2. • Decide on the appropriate online
safety and security in online
transactions;
• Determine acceptable ethics and
etiquette online; and
• Develop an ethical and safety
habits in using online resources.
3. Online Security refers to the rules
that are followed and actions that
are taken to make sure that online
users and data privacy aren't
compromised by criminals.
6. • is a person who attempts to gain unauthorized access to
a system, to damage that system, or to disturb data on
that system.
• ´in summary, this person attempts to violate Security by interfering
with system Availability, Data Integrity or Data Confidentiality
7.
8.
9.
10. The result of an illegal act
using the computer and
the internet.
11.
12.
13. a type of computer
program that, when
executed, replicates itself
by modifying other
computer programs and
inserting its own code
14. • Infection mechanism (also
called 'infection vector) – is
how the virus spreads or
propagates.
• The trigger – which is also
known as a logic bomb
• The "payload" – is the actual
body or data that performs the
actual malicious purpose of the
virus.
17. • Inform a trusted person
• Try not to instigate
• Block connection with a
bully
• Log out from your online
account
• Be not a bully too.
18. • Select a secure browser
• Establish a multilayer e-
mail protection
• Apply multifactor
authenticity in your online
accounts
• Install a firewall