The process by which cyber criminals gain access to your computer.
Hacking
Respect_______ in viewpoints.
Diversity
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright
Often used by third parties to infiltrate your computer
Spyware and adware
How many computer ethics rules did the previous reporters mention?
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
A malicious program that is disguised as, or embedded within, legitimate software.
Trojan Horses
AVOID ________ IN TYPED MESSAGES
Screaming
Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
Cyber Defamation
Virtual “listening in” on information that's shared over an unsecure (not encrypted)
WiFi network.
Wi-Fi Eavesdropping
What is netiquette?
it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online.
An act or instance of using or closely imitating the language and thoughts of another author without authorization.
Plagiarism
Malicious computer programs that are often sent as an email attachment or a
download with the intent of infecting your computer.
Viruses
What is the difference between ethics and etiquette?
Ethics- moral principles that govern our behavior
Etiquette- set of rules indicating the proper and polite way to behave
An act protecting individual personal information.
Republic Act No. 10173 Data Privacy Act of 2012