Adware
Receiving an email that appears to be from a trusted colleague, containing a link to a shared document. The email is actually a clone of a previous message, with the link replaced by one that leads to a fake website designed to steal login credentials or personal information
Example of Phishing
Another benefit of digital media is that they make possible the creation of virtual spaces, or places that exist not in the real world but only online, including virtual schools and museums.
Virtual
When digital messages are used to threaten, torment, or embarrass someone.
Cyberbullying
Potentially dangerous breaches of security that can cause harm to a computer.
Computer threats
Collects information without the knowledge of the computer user often attached to a file or software that users want and it is downloading along with the desired files.
Spyware
Attackers targeted a US network technology company named Ubiquiti Networks and managed to steal $46.7 million using this type of hacking strategy.
Example of phishing
Every person is a citizen, or a member of different groups, whether at school, at home, or in his or her personal life.
citizen
Repeatedly sending messages with an offensive or derogatory mean.
Harrassment
When someone uses someone else´s computer systems through unauthorized means.
Hacker
Computer programs that replicate and are spread from one computer to another, typically through downloads or email attachments.
Viruses
A user types the URL of their bank's website into their browser and is unknowingly redirected to a fraudulent version of the site without realizing it.
Example of pharming
Citizenship means participating in your world in a responsible way
citezenship
Insulting a participant in an online discussion or argument, using volatile and cruel language.
Flaming
Unsolicited messages sent to a large group of people.
Spam
They don´t need human action in order to spread they are not attached to existing programs.
Worms
relies on deceptive emails or messages to trick users into taking action, whereas pharming manipulates DNS or local host files to redirect users automatically.
Phising
Cyber citizenship is taking responsibility for your role in cyberspace and engaging in positive and ethical decision-making to stay safe online.
Citezenship
Revealing someone´s private thoughts, secrets, or peronal information.
Outing
Cyber criminals can contaminate a computer and turn it into this.
Zombie
But they do not need a human action order to spread. They use computer networks to spread.
Trojan horses
The practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
Pharming
Many people are digital natives, or people who were born after the invention of digital technology and have grown up using it.
Digital Natives
Stealing someone´s passwords and impersonating him or her or creating a false account.
Deception
Messages that show up seemingly out of nowhere, while the user is surfing the web.
Pop-up