1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ONLINE SAFETY
it refers to the maximization of internet user’s
knowledge and awareness of safety protocols,
online crimes and security risks.
ONLINE SECURITY
“Rules that are followed and the actions that
are taken to make sure that online users and
data privacy aren’t compromised by
cybercriminals”
Cyberbullying
“The Anti-Bullying Act of 2013”
✰ R.A. 10627
- any severe or repeated use by one or more
students of a written, verbal or electronic
expression
Flaming
Online fights using vulgar and aggressive language. Example: A heated argument erupts in a group chat, with one person hurling insults.
Harassment
Repeatedly sending mean and insulting messages. Example: A student keeps calling another names and making fun of their appearance.
-andrei
Denigration
Spreading false rumors or gossip to damage someone’s reputation. Example: A bully posts online that a classmate cheated on a test to ruin their credibility.
Impersonation
Pretending to be someone else to cause trouble. Example: A person creates a fake account of a classmate and posts rude comments.
Outing
Sharing someone’s private secrets, messages, or embarrassing images. Example: Posting a screenshot of a private chat without the person's consent.
Trickery
Manipulating someone into revealing secrets and then exposing them. Example: A person gains someone’s trust, then leaks their private information online.
Exclusion
Intentionally leaving someone out of an online group or activity. Example: A group excludes a classmate from a game and mocks them for wanting to join.
Cyberstalking
Repeated harassment that includes threats or instills fear. Example: A bully follows every online activity of their victim and sends threats daily.
How to avoid CYBERBULLYING
1. Inform a trusted person
2. Try not to instigate
3. Block connection with the bully
4. Always be aware
5. Logout from online accounts
6. Be not a cyberbully
What is identity theft?
involves crimes where someone wrongfully obtains and uses another person's personal data for fraud or deception, typically for financial gain.
Shoulder Surfing
criminal spies on you in public while you enter sensitive data like your phone PIN or credit card number. They may also listen to private conversations to gather personal details.
Improper Disposal of Pre-Approved Credit Cards
Criminals retrieve and activate improperly discarded pre-approved credit cards, using them fraudulently.
Responding to Spam Emails
Scammers trick you into providing personal information through fake emails, which they later use to steal your identity or hack your accounts.
Use a Good Password (Follow the SURP Test)
Strong: Long with random characters
Unique: Different from other passwords
Recent: Regularly updated
Practical: Easy for you to remember
What is phishing?
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.
What is Plagiarism?
is the act of using someone else’s ideas or work without proper acknowledgment. It can be intentional, reckless, or unintentional and applies to all published and unpublished materials, whether printed or electronic. Intentional or reckless plagiarism is considered a disciplinary offense.
What is Copyright Infringement?
occurs when a copyrighted work is used without permission, including reproduction, distribution, or performance.
Internet Security Strategies
to secure any network or computer you must
follow these steps...
● Browser Selection
● Email Security
● Multi Factor Authentication
● Firewalls
What is Internet Ethics?
Ethics involves moral principles guiding behavior. The Markkula Center for Applied Ethics describes internet ethics as the pursuit of a digital space that respects the rights and humanity of all users.
Key Ethical Issues on the Internet:
Privacy
How secure is the data users provide online?
Should governments or companies conduct surveillance without user consent?
Big Data
How is data collected, and from whom?
What are the ethical boundaries of data usage?
Net Neutrality
Should internet providers treat all content equally, or should they be allowed to prioritize certain content?
Access to the Internet
If internet access is a fundamental right, how do we address the digital divide?