Netiquette, Online Safety, Cyber Threats, Malware, and ICT Ethics - Flashcards

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering online safety, internet security, online threats and malware, netiquette and cyber citizenship, ethics in ICT, and protection of ideas.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

What is online safety (also known as internet safety, cyber safety, or e-safety)?

Aims to protect people from harmful or risky online behavior; focuses on personal conduct and awareness.

2
New cards

What is internet security?

Protection of systems and data from cyber threats; involves technical defenses like antivirus software, firewalls, and password protection.

3
New cards

What are online threats?

Malicious activity conducted through the internet intended to harm individuals, organizations, or systems.

4
New cards

What is phishing?

An attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.

5
New cards

What is Email Phishing?

Phishing attacks conducted via email, the most common type.

6
New cards

What is Spamming?

Sending unsolicited messages to large numbers of recipients for advertising or other prohibited purposes.

7
New cards

What is Smishing?

Phishing attacks conducted through SMS text messages.

8
New cards

What is Vishing?

Phishing attacks conducted over the telephone.

9
New cards

What is Spear Phishing?

Highly targeted phishing attacks aimed at specific individuals or organizations.

10
New cards

What is Whaling?

Spear phishing attacks targeting high-profile individuals like CEOs or CFOs.

11
New cards

What is Cyberbullying?

The use of technology to harm another person, via email, messaging, or social networks.

12
New cards

How can you prevent cyberbullying?

Do not respond or retaliate; save messages with date/time; use blocking/report abuse tools; notify a trusted adult.

13
New cards

What does THINK BEFORE YOU CLICK refer to?

A reminder to be cautious about online actions before engaging with links or messages.

14
New cards

What is a Virus?

A malicious program designed to replicate itself and spread between computers.

15
New cards

What is Malware?

Short for malicious software; any software designed to harm, exploit, or compromise devices.

16
New cards

What is a Worm?

A self-replicating malware that spreads to other systems without user action.

17
New cards

What is a Trojan Horse?

A malicious program disguised as a useful one that creates a pathway for other malware once installed.

18
New cards

What is a Keylogger?

A program that runs in the background and captures keystrokes without user knowledge.

19
New cards

What is Spyware?

A program that runs in the background to covertly collect information.

20
New cards

What is Ransomware?

Locks data or systems and demands payment to restore access.

21
New cards

What is Adware?

Displays unwanted ads and may track user behavior.

22
New cards

What is the 2002 Worm Klez?

A worm that spread via Microsoft products by propagating through email.

23
New cards

What are malware protection and prevention steps?

Install security updates; verify senders and watch for fraud signs; use strong, unique passwords; install reputable antivirus software.

24
New cards

What is Netiquette?

Network Etiquette; guidelines for respectful and appropriate online behavior.

25
New cards

What is a Cyber Citizen?

A person who uses technology responsibly across etiquette, communication, education, access, commerce, rights, safety, and security.

26
New cards

What are the core principles of Netiquette?

Be respectful; Be clear and concise; Respect privacy; Use proper grammar and punctuation.

27
New cards

What does 'Be Respectful' mean in Netiquette?

Treat others with the same courtesy as in face-to-face interactions; avoid offensive language.

28
New cards

What does 'Be Clear and Concise' mean in Netiquette?

Communicate in a straightforward, understandable way to avoid misunderstandings.

29
New cards

What does 'Respect Privacy' mean in Netiquette?

Do not share others’ private information without permission and avoid tagging without consent.

30
New cards

Why is proper grammar and punctuation important in Netiquette?

Maintains professionalism and reduces miscommunication in online contexts.

31
New cards

What is Ethics in ICT?

Moral principles governing the use of technology and information systems, including data privacy and IP rights.

32
New cards

What is Computer Ethics?

Branch of ethics focused on standards of conduct in using computers.

33
New cards

What is Internet Ethics?

Patterns of behavior on the Internet guided by law and personal philosophy.

34
New cards

What are common ethical issues in ICT?

Plagiarism; Exploitation; Libel and Slander; Hacking/Unauthorized Access; Copyright Infringement.

35
New cards

What is Plagiarism?

Presenting someone else’s digital content as your own without proper citation.

36
New cards

What is Exploitation in ICT?

Taking advantage of others using digital tools for personal or financial gain.

37
New cards

What is Libel in ICT?

Publishing false written statements online that harm a person’s reputation.

38
New cards

What is Slander in ICT?

Spreading false statements that harm a person’s character, including online videos or livestreams.

39
New cards

What is the Intellectual Property Code (RA 8293)?

Philippines law protecting original works (literature, art, etc.).

40
New cards

How can you protect your ideas?

Document your work; Apply copyright protection; Use licenses (Creative Commons); Use watermarks/digital signatures; Consider patents/trademarks; Share with trusted people.

41
New cards

What is Creative Commons?

A license allowing use of copyrighted works under certain conditions.

42
New cards

Why use watermarks or digital signatures?

To visibly or invisibly mark digital creations and deter unauthorized use.

43
New cards

Why are passwords and encryption important?

Protect digital creations from unauthorized access by restricting who can view or modify them.