Professional Documents
Culture Documents
Lesson 2
Lesson 2
Lesson 2
INTERNET SAFETY- refers to the online security or safety of people and their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
System security describes the controls and safeguards that an organization takes to ensure its networks and resources are
safe from downtime, interference or malicious intrusion. If data security is meant to protect the information in the books
in the library, then system security is what protects the library itself. https://tinyurl.com/mud5xcns
Data security relates to all the efforts your organization takes to ensure that the information you possess isn’t accidentally
deleted or modified — or deliberately accessed, manipulated, stolen, sold or otherwise misused.
A computer intruder is anyone or anything that tries to get access to any part of your computer system. An intruder is
typically referred to as a hacker. Hackers are known to use automated computer programs to compromise your
computer's security system. They are very smart and know a lot about technology and security.
https://tinyurl.com/4hfh89dx
Empowerment Technology
Prepared by: Kimberly Ann B. Palaran
Reference: https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/
legitimate programs to trick users into executing them on their device, delivering the computer virus payload.
(https://www.proofpoint.com/us/threat-reference/computer-virus)
Virus stages
Dormant phase – Virus is idle.
Propagation phase – Virus places an identical copy of itself into other programs or into certain system areas on
the disk.
Triggering phase – Virus is activated to perform the function for which it was intended. Caused by a variety of
system events
Execution phase – Function is performed
Symptoms of Computer Virus The computer crashes often, runs out of memory
Malware authors write code that is undetectable until with few active programs, or a blue screen of
the payload is delivered. However, like any software death in Windows.
program, bugs could present issues while the virus runs. Slow computer performance even when running
Signs that you have a computer virus include: few programs or the computer was recently
Popup windows, including ads (adware) or links booted.
to malicious websites. Unknown programs start when the computer
Your web browser home page changes, and you boots or when you open specific programs.
did not change it. Passwords change without your knowledge or
Outbound emails to your contact list or people your interaction on the account.
https://www.proofpoint.com/us/threat-reference/
on your contact list alert you to strange computer-virus
messages sent by your account.
KEY TERMS
BOOLEAN
AND – enter words connect with AND- it will include NOT – searches for the first term and excludes sites that
sites where both words and found have the second term.
Uses: joining different topics (i.e. global warming (i.e. Washington NOT school)
AND California) Question
OR – requires at least one of the terms is found. a question may be entered in the search field of search
Uses: join similar or synonymous topics (i.e. global engine
warming OR greenhouse effect)
Empowerment Technology
Prepared by: Kimberly Ann B. Palaran
Reference: https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/
Advanced – Features are offered on many engines by selections. Effective in narrowing search returns to a
going to an “Advanced search” page and making specific topic or phrase
.
Empowerment Technology
Prepared by: Kimberly Ann B. Palaran
Reference: https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/