0% found this document useful (0 votes)
7 views

Study Guide

Uploaded by

rams concepcion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Study Guide

Uploaded by

rams concepcion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Study Guide

Online Actions Punishable by Law

1. Plagiarism: Taking someone's work and saying it's your own. Punishable by fine and/or
imprisonment.

2. Cyber Bullying and Online Harassment: Sending hurtful texts or instant messages, posting
embarrassing photos or videos on social media, and spreading mean rumors online or with cell
phones. Punishable by fines ranging from P50,000 to P100,000, or imprisonment between six
months and six years, or both.

3. Identity Theft: Online identity theft that causes damages to a party is punishable by
imprisonment of up to 12 years.

4. Invasion of Privacy: Concerned with proper handling of data (Consent notice and regulatory
obligation).

5. Cyberstalking: The repeated use of electronic communications to harass or frighten someone.

6. Copyright Infringement: Referred to as piracy or use of work without permission with certain
exclusive rights.

Networking and Communication

 Data Communications: The transmission of digital data between two or more computers and a
computer network or data network.

 Types of Computer Networks:

 Local Area Network (LAN): A small network restricted to a small geographic area.

 Wide Area Network (WAN): A network that covers a broad range of geographic areas.

 Metropolitan Area Network (MAN): A network that connects users with computer
resources in a geographic area larger than LAN but not quite as large as WAN.

 Basic Components of Computer Networks:

 Servers: Computers that hold shared files, programs, and the network operating system.

 Clients/Workstation: Computers that access and use the network and shared network
resources.

 Transmission Media: Facilities used to interconnect computers in a network.

 Shared Data: Data that file servers provide to clients.

 Shared Printers and Other Peripherals: Hardware resources provided to users of the
network by servers.

 Network Interface Card (NIC): A special expansion card that prepares and sends data,
receives data, and controls data flow between the computer and the network.
 Local Operating System: A program that allows personal computers to access files, print
to a local printer, and have and use one or more disk and Flash Drive/CD drives.

 Network Operating System: A program that runs on computers and servers and allows
the computers to communicate over the network.

 Hub: A device that splits a network connection into multiple computers.

 Switch: A telecommunication device that uses physical device addresses in each


incoming message to deliver the message to the right destination or port.

Data Communication

 Components of Data Communication:

 Message: The information (data) to be communicated.

 Sender: The device that sends the data message.

 Receiver: The device that receives the message.

 Transmission Medium: The physical path by which a message travels from sender to
receiver.

 Protocol: A set of rules that govern data communications.

 Types of Protocols:

 Transmission Control Protocol (TCP): A popular communication protocol used for


communicating over a network.

 Internet Protocol (IP): A protocol designed explicitly as an addressing protocol.

 User Datagram Protocol (UDP): A substitute communication protocol to Transmission


Control Protocol.

 Post Office Protocol (POP): A protocol designed for receiving incoming emails.

 Simple Mail Transport Protocol (SMTP): A protocol designed to send and distribute
outgoing emails.

 File Transfer Protocol (FTP): A protocol that allows users to transfer files from one
machine to another.

 HyperText Transfer Protocol (HTTP): A protocol designed for transferring hypertext


among two or more systems.

 HyperText Transfer Protocol Secure (HTTPS): A protocol that secures communication


among two computers using encryption.

Quiz

1. What is plagiarism punishable by? a) Fine and/or imprisonment b) Only fine c) Only
imprisonment d) None of the above
Answer: a) Fine and/or imprisonment

2. What is cyber bullying and online harassment punishable by? a) Fines ranging from P50,000 to
P100,000, or imprisonment between six months and six years, or both b) Only fine c) Only
imprisonment d) None of the above

Answer: a) Fines ranging from P50,000 to P100,000, or imprisonment between six months and six years,
or both

3. What is identity theft punishable by? a) Imprisonment of up to 12 years b) Fine and/or


imprisonment c) Only fine d) None of the above

Answer: a) Imprisonment of up to 12 years

4. What is the main difference between a LAN and a WAN? a) LAN is smaller than WAN b) LAN is
larger than WAN c) LAN is faster than WAN d) LAN is slower than WAN

Answer: a) LAN is smaller than WAN

5. What is the function of a server in a computer network? a) To access and use the network and
shared network resources b) To hold shared files, programs, and the network operating system c)
To connect multiple computers in a network d) To provide internet access

Answer: b) To hold shared files, programs, and the network operating system

6. What is the purpose of a protocol in data communication? a) To govern data communications b)


To transmit data c) To receive data d) To store data

Answer: a) To govern data communications

7. What is the difference between HTTP and HTTPS? a) HTTP is faster than HTTPS b) HTTP is slower
than HTTPS c) HTTP is not secure, while HTTPS is secure d) HTTP is secure, while HTTPS is not
secure

Answer: c) HTTP is not secure, while HTTPS is secure

8. What is the function of a switch in a computer network? a) To split a network connection into
multiple computers b) To connect multiple computers in a network c) To use physical device
addresses in each incoming message to deliver the message to the right destination or port d) To
provide internet access

Answer: c) To use physical device addresses in each incoming message to deliver the message to the
right destination or port

