Internet Use and Security
Terms in this set (17)
personal Internet use
using the Internet for anything other than work tasks
professional Internet use
using the Internet, ethically, for work-related tasks
ethical Internet use
using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
the exclusive rights of ownership for professional work and publication
Internet security risks
the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
Internet use policy
a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
malware that spreads by users from an infected device to the rest of the devices on a network/system
a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
malware that accesses or controls a device without being detected
attacks focused on the workplace Network workers access.
a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
SQL injection attack
cyber attack that targets the server side to get customer information from the database, such as credit card numbers
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
Cybersecurity Essentials Chapter 3 Malware and Malicious Code
Cybersecurity Essentials Chapter 3
MSIS Chapter 4.2
OTHER SETS BY THIS CREATOR
(2020)#5 Work Ethic
(2020)#3 Initiative and Self-Direction
(2020)#2 Critical Thinking and Problem Solving
(2020)#11 Big-picture Thinking
THIS SET IS OFTEN IN FOLDERS WITH...