography

Hiding secret messages within other content, like digital images, to avoid detection.

22
New cards

Digital signature

Cryptographic method to verify the authenticity and integrity of digital messages or documents.

23
New cards

DDoS (Distributed Denial of Service)

Attack where multiple systems flood a target with traffic, causing it to become unavailable.

24
New cards

Hypertext Transfer Protocol (HTTP)

Protocol for transferring web pages and resources over the internet.

25
New cards

Social media

Online platforms for creating, sharing, and engaging with content, playing a role in political activism.

26
New cards

Apps culture

The rise of mobile applications that offer entertainment, productivity, and social interaction services.

27
New cards

E-commerce

Buying and selling of goods or services online through digital platforms.

28
New cards

Inappropriate Content

Content on the internet that is age or developmentally unsuitable, potentially damaging to children.

29
New cards

Internet Addiction

Excessive and uncontrollable use of the internet, affecting physical and mental well-being.

30
New cards

Intellectual Property (IP)

Creations of the mind such as inventions, literary works, designs, and symbols used in commerce.

31
New cards

Patent

Exclusive right granted for a new, inventive, and useful product or process.

32
New cards

Utility Model

An exclusive right granted for an invention without needing an inventive step.

33
New cards

Industrial Design

Design related to the shape, surface, or patterns of an article, or color patterns.

34
New cards

Trademark

Word, sign, or logo that distinguishes a business’s goods or services.

35
New cards

Copyright

Protection for literary, artistic works, music, films, and computer programs.

36
New cards

Confidentiality Agreement

A legal document ensuring that employees or partners keep specific information private.

37
New cards

Non-Disclosure Agreement (NDA)

A contract preventing the sharing of confidential information.

38
New cards

Licensing Agreement

A contract allowing third parties to use a company’s product, branding, or services.

39
New cards

Fair Use

The right to use copyrighted material for transformative purposes such as criticism, commentary, or parody.

40
New cards

Parody

A work that humorously imitates another work, often used under fair use.

41
New cards

Creative Commons (CC)

Non-profit organization providing free licenses for creators to allow certain uses of their work under specific conditions.

42
New cards

CC License

A license that defines how the public can use a creator’s work, often allowing educational use without seeking permission.

43
New cards

Technostress

Stress caused by the overuse or dependence on technology, such as the internet or computers.

44
New cards

Self-harm Encouraging Sites

Online platforms promoting harmful behaviors like eating disorders or self-injury.

45
New cards

Privacy

A fundamental right essential to autonomy and the protection of human dignity, enabling individuals to establish boundaries and manage access to their personal life, information, and communications.

46
New cards

Harms of Privacy

Includes covering up illegal or immoral activities, burdening the nuclear family, and ignoring marginalized individuals.

47
New cards

Benefits of Privacy

Promotes individual growth, freedom of expression, and the development of intimate, trusting relationships.

48
New cards

Natural Right to Privacy

The idea that privacy rights stem from property rights, individual autonomy, or moral agency, with various philosophers offering different views on privacy.

49
New cards

Information Disclosure

The unintentional exposure of sensitive information on websites, such as user data, business information, and technical details.

50
New cards

Examples of Information Disclosure

Includes revealing hidden directories, providing access to source code, exposing database details, or hard-coding sensitive information in source code.

51
New cards

Data Mining

The process of finding patterns, anomalies, and correlations in large data sets to predict outcomes and create actionable insights.

52
New cards

Hacking

Illegal access to a computer system without the owner’s consent or knowledge.

53
New cards

Malware

Malicious software, including viruses and spyware.

54
New cards

Viruses

Programs that replicate themselves to damage or alter files on a computer.

55
New cards

Spyware

Software that secretly collects user data, including login details.

56
New cards

Identity Theft

Unauthorized access to personal information to commit fraud.

57
New cards

Phishing

Fraudulent messages designed to lure victims to fake websites to steal personal information.

58
New cards

Pharming

Rerouting internet users to fake websites through malware to steal personal details.

59
New cards

Keylogging

Malware that secretly records keystrokes to capture personal data.

60
New cards

Sniffing

Stealing data from unsecured public Wi-Fi networks.

61
New cards

Cyberbullying

Online harassment, including stalking, sexual harassment, and doxxing.

62
New cards

Crypto jacking

Hackers using a device to mine cryptocurrency without the user’s consent.

63
New cards

Cyber extortion

Using threats or ransomware to demand money from victims.

64
New cards

Cyberespionage

State-sponsored hacking to steal intelligence or attack critical systems.

65
New cards

Dark Web

Part of the internet not indexed by search engines, often used for illegal activities.

66
New cards

Cybercrime

Illegal activities carried out using technology.

67
New cards

Email

The most prevalent delivery method for cybercrime.

68
New cards

Public Wi-Fi

Unsecured networks that can be exploited by hackers unless protected by a VPN.

69
New cards

Cybercrime Prevention

Practices like avoiding suspicious emails, using strong passwords, and securing personal data.

70
New cards

Republic Act No. 10175

Philippine law that defines and penalizes cybercrimes.

71
New cards

Illegal Access

Unauthorized access to any part of a computer system.

72
New cards

Illegal Interception

Unlawful interception of non-public data transmissions.

73
New cards

Data Interference

Intentional damage, deletion, or alteration of computer data.

74
New cards

System Interference

Interfering with the functioning of a computer system or network.

75
New cards

Misuse of Devices

The unlawful use or distribution of tools for committing cybercrimes.

76
New cards