1/42
A comprehensive set of flashcards covering online safety, internet security, online threats and malware, netiquette and cyber citizenship, ethics in ICT, and protection of ideas.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is online safety (also known as internet safety, cyber safety, or e-safety)?
Aims to protect people from harmful or risky online behavior; focuses on personal conduct and awareness.
What is internet security?
Protection of systems and data from cyber threats; involves technical defenses like antivirus software, firewalls, and password protection.
What are online threats?
Malicious activity conducted through the internet intended to harm individuals, organizations, or systems.
What is phishing?
An attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
What is Email Phishing?
Phishing attacks conducted via email, the most common type.
What is Spamming?
Sending unsolicited messages to large numbers of recipients for advertising or other prohibited purposes.
What is Smishing?
Phishing attacks conducted through SMS text messages.
What is Vishing?
Phishing attacks conducted over the telephone.
What is Spear Phishing?
Highly targeted phishing attacks aimed at specific individuals or organizations.
What is Whaling?
Spear phishing attacks targeting high-profile individuals like CEOs or CFOs.
What is Cyberbullying?
The use of technology to harm another person, via email, messaging, or social networks.
How can you prevent cyberbullying?
Do not respond or retaliate; save messages with date/time; use blocking/report abuse tools; notify a trusted adult.
What does THINK BEFORE YOU CLICK refer to?
A reminder to be cautious about online actions before engaging with links or messages.
What is a Virus?
A malicious program designed to replicate itself and spread between computers.
What is Malware?
Short for malicious software; any software designed to harm, exploit, or compromise devices.
What is a Worm?
A self-replicating malware that spreads to other systems without user action.
What is a Trojan Horse?
A malicious program disguised as a useful one that creates a pathway for other malware once installed.
What is a Keylogger?
A program that runs in the background and captures keystrokes without user knowledge.
What is Spyware?
A program that runs in the background to covertly collect information.
What is Ransomware?
Locks data or systems and demands payment to restore access.
What is Adware?
Displays unwanted ads and may track user behavior.
What is the 2002 Worm Klez?
A worm that spread via Microsoft products by propagating through email.
What are malware protection and prevention steps?
Install security updates; verify senders and watch for fraud signs; use strong, unique passwords; install reputable antivirus software.
What is Netiquette?
Network Etiquette; guidelines for respectful and appropriate online behavior.
What is a Cyber Citizen?
A person who uses technology responsibly across etiquette, communication, education, access, commerce, rights, safety, and security.
What are the core principles of Netiquette?
Be respectful; Be clear and concise; Respect privacy; Use proper grammar and punctuation.
What does 'Be Respectful' mean in Netiquette?
Treat others with the same courtesy as in face-to-face interactions; avoid offensive language.
What does 'Be Clear and Concise' mean in Netiquette?
Communicate in a straightforward, understandable way to avoid misunderstandings.
What does 'Respect Privacy' mean in Netiquette?
Do not share others’ private information without permission and avoid tagging without consent.
Why is proper grammar and punctuation important in Netiquette?
Maintains professionalism and reduces miscommunication in online contexts.
What is Ethics in ICT?
Moral principles governing the use of technology and information systems, including data privacy and IP rights.
What is Computer Ethics?
Branch of ethics focused on standards of conduct in using computers.
What is Internet Ethics?
Patterns of behavior on the Internet guided by law and personal philosophy.
What are common ethical issues in ICT?
Plagiarism; Exploitation; Libel and Slander; Hacking/Unauthorized Access; Copyright Infringement.
What is Plagiarism?
Presenting someone else’s digital content as your own without proper citation.
What is Exploitation in ICT?
Taking advantage of others using digital tools for personal or financial gain.
What is Libel in ICT?
Publishing false written statements online that harm a person’s reputation.
What is Slander in ICT?
Spreading false statements that harm a person’s character, including online videos or livestreams.
What is the Intellectual Property Code (RA 8293)?
Philippines law protecting original works (literature, art, etc.).
How can you protect your ideas?
Document your work; Apply copyright protection; Use licenses (Creative Commons); Use watermarks/digital signatures; Consider patents/trademarks; Share with trusted people.
What is Creative Commons?
A license allowing use of copyrighted works under certain conditions.
Why use watermarks or digital signatures?
To visibly or invisibly mark digital creations and deter unauthorized use.
Why are passwords and encryption important?
Protect digital creations from unauthorized access by restricting who can view or modify them.