9. What is the purpose of a NIC in a computer network? a) To prepare and send data, receive data,
and control data flow between the computer and the network b) To connect multiple computers
in a network c) To provide internet access d) To hold shared files, programs, and the network
operating system

Answer: a) To prepare and send data, receive data, and control data flow between the computer and the
network
10. What is the difference between TCP and UDP? a) TCP is faster than UDP b) TCP is slower than
UDP c) TCP is a connection-oriented protocol, while UDP is a connectionless protocol d) TCP is a
connectionless protocol, while UDP is a connection-oriented protocol

Answer: c) TCP is a connection-oriented protocol, while UDP is a connectionless protocol

**IP to

Types of Viruses

Malware

 Short for malicious software

 Can destroy, disrupt computers, steal data, etc.

 Examples: viruses, worms, trojans, spyware, adware, ransomware

Denial-of-Service (DoS) Attacks

 Overwhelm a website or system with traffic

 Make it unavailable to users

 Can shut down the system

Phishing

 Fraudulent emails, texts, or messages

 Trick users into revealing sensitive information

 Examples: clicking on malicious links, downloading attachments

Spoofing

 Disguise as a trusted person or company

 Gain user's trust to steal personal data or spread malware

 Examples: email spoofing, website spoofing

Identity-Based Attacks

 Steal identities from companies or organizations

 Gain unauthorized access to accounts or sensitive information

 Examples: identity theft, impersonation

Code Injection Attacks

 Inject malware into a vulnerable application


 Execute malicious code when the application is opened

 Examples: SQL injection, cross-site scripting (XSS)

Supply Chain Attacks

 Target third-party vendors, suppliers, or connections

 Gain access to the main organization's system

 Examples: vendor compromise, third-party breach

Social Engineering Attacks

 Manipulate users into revealing sensitive information

 Trick users into installing malware or divulging secrets

 Examples: phishing, pretexting, baiting

Insider Threats

 Authorized personnel compromise their own organization

 Use their access and knowledge to steal or damage data

 Examples: employee sabotage, data theft

DNS Tunneling

 Encode malicious data in DNS queries and responses

 Difficult to detect

 Examples: DNS tunneling attacks, DNS-based malware

IoT-Based Attacks

 Target Internet of Things (IoT) devices and systems

 Use IoT devices as a gateway to breach the main system

 Examples: smart home device hacking, industrial control system compromise

AI-Powered Attacks

 Use artificial intelligence or machine learning to automate, accelerate, or enhance cyber attacks

 Make attacks more efficient, adaptive, and difficult to detect

 Examples: AI-powered phishing, AI-driven malware

Quiz Time!

Here are 12 multiple-choice questions to test your knowledge:


1. What is malware short for? a) Malicious Software b) Malicious Hardware c) Malicious Network d)
Malicious System

Answer: a) Malicious Software

2. What is the goal of a Denial-of-Service (DoS) attack? a) To steal user data b) To disrupt system
service c) To install malware d) To spoof a website

Answer: b) To disrupt system service

3. What is phishing? a) A type of malware b) A type of DoS attack c) A fraudulent email or message
d) A type of spoofing attack

Answer: c) A fraudulent email or message

4. What is spoofing? a) Disguising as a trusted person or company b) Stealing user identities c)


Injecting malware into an application d) Targeting IoT devices

Answer: a) Disguising as a trusted person or company

5. What is the goal of an identity-based attack? a) To steal user data b) To gain unauthorized access
to accounts c) To disrupt system service d) To install malware

Answer: b) To gain unauthorized access to accounts

6. What is code injection? a) A type of phishing attack b) A type of DoS attack c) Injecting malware
into a vulnerable application d) A type of spoofing attack

Answer: c) Injecting malware into a vulnerable application

7. What is a supply chain attack? a) Targeting a company's main system b) Targeting third-party
vendors or suppliers c) Stealing user identities d) Disrupting system service

Answer: b) Targeting third-party vendors or suppliers

8. What is social engineering? a) A type of malware b) A type of phishing attack c) Manipulating


users into revealing sensitive information d) A type of DoS attack

Answer: c) Manipulating users into revealing sensitive information

9. What is an insider threat? a) An authorized personnel compromising their own organization b) A


type of phishing attack c) A type of DoS attack d) A type of spoofing attack

Answer: a) An authorized personnel compromising their own organization

10. What is DNS tunneling? a) A type of phishing attack b) A type of DoS attack c) Encoding malicious
data in DNS queries and responses d) A type of spoofing attack

Answer: c) Encoding malicious data in DNS queries and responses

11. What is an IoT-based attack? a) Targeting a company's main system b) Targeting IoT devices and
systems c) Stealing user identities d) Disrupting system service

Answer: b) Targeting IoT devices and systems


12. What is an AI-powered attack? a) A type of phishing attack b) A type of DoS attack c) Using AI or
machine learning to automate, accelerate, or enhance cyber attacks d) A type of spoofing attack

Answer: c) Using AI or machine learning to automate, accelerate, or enhance cyber attacks

Let me know if you need any further clarification or explanation on any of these topics!

Share

New

You might also like