1/20
naku naku, skill issue
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is Cyber
It is relating to or characteristics of the culture of computers, information, technology, and virtual reality
Cybercrime
a crime in which a computer is the object of the crime and is used as a tool to commit the offense.
Cybercriminals
uses computer technology for exploitative and malicious purposes
Republic Act #10175
Cybercrime Prevention Act of the Philippines
aims to address legal issues concerning online interactions and internet
Republic Act #10173
Data Privacy Act
protects individuals’ personal information
Common forms of Cybercrimes
Copyright, Plagiarism, Computer Addiction,
Copyright
the exclusive right given to an originator or an assignee
Copyright Infringement
the violation of a copyright holder’s exclusive rights through the unauthorized use of copyrighted work or material
Plagiarism
and act or instance of using or closely imitating the language and thoughts of another author without authorization
Computer Addiction
excessive use of the computer
Internet Threats
Hacking
Malware
Pharming
Phishing
Ransomware
Spam
Spyware
Trojan Horses
Viruses
Worms
Hacking
actions taken by someone to gain unauthorized access to a computer
Malware
Malicious software that infects your computer
viruses, worms, trojan horses, spyware, adware
general term for computer damagers
Pharming
points you to a malicious and illegitimate website by redirecting the legitimate url
Phishing
fake emails, text messages, and websites created to took like they’re from authentic companies
sent by criminals to steal info
also known as spoofing
Ransomware
It is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed
Spam
The mass distribution of unsolicited messages, advertising, or pornography to addresses that can be easily found on the Internet through things like social networking sites, company websites, and personal blogs
Spyware & Adware
These are often used by third parties to infiltrate your computer.
Trojan Horses
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.
Viruses
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of this.
Worms
It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.