You are on page 1of 3

Please explain the following:

1. What is Netiquette?
-Netiquette is a combination of the words network and etiquette and is defined as a set of rules
for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online
resources in an online social environment.

2. Identify the rules of netiquette.


-Rule 1: Remember the Human.
• “Do unto others what you want others to do unto you.”
• People often forget that when they converse online, they converse to real people.
• Would you say it to the person’s face?
• Your words are written!

Rule 2: Adhere to some standards of behavior online that you follow in real life.
• Be ethical.
• Standards of behavior may be different in cyberspace, but they are not lower than in real life.
• Breaking the law is bad netiquette.
• Do your best to act within the laws of society and cyberspace.

Rule 3: Know where you are in cyberspace.


• Netiquette varies from domain to domain.
• What’s good in one area may be bad in another.
• Lurk before you leap.
• Stop, read, and observe before making any move.

Rule 4: Respect other people’s time and bandwidth.


• Netiquette varies from domain to domain.
• What’s good in one area may be bad in another.
• Lurk before you leap.
• Stop, read, and observe before making any move.

Rule 5: Make yourself look good online.


• Netiquette varies from domain to domain.
• What’s good in one area may be bad in another.
• Lurk before you leap.
• Stop, read, and observe before making any move.

Rule 6: Share expert knowledge.


• Don’t be afraid to share what you know.
• It is especially polite to share the result of your question with others.
• Sharing your knowledge is fun. It is a long-time net tradition.
Rule 7: Help keep flame wars under control.
• “Flaming” – It is what people do when they express a strongly held opinion without holding back any
emotion.
• Netiquette does not forbid flaming, what it forbids is the perpetuation of flame wars.

Rule 8: Respect other people’s privacy.


• Failing to respect other people's privacy is not just bad netiquette, it could also cost you your job and
integrity.

Rule 9: Don’t abuse your power.


• Knowing more than others, or having more power than they do, does not give you the right to take
advantage of them.

Rule 10: Be forgiving to other people’s mistake.


• When someone makes a mistake, be kind about it.
• If you do decide to inform someone of a mistake, point it out politely.

3. What is the internet?


-The internet is the global system of interconnected computer networks where we can share
information or get information and use as communication tool.

4. What are Internet threats?


- 1. Malware is the collective name for several malicious software variants, including viruses,
ransomware, and spyware. Shorthand for malicious software, malware typically consists of code
developed by cyber attackers, designed to cause extensive damage to data and systems or to gain
unauthorized access to a network. Malware is typically delivered in the form of a link or file over email
and requires the user to click on the link or open the file to execute the malware. Malware has been a
threat to individuals and organizations since the early 1970s when the Creeper virus first appeared.
Since then, the world has been under attack from hundreds of thousands of different malware variants,
all with the intent of causing the most disruption and damage as possible.

5. What are the types of Malware?


- 1.Types of Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer to another
either through the internet and local networks or data storage like flash drives and CDs.

b. Worm – a malicious program that transfers from one computer to another by any type of means.
Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm)
created by Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information
• Rogue Security Software – tricks the user into posing that it is security software. It asks the user to
pay to improve his/her security but in reality, they are not protected at all.

d. Spyware – a program that runs in the background without you knowing it (thus called "spy"). It can
monitor what you are currently doing and typing through keylogging.
• Keylogger – used to record the keystroke done by the users. This is done to steal their password or
any other sensitive information. It can record emails, messages, or any information you type using your
keyboard.

e. Adware – a program designed to send you advertisements, mostly as pop-ups.


f. Ransom ware – is a form of malware that essentially holds a computer system captive while
demanding a ransom. The malware restricts user access to the computer either by encrypting files on
the hard drive or locking down the system and displaying messages that are intended to force the user
to pay the malware creator to remove the restrictions and regain access to their computer.

2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card details.

4. Botnet - group a compromised computer connected to a network (“zombie”).

5. Denial of Service Attack – disrupts computer access to internet services.

REFERENCES:
https://brainly.in/question/1842309#:~:text=The%20Internet%20is%20a%20global,world%2C%20and
%20do%20much%20more.&text=It%20is%20made%20up%20of,of%20specialized%20computers
%20called%20routers.

https://www.webroot.com/nz/en/resources/tips-articles/netiquette-and-online-ethics-what-are-they

You might also like