(Answer This) : Module 7: Policing The Internet
(Answer This) : Module 7: Policing The Internet
Jimenez 2 BSABE C
1. Have you ever been experienced your personal data was stolen through the
internet? How did you handle it?
First and foremost, I never experienced that my personal data was stolen
through internet because I keep my personal details private. In order to
avoid, whenever I log-in my social media accounts, I always used
incognito browser even in my own laptop so that I won’t leave any traces
of my saved accounts. Use social media sparingly. Giving too much
information on social media sites like Facebook, Twitter, and Instagram
can make it easier for cybercriminals to obtain identifying information,
allowing them to steal your identity or access your financial information.
1. In your own way, how to stay safe online? Discuss your answer.
I always browse in incognito or private mode, uses vpn, limit the personal
information that I share on social media and above all – never visit a link
that I’m not familiar with. I always secure my phone too, from my security
passwords and files and always use a quality antivirus software and keep
it updated.
Application: (ANSWER THIS)
Data breach 1. A cybercrime in which a cybercriminal extracts data from a source and
usually it is done through remote network or through a physical access to a computer
or network
Ethics 2. It’s defined as what deals with moral principles, it is the understanding and
knowing the difference of what is good and bad.
Dilemma 3. To be able to complete any decision from the two results in a predictable
rate to a certain condition
Authentication 4. It should be only the user who can log in and run the application.
Only the valid information can reach this software
Online Safety 5. The knowledge of cultivating and maximizing the user's private
personal safety and security risks on their private information that is in the internet
Online Security 7. A branch of security that takes on the internet field. Their purpose
and objective is to establish guidelines, dealings, and measures to use against the
occurrences that attack over the internet
Etiquette 8. It’s the way people behave in an orderly manner in a social setting, and it
refers to your polite behavior and good manners
Cryptography 9. Assurance of privacy to the user, unauthorized user should not be able
to edit, change, copy, or read the information inside the application. The security must
be strong enough to secure the application
Spyware 10. It is a program or software that will steal information and changing user
data
Spam 11. It is a message thru email that the receiver did not want or ask to receive a
message from the sender
Auditing 12. Recording and tracking the execution of the application. In tracking the
execution of the application, you will notice if there are any suspicious on the
application. Also, you should able to trail the events
Encryption 13. It is the process of encoding information wherein only the authorized
people can access those information
Authorization 14. It should be only the authorized user who can change, edit, and read
all the information inside the application. If there's any suspicious activity, the user or
the owner should be verified through email, personal phone number or any that can
reach that will notify the user
Netiquette 15. The combination of the two words network and etiquette. It refers to the
distinguished set of rules for what is considered to be acceptable as good online
behavior and it also emphasizes on what are tolerable usage of online resources