You are on page 1of 2

EMPOWERMENT TECHNOLOGY

FIRST QUARTERLY
REVIEWER
INFORMATION SECURITY Malware: Online Threats
 We usually need to submit some personal malicious software or Malware. Keep in mind that while all of them
information in order to gain access to online sites can spread through the Internet, some of them also spread through
and services. offline means such as flash drives and local area networks (LAN)
 Full Name- they just ask for it to determine how 1. Virus- attaches itself in a program or a file and like real-life
to properly address you in emails and personal viruses, computer viruses can multiply or make complete
messages. Some sites, like Facebook, use it to label copies of themselves when you copy the program or file
your account and online interactions. that it is attached to.
 it can still be used in the simplest forms of  It can slow down your device or computer or
identity theft. Anyone can use your full name network’s speed by running unwanted processes or
to sign up and create a fake account. it can fill your computer’s memory with unwanted
 Username- an alias that represents your online files. A computer virus can spread whenever a
presence. It can be your real name or combinations computer makes contact with another computer.
that totally depend on your creativity. 2. Worm- A worm will automatically spread and copy itself.
 anyone who knows it can start looking for Can range from minor annoyances like hiding your icons or
you or sometimes-even contact you. major damage like destroying your files or causing your
computer to shut down on its own.
 Password- the most important bits of information 3. Trojan- disguises itself as a useful and/or harmless program
in the Internet. Basically, it is a group of characters
or file.
that, when paired with your username or email
 Trojans cannot create copies of themselves.
address can unlock your user account.
Instead, they pose as harmless files or programs
 hackers take special interest in people’s
such as pictures or videos and rely on people to
passwords. if not identical passwords for
send, copy, and download them.
their online accounts so figuring out the
4. Spam- an unwanted and unsolicited message/email.
password to one account may also
5. Adware- Launches unwanted advertisements in your
compromise the others.
Internet browser or your desktop.
 Birth Date- mostly required to determine if you 6. Phishing- the fraudulent practice of stealing important
are old enough to access certain contents and information from users such as passwords, pin codes and
features in the Internet. credit card numbers.
 along with other personal details can be
used to pass security checks and hack
personal accounts.
 Home Address and Locations- GPS (Global
Positioning System) They do this in order to give you
location-specific contents and options.
 can ultimately compromise your physical
security because it will tell potential
criminals where you are.
 Phone Numbers- usually required by many
online services in order to have a direct line to their
clients.
 should not be shared carelessly since anyone
who has your phone number has a direct
way to harass, threaten, or inconvenience
you.
 Email Address- Almost every website that has a
sign-up feature requires.
 the most used and abused method of
communication in the Internet.
 Financial information- This includes bank
account names, account numbers, credit card
numbers.
EMPOWERMENT TECHNOLOGY
FIRST QUARTERLY
REVIEWER
INFORMATION AND COMMUNICATION  Dynamic websites can change their appearance
TECHNOLOGIES and behavior based on the users’ actions.
 Deals with the use of different communication
 Google search is a dynamic website, which means
technologies such as mobile phones, telephones,
that its URL changes depending on the users.
computer internet.
 One of the biggest elements of Web 2.0, “social
 Philippines as the “ICT hub of Asia” because of the
media” is a term used to define applications and
huge growth of ICT-Related jobs, BPO( BUSINESS
websites that people use to make online social
PROCESS OUTSOURCING/CALL CENTERS)
interactions.
 Voice over Internet Protocol (VOIP)
 Wiki- Derived from the Hawiian work wikiwiki,
 INTERNET- The Global system of interconnected which means “quick” or “super fast”. a wiki is a
computer networks that uses the internet Protocols
website that allows visitors to add or edit its
suite (TCP/IP) TRANSMISSION CONTROL
contents.
PROTOCOL/INTERNET PROTOCOL) is the World Wide
Web’s core communication system.
WEB 3.0
 COLLABORATION- The situation of two or
more people working together to create or achieve main characteristics include, but are not limited to:
the same thing.
1. Real-time-Events and information are made available to
 Web portal- A website that contains information users as they happen.
from different sources and places them.
2. Ubiquitous -Users are always connected to the Internet.
THE WORLD
3. Machine learning-Computers and mobile devices can
 An information WIDE WEB
system in the internet that allows create data and make decisions based on the user’s
documents to be connected to other documents previous actions.
by hyperlinks.
 Invented by TIM-BERNERS LEE.
 It let the users to navigate from one page to
ONLINE PLATFORMS
another via the hyperlinks embedded. PRESENTATION- Allows you to present and share.
Used to communicate information clearly and efficiently.
WEB 1.0
CLOUD COMPUTING PLATFORM- The
 the name given to the first generation of the practice of using a network of remote servers hosted on the
Internet. It is the time when most websites were internet. Instead of using computer hard drive.
Static.
 Hypertext Markup Language (html or htm) FILE MANAGEMENT- Used for the strong, naming,
 Websites from the Web 1.0 generation are mostly sorting, and handling of computer files. Allows you to convert
read-only or static. and manage files without download.
 Uniform Resource Locator (URL)
 It cannot be manipulated by the user. MAPPING PLATFORM- A Transformation taking
the points of one space into the points. Uses GPS.
WEB 2.0
SOCIAL MEDIA PLATFORM- A Computer
 focuses on user participation. mediated tools that allow large group of people to create,
 Web 2.0 emphasizes on a give-and-take relationship share, or exchange information.
between a website and its users.
 giving the users the power to share different types of
information such as text, images, sounds, and
videos, This allows for the creation of interactive
with more real-life uses like online banking, online
shopping, and media sharing.

You might also like