Lesson - Ethics on the internet

0.0(0)
studied byStudied by 10 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

11th

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

ONLINE SAFETY

  • e-safety or cyber safety, refers to the maximization of the internet user’s knowledge and awareness of safety protocols, online crimes, and security risks in the private property and information which are connected to the use of internet.

2
New cards

ONLINE SECURITY

  • refers to the rules that are followed and the actions that are taken to make sure that online users and data privacy aren’t compromised by cybercriminals (Mocan, 2019)

3
New cards

ONLINE CRIMES

  • violations that inflict harm to other people by internet users

4
New cards

1.CYBERBULLYING
2.IDENTITY THEFT
3.PHISHING
4.PLAGIARISM AND COPYRIGHT INFRINGEMENT

  • online crimes are in the following forms

5
New cards

CYBERBULLYING

  • republic act of 10627 or the anti-cullying act of 2013 defines bullying as “any severe or repeated use by one or more students of a written, verbal, or electronic expression, or a physical act of gesture, or any combination there of, directed at another student that has the effect if actually causing or placing the latter in reasonable fear of physical or emotional harm or damaged to his property”

6
New cards

FLAMING

  • is an online fight using electronic messages with angry and vulgar language

7
New cards

HARASSMENT

  • is the act of repeatedly sending nasty, mean, and insulting messages

8
New cards

DENIGRATION

  • is sending or posting gossip or rumors about a person to damage his or her reputation or friendships

9
New cards

IMPERSONATION

  • is when someone is pretending to be someone else to damage that person’s reputation or friendships

10
New cards

OUTING

  • is the act of sharing someone’s secrets or embarrassing information or images online

11
New cards

TRICKERY

  • is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information an the, shares the information online

12
New cards

EXCLUSION

  • is when one is intentionally or cruelly excluded form an online group

13
New cards

CYBERSTALKING

  • is the act of repeated, intense, harassment and denigration that includes threats or creates significant fear.

14
New cards

1.INFORM A TRUSTED PERSON
2.TRY NOT TO INTISGATE
3.BLOCK CONNECTION WITH THE BULLY
4.ALWAYS BE AWARE
5.LOGOUT FROM ONLINE ACCOUNTS
6.BE NOT A CYBERBULLY

  • when cyberbullying is observed, it is best to do the following

15
New cards

IDENTITY THEFT

  • US department of justice defines “identity theft” and :identity fraud” as “all types of crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain

16
New cards

1.GOOD PASSWORD
2.REPORT IDENTITY THEFT

  • practical tips that should be observed to be protected from online identity theft and fraud

17
New cards

PHISHING

  • the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers (Oxford Lexico)

18
New cards

1.BE SCRUTINIZING OF THE WEBSITE THAT YOU ARE LOGGED IN
2.BE CAUTIOUS ON GIVING INFORMATION ONLINE
3.BE ALERT WITH LINKS SENT VIA MESSAGES AND EMAILS

  • these are ways to be secured from phishing attacks. one might consider the following

19
New cards

PLAGIARISM AND COPYRIGHT INFRINGEMENT

  • is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgement (University of Oxford)

  • occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner (US Office of copyright)

  • the best way that you can avoid these crimes is to be respectful of other’s intellectual properties

20
New cards

COMMON INTERNET SECURITY THREATS

  • many threats are present on the internet. Internet security threats are danger that are associated with using the internet. there are multitude of concepts related to internet threats.

21
New cards

1.MALWARES
2.COMPUTER WORMS
3.SPAMS
4.PHISHING

  • most common forms identified by McAfee Corporation

22
New cards

MALWARES

  • this is the shortened form of malicious software. some of the examples of malwares are computer viruses, worms, and dishonest spyware

23
New cards

COMPUTER WORMS

  • these are programs that can replicate themselves from one computer to another in great volume and can spread themselves rapidly without human intervention

24
New cards

SPAM

  • generally, unwanted messages are harmless. they are usually junk mails sent in your email, but there are times that they contain links that put you at risk. these links may be connected to malwares that intent to steal your data

25
New cards

PHISHING

  • these scams are created by cybercriminals who intend to ask for private or elicit information from their victims

26
New cards

INTERNET SECURITY STRATEGIES

  • there is no one way to secure any network or computer connected to the internet. It is best, therefore, that internet security must require product and technology combinations to give utmost security for the network and the users.

27
New cards

1.BROWSER SELECTION
2.EMAIL SECURITY
3.MULTIFACTOR AUTHENTICATION (MFA)
4.FIREWALLLS

  • internet security strategies comes in the following forms