Rules Of Netiquette

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Have a question in mind

Focus on a question you want answered. Never search everything on one go.

Tips on how to be safe

1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it 3. Check out the privacy policy page of a websites to learn how to the websites handles the information you share. 4. Know the security feature of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile 5. Do not share your password with anyone 6. Avoid logging in to public networks/Wi-Fi. Browsing in " incognito (or private) ," a feature of the browser online, will not protect you from hacker. 7. Do not talk to strangers online or face-to-face. 8. Never post anything about a future vacation. It is similar to posting, " Rob my house at this date." 9. Add friends you know in real life 10. Avoid visiting untrusted websites 11. Install and update an antivirus software on your computer. Use onle one anti- virus software to avoid conflicts. 12. I you have a Wi-Fi at home, make it a private network by adding a password. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner. 14. Buy the software; do not use pirated ones 15. Do not reply or click links from suspicious emails.

Types of Imformation

1. First name 2. Last name 3. Middle name 4. Current and previous school 5. Your cellphone number 6. Name of your mother and father 7. The name of your siblings 8. Your address 9. Your phone number 10. Your birthday

Some tips in conducting Online Research

1. Have a question in mind 2. Narrow it down 3. Advanced search 4. Look for a credible source 5. Give credit Privacy policy Cyber crime

Internet Threats

1. Malware A.virus B. worm C. trojan * Rogues security Software D. spyware * Key loggers E. Adware 2. Spam 3. Phishing * pharming

Some uses of Internet

1. Used to promote business 2. Gain new friends 3. Stay in touch with old friends 4. Source of entertainment through games, online communities, and etc.

Cyber crime

A crime commited or assisted through the use of the Internet.

Virus

A malicious program designed to replicate itself and transfer one computer to another either through the Internet and local networks or data storage like flash drives and CDs.

Trojan

A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

Worm

A malicious program that transfers to one computer to another by any type of means. Often, it uses a computer network to spread itself.

Pharming

A more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

Copyright

A part of the law, wherein you have the rights to our work, and anyone who uses it without your consent is punishable by law.

Adware

A program designed to send you advertisements, mostly as pop-ups.

Spyware

A program that rums in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently doing and typing through keylogging.

Fair use

An intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies, news report, research, library archiving, teaching, and education.

Be creative

Be creative and do not make somethingfrom somebody else's creativity.

Be responsible

Be responsible enough to know if something has a copyright.

Look for a credible source

Click the source of the information and see if its credible.

Copyright Infringement

Copyright 1. Understand 2. Be responsible 3. Be creative 4. Know the law Fair use

The name of your siblings

Disclosing thus is a huge risk. Strangers may pretend or use their identity to fool you

Your address

Giving the Internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminal to find you.

Give credit

If you are going to use the information from a source for educational purposes, give credit to the original author of the page or information.

Your home phone number

This shared information is more risky than sharing your personal phone number. Scams usually use thus information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.

Internet

Is one of the most dangerous places, especially if you do not know what you are doing with it.

Phishing

It goals is to acquire sensitive personal information like passwords and credit card details.

Your birthday

Letting people know your birthday is probably a must if you want to get as many gifts as possible makes you defenseless to indentity theft.

Advanced search

This will allow you to filter out information you do not need.

Rogue security software

Tricks the user into posing that it is a security software. Is asks the user to pay to improve his/her security but in reality, they are not protected at all.

Current & previous school(s)

Most people who steal identities study their subject. They can use this information for verification purposes.

Narrow it down

Search engines use several filters to determine the most appropriate result for you.

Midlle name

Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.

Malware

Stands for malicious software

Privacy policy

Tells the user how the website will handle its data

Your cell phone number

The Internet is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.

Know the law

There are some limitations in copyright law.

First name

There is a risk sharing your first name. Chances are, a hacked may already know plenty of stuff about you even if you only give out your first name.

Spam

Unwanted email mostly from bots or advertisers.

Key loggers

Used to record the keystroke done by users.

Understand

You can express something using your own words, but you should give credit to the source.

The name of your mother and father

You may have already encountered many websites that require your yout mother's maiden name as an answer to a secret question whenever you lose your password

Last name

You will be vulnerable to being searched for using search engines, which include image search. Matching a name eith face is modus to several cybercrimes like identity of theft.


संबंधित स्टडी सेट्स

Ch. 1: Perspectives on Maternal, Newborn, and Women's Health Care

View Set

CHAPTER 1: UNLOCKING ART’S MYSTERY -

View Set

Abdomen Board Exam: Ch. 6 - Spleen

View Set