ONLINE SAFETY, SECURITY, AND RULES OF NETIQUETTE
Internet Safety
Internet Safety
refers to the online safety of the people and their information when us-
ing the internet. It is an act of maximizing the user’s awareness of per-
sonal safety and security risk to private information and property asso-
ciated with using the internet and self-protection from computer crime.
Netiquette
is short for “Internet
Etiquette”. It refers
to the rules of online
courtesy, proper
manners, and behav-
ior online. It caters to
the do’s and don’ts of
online communica-
tion.
TEN RULES OF NETIQUETTE
1. Remember your talking always to humans even your online.
2. Adhere to the same standards online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect another people’s time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people’s privacy.
9. Don’t abuse your power.
10.Be forgiving on other people’s mistakes.
Threat – refers to anything that has the potential to cause
serious harm and might exploit a vulnerability to breach
security to a computer system and devices.
Cybercrime – a crime committed or assisted through the
use of the internet.
Privacy Policy / Terms of Services (ToS) – tells the user
how the website handles and caters privacy and safety re-
garding its data.
Threat – refers to anything that has the potential to cause
serious harm and might exploit a vulnerability to breach
security to a computer system and devices.
Cybercrime – a crime committed or assisted through the
use of the internet.
Privacy Policy / Terms of Services (ToS) – tells the user
how the website handles and caters privacy and safety re-
garding its data.
INTERNET THREATS
•
1. Malware – stands for malicious software. It is a computer program de-
signed to infiltrate and damage computers without user consent.
5 Type of Malware
● Virus – a malicious program designed to replicate itself and transfer from
computer to another destroying data or crashing network services, do noth-
ing, or just annoying.
● Worm – a malicious program that replicates itself, transfer from one com-
puter to another by any type or means but not alter any files on your ma-
chine.
● Trojan – a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected, and allows hackers to
get your information. It is designed to appear harmless on the victim’s
computer, but in fact, it accesses files or extracts sensitive data.
● Spyware – a program that runs in the background without you knowing it
(thus called “spy”). It can monitor what you are currently doing and typing
through keylogging.
● Adware – stands for advertising malware. A program designed to send
you advertisements, mostly as pop-ups.
5 Type of Malware
2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send mal-
ware and unsolicited message to large numbers of recipients for the purpose of commercial
advertising.
3. Phishing – an unwanted acquisition of sensitive personal information like passwords and
credit card details. Its method is to gather personal information using deceptive emails and
websites.
4. Identity Theft – is a crime whereby criminals impersonate individuals, usually for financial
gain. Posers acting like the real owner of the account that they are using.
5. Hacking – is where an authorized person uses a network, internet or modem connection
to gain access to security password to see data stored and stealing important information
such as files, personal details, and images on another computer.
6. Cyberbullying – is a form of bullying that involves behavior or acts intended to inflict
harm, threats, embarrassment using technology.
Some Tips to stay safe online:
1. Don’t share with anyone especially online all the information with risk. Ex-
ample: Full name, Mother & Father Full name, Address, Birthday, Phone num-
ber, Email address, Bank accounts, and username and password that you al-
ways use via online.
2. Always be mindful on what you share online
3. Do not just simply accept terms and conditions, permitting apps or software
to manipulate your mobile phone and computer data. Practice reading it al-
ways before deciding to accept terms.
4. Do not share your password with anyone.
5. Avoid visiting and entering untrusted and unknown websites.
6. Install antivirus software on your computer and always update it to the lat-
est.
7. Avoid downloading anything from untrusted websites.
8. Do not reply or click links from suspicious emails.