1/66
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
INTERNET
Profoundly impacted virtually all aspects of modern life
Its openness, accessibility, and ability to connect people and devices globally have transformed the way we live and interact in the digital age
Is one of the most dangerous and riskiest places, especially if you do not know what you are doing
TYPES OF INTERNET
surface or open web
deep web
dark web
SURFACE OR OPEN WEB
Indexable and searchable content
Can interact with other people in this layer
Normal browser
DEEP WEB
Non-indexed and non-searchable content
Time that you slowly utilize a different set of way to access the web
Sense of heightened security
Balance of legal and illegal contents
DARK WEB
Content accessible via specific software or hardware
More secured security
Level of precaution-ness
More on the side of illegal side
This layer is not something that is explored by security agencies, military, etc.
INTERNET SECURITY
Branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems
More on the side of the hardware
Your web browser will be able to detect potential dangers
INTERNET SAFETY (E-SAFETY)
More on the person on how you will protect your internet privacy
Includes knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet together with existing application technological device
TIPS TO STAY SAFE ONLINE
be aware of fake websites
check for website safety
choose strong passwords
avoid spyware
limit what you share online
BE AWARE OF FAKE WEBSITES
Checking if the website is identical to the website you visited before
You may check the URL to know when the website is legitimate or not
You may utilize the IP address rather than URL
CHECK FOR WEBSITE SAFETY
Look for green text, https, and ensure there is no GPS lock
CHOOSE STRONG PASSWORDS
Recommended length should be more than 8 characters
Uppercase, lowercase, numbers, symbols
AVOID SPYWARE
Type of malware that can hijack your peripheral and can obtain information from you with you device
Can install anti-spyware
WHAT DO SPYWARES ATTACK?
camera, microphone, keyboard (sometimes)
INTERNET THREATS
malware
spamming
phishing
framing
MALWARE
Code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action in data, hosts, or networks
Short for malicious software
Can range from spyware to ransomware
TYPES OF MALWARE
ransomware
spyware
adware
worms
Trojans
botnets
RANSOMWARE
pay for a particular amount in order for you to unlock your files
blackmails you
SPYWARE
steals your data
ADWARE
spams you with ads
WORMS
spread across computers
TROJANS
sneak malware into your PC
BOTNETS
turn your PC into a zombie
SPAMMING
Use of electronic messaging systems like w-mail and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately
Can take up storage, unless you delete the spams
PHISHING
Identity theft that generally targets users with the aim to con them into revealing their personal and confidential information
FRAMING
Complicated form of phishing
A user can fall victim to phishing even on clicking on an authentic link if the website’s domain name system (DNS) has been hijacked by a hacker
ONLINE SAFETY ISSUES
cyberstalking (threats)
hacking
cyberbullying (trolling)
sextortion
obscene or offensive content
fake news
online predation
CYBERSTALKING (THREATS)
The use of electronic means (internet email, social media) to harass, intimidate, or threaten someone
HACKING
Unauthorized access to a computer system or network to gain control, steal data, or disrupt operations
CYBERBULLYING (TROLLING)
Using digital platforms to bully someone by posting harmful or offensive content, sending abusive message, or excluding them from online communities
SEXTORTION
Act of blackmailing someone by threatening to publicly share intimate or explicit images or videos of them
OBSCENE OR OFFENSIVE CONTENT
Material that is deemed to be morally repugnant, indecent, or offensive to a significant portion of the population
FAKE NEWS
Fabricated or misleading information presented as news, with the intention to deceive or manipulate audiences
ONLINE PREDATION
Use of the internet to target and exploit vulnerable individuals often children, for sexual purposes
MAJOR CONCERNS IN ONLINE ETHICS
data privacy act
issues of libel
protection of private information
limits of presumed freedom of expression
ISSUES OF LIBEL
Used to defame other people
No reference or means for us to verify
ORAL DEFAMATION
slander
LINITS OF PRESUMED FREEDOM OF EXPRESSION
Not everything that we post online is acceptable or useful to most people
You are free to express yourself, however when someone or something is involved then you are violating it
TYPES OF INTELLECTUAL PROPERTY RIGHTS
copyright
patent
trademark
trade secret
COPYRIGHT
Gives the creator exclusive rights to reproduce, distribute adapt, display, and perform their work
PATENT
Grants exclusive rights to the inventor of a new, useful, and non-obvious invention
TRADEMARK
Protects words, symbols, designs, or phrases that identify and distinguish the source of goods or services
TRADE SECRET
Gives a business a competitive advantage and is protected from unauthorized disclosure
More on what’s happening inside the company
E.g., formula of Coke
COPYRIGHT LAW
Right(s) to your work, and anyone who uses it without your consent is punishable by law
FAIR USE
Intellectual property may be used without consent as long as it i used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education
DIGITAL CITIZENSHIP
Being a good citizen
under being a good citizen is…
I’m inclusive
I’m informed
I’m engaged
I’m balanced
I’m alert
I’M INCLUSIVE
I engage with others online with respect and integrity
I’M INFORMED
I evaluate the accuracy, perspective, and validity of online information
I’M ENGAGED
I use technology for civic engagement and to be a force for good
I’M BALANCED
I prioritize my time and activities online and offline
I’M ALERT
I know how to be safe online and create safe spaces for others
9 ELEMENTS OF DIGITAL CITIZENSHIP
digital access
digital law
digital security
digital communication
digital literacy
digital right and responsibilities
digital etiquette
digital commerce
digital health and wellness
DIGITAL ACCESS
Full electronic participation in society
DIGITAL LAW
Electronic responsibility for actions and deeds
DIGITAL SECURITY
Electronic precautions to guarantee safety
DIGITAL COMMUNICATION
Electronic exchange of information
DIGITAL LITERACY
Teaching and learning about technology and its use
DIGITAL RIGHT AND RESPONSIBILITIES
Those freedoms extended to everyone in a digital world
DIGITAL ETIQUETTE
Electronic standards of conduct or procedure
DIGITAL COMMERCE
Electronic buying and selling of goods
DIGITAL HEALTH ANF WELLNESS
Physical and psychological well-being in a digital world
3S FRAMEWORK
SAFE
SAVVY
SOCIAL
SAFE
digital access
digital law
digital security
SAVVY
digital communication
digital literacy
digital right and responsibilities
SOCIAL
digital etiquette
digital commerce
digital health and wellness
NETIQUETTE
Blend of internet and etiquette
Set of rules and guidelines for polite and respectful behavior inline
Essentially the digital equivalent of good manners, helping us create a positive and inclusive online environment for everyone
NETIQUETTE OF A DIGITAL CITIZEN
Be respectful
Avoid foul language or informal way of speaking
Think before you click
Always consider the privacy of yourself and others
Use the correct context when communicating with others
Be careful with your security collaborate and communicate with other people
Avoid spam