1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Online Safety
sometimes regarded as e-safety or cyber safety, refers to the maximization of internet users’ knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of the internet
Online Security
refers to the rules that are followed and the actions that are taken to make sure that online users and data privacy aren’t compromised by cyber-criminals
Online Crimes
are illegal activities that use the internet, computers, smartphones, or other electronic devices to commit a crime
Cyberbullying
the use of technology to harass, threaten, embarrass, or target another person
Republic Act 10627
also known as the Anti Bullying Act of 2013 ; defines bullying as the repeated use of words, actions, or online messages by one or more students that cause physical or emotional harm, damage property, create an unsafe school environment, violate rights, or disrupt learning
Flaming
is an online fight using electronic messages with angry and vulgar languages
Harassment
is the act of repeatedly sending nasty, mean, and insulting messages
Denigration
is sending or posting gossip or rumors about a person to damage his or her reputation or friendship
Impersonation
is when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person’s reputation or friendships
Outing
is the act of sharing someone’s secrets or embarrassing information or images online
Trickery
is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online
Exclusion
is when one is intentionally or cruelly excluded from an online group
Cyberstalking
is the act of repeated, intense harassment and denigration that includes threats or significant fear
Identity Theft
also known as identity fraud ; all types of crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain
Phishing
the fraudulent practice of sending emails purporitng to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers
Plaigarism
is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it in your own work without full acknowledgement
Copyright Infringement
occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner
Fair Use
permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
Malwares
this is the shortened form of malicious software ; some examples are computer viruses, worms, and dishonest spyware
Computer Worms
these are programs that can replicate themselves from one computer to another in great volume and can spread themselves rapidly without human intervention
Spam
generally are harmless ; they are usually junk mail sent in your email, but there are times that they can contain links that put you at risk ; these links may be connected to malwares that intend to steal your data
Browser Selection
be sure that the browser you are using is secured
Email Security
try to establish a multilayered and comprehensive email security because this will significantly increase protection from threats associated with email use
Multifactor Authentication
this is a process by which computer access is controlled by requiring several authentication mechanisms
Firewalls
are the first line of defense among networks ; these are security tools that prevent unauthorized access to a network
Ethics
the analysis of the role that the internet plays in what philosophers call the development of good life–the kind of life that we want for ourselves, for society overall, the kinds of people we want to be
Internet Ethics
may deal with issues on privacy, big data, net neutrality, and access to the internet