0% found this document useful (0 votes)
105 views7 pages

EMPOWERMENT TECHNOLOGIES MODULE WEEK 2 3 Lesson 2

This document discusses the importance of online safety, security, ethics, and etiquette. It provides tips on safe online habits and outlines various internet risks like cyberbullying, identity theft, and malware. Netiquette rules and guidelines for respectful online behavior are also presented.

Uploaded by

mprincessyishin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views7 pages

EMPOWERMENT TECHNOLOGIES MODULE WEEK 2 3 Lesson 2

This document discusses the importance of online safety, security, ethics, and etiquette. It provides tips on safe online habits and outlines various internet risks like cyberbullying, identity theft, and malware. Netiquette rules and guidelines for respectful online behavior are also presented.

Uploaded by

mprincessyishin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

LESSON Online Safety, Security,

2 Ethics and Etiquette

What’s In
We have learned in lesson 1 about the current state of Information and
Communication Technology in global setting. There are various online
platforms and sites that people used today as their medium of communication
and source of information. This communication technology spread fast to the
people and even controls their lives. Despite of the good benefits given to us
by the technology there are stills things that we must be aware of. In this
lesson we will discuss and give importance in online safety, security, ethics
and etiquette.

What I Need to Know


Online Safety The importance of internet plays a crucial part in human
development. Life becomes easy and comfortable because of this
technology. Most of us are connected to the internet via laptop, mobile
phone, tablet, personal computer and other electronic gadgets. Behind this
technology there is a risk that everyone should be aware of. You could be at
risk on scam, bullying, and illegal activities if you will not take precautions in
using internet. We need to keep ourselves safe and secure whenever we use
the internet. That is why it is very important to know and learn the ways on
how to be safe and secured online.

1
What’s New
Activity 1: Self-Check on Online Habits
Directions: Reflect and assess yourself on your online habits. Check “Yes” or
“No” on the table below.

Online Habits Yes No


I always talk to strangers on social media.
Giving your password to your friends.
Posting about future your vacations.
Visiting unsecured websites.
Ranting on social media.
Posting image or video without asking permission from
the owner.

What Is It
In the activity above you assessed yourself in online habits. Those habits
might be good or bad that you must be aware of. If you keep practicing those
bad habits it might bring you danger. Safety is the first thing you must
consider in using internet.

Tips on how to be safe online


 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it private.
 Install and update antivirus in your computer.
 Do not give your personal information to anyone.
 Think before you click.
 Never post about your future vacation.

2
Internet Risk
 Cyberbullying It happens when someone intentionally abused, harass,
and mistreated by other person using electronic communication.
 Identity Theft It is a crime of stealing personal information for the
purpose of assuming that person’s name or identity to make any form of
transactions.
 Cyber Stalking A criminal practice where electronic communication is
used to stalk or harass individual or group.
 Sexting The act of sending sexually explicit text messages, images, and
videos.

Internet Threats
Malware – also known as Malicious Software.

Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to another
program.
2. Trojan Horse – a malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to hack by recording
every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC
and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a
computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method for
the removal of the virus.

3
Spam
Also known as junk email or unwanted email send by advertiser or bot. It
can be used to send malware.

Phishing
A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.

Cybercrime
A crime in which computer is used as object and tool in committing a
crime such hacking, phishing, spamming, child pornography, libel, hate
crimes, identity thief and others.

Cybercrime Law
A law that deals with all forms of cybercrime.

What’s new?
Activity 2: #Wall
Suppose you have read a post like this “Strong men don’t cry” in social
media. How would you react? Post your reaction in comment section on our
#Wall.

#Wall

“Strong men don’t cry.”

4
Comment:
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

What Is It?
The activity above shows on how we react on a post by expressing our
opinions and feelings through comments, likes, and emoticons. There are
times that netizens will give compliments and positive reactions on your post
but there are also times that netizens will criticize or give negative reactions
on your post. Conflicts and misunderstanding occur in social media because
netizens are not behaving well. Ethics and etiquette should be practice by
people whenever they are in social media.

Netiquette
It is a word that came from the two words “net” and “etiquette”. It is an
etiquette applied online that shows proper manner and behavior. If you are a
member of an online society through social media you are called netizen. And
in interacting with other netizen online, we need to maintain good behavior
which is acceptable to others in online community.
The Core Rules of Netiquette by Seth T. Ross
1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.

5
What I Have Learned
Activity 3: Generalization

Directions: Answer the following questions below.

1. How do you keep yourself safe and secure online?


__________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

2. Why is it important to observe netiquette online?


__________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

What I Can do?


Activity 4: Shout Your Mind
Directions: Make a poster with a theme “think before you click”. Use a 1/4
illustration board or long bond paper.

Category 4 3 2 1

Graphics – All graphics All graphics Some graphics Many graphics


Relevance are related to are related to are not related are not related
the the topic to the topic. to the topic.
topic/theme except 1.
and makes it
easier to
understand.

Attractiveness The poster is The poster is The poster is The poster is


exceptionally attractive, neat acceptably not attractive
attractive, neat and clean. attractive but it and has many
and clean. has few erasures.
erasures.

6
7

You might also like