0% found this document useful (0 votes)
17 views74 pages

Digital Literacy Education Presentation in Teal Pink and Yellow Flat Graphi - 20250414 - 094554 - 0000

The document outlines the importance of digital and cyber literacy, emphasizing skills necessary for safe and effective engagement with technology. It covers key concepts such as cybersecurity, cyber citizenship, netiquette, and common computer threats, along with strategies for protection against these threats. Additionally, it provides guidelines for responsible online behavior and the ethical use of digital resources in educational settings.

Uploaded by

Clirk Alemania
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views74 pages

Digital Literacy Education Presentation in Teal Pink and Yellow Flat Graphi - 20250414 - 094554 - 0000

The document outlines the importance of digital and cyber literacy, emphasizing skills necessary for safe and effective engagement with technology. It covers key concepts such as cybersecurity, cyber citizenship, netiquette, and common computer threats, along with strategies for protection against these threats. Additionally, it provides guidelines for responsible online behavior and the ethical use of digital resources in educational settings.

Uploaded by

Clirk Alemania
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

Module 9:

DIGITAL/CYBER
LITERACY
Alemania, Michael G. Reporter
Learning Outcomes
1. Define digital/cyber literacy and cybersecurity
2. Elaborate on cyber citizenship
3. Determine netiquette and safety use of digital
media
4. Identify common computer threats and the
corresponding fixing solutions
5. Elucidate cyberbullying and cybercrimes
6. Examine Internet exploration, source citation,
research and data gathering protocols and
website evaluation
Learning Outcomes
1. Cite how digital/cyberliteracy may be
integrated with teaching-learning
2. Draw relevant life lessons and significant values
from personal experiences on digital risks and
consequences
3. Analyze research abstract on digital/cyber
literacy and its implications to the teaching-
learning process
4. Produce and evaluate a digital tool that may be
5. utilized in the classroom
What is Digital
Literacy?
Digital Literacy

According to Wikipedia, digital literacy is the set of


competencies required for full participation in
society that includes knowledge, skills, and
behaviors involving the effective use of digital
devices for purposes of communication, expression,
collaboration and advocacy.
Digital Literacy

Simply, it is the ability of an individual to engage


with the digital environment and operate
technologies safely by knowing what to do and
what not to do and how to avoid unnecessary risks.
Digital Literacy

Digital literacy is an individual's ability to access


both information and methods of communication
through technological tools, such as smartphones,
tablets, laptops and desktop PCs. While digital
literacy is initially focused on digital skills and
stand-alone computers, its focus has shifted to
network devices, including the Internet and the use
of social media.
Why is Digital Literacy Important?
Digital literacy teaches students how to engage
with digital technology in cognitive and creative
ways.
It informs us of critical analysis and ethical use of
the web.
Digital literacy promotes safe online practices.
It empowers students to thrive in a rapidly
advancing technological environment in a
responsible, socially competent, and effective way.
What is
Cybersecurity ?
Cybersecurity

Cybersecurity the practice of protecting


systems, networks and programs from digital
attacks (Cisco, n.d.). These cyberattacks are
usually aimed at accessing, changing, or
destroying sensitive information; extorting
money from users; or interrupting normal
business processes.
Cybersecurity

Implementing effective cybersecurity measures


is challenging because there are more devices
than people, and attackers are becoming more
innovative.
Here are some tips on how to protec yourself
against cyber threats
Monitor behavior on Understand how best
social networks to use passwords

Keep devices safe Handle unsafe content

Consider safety for


the future
Monitor behavior on social networks

Before posting or uploading something online,


try to realize: (a) Does this need to be
public?; and (b) Is it worth the risk?
Remember, not only what we share online is
available to friends and family, but also to
cybercriminals.
Here are some tips on how to protec yourself
against cyber threats
Monitor behavior on Understand how best
social networks to use passwords

Keep devices safe Handle unsafe content

Consider safety for


the future
Keep devices safe

Protect your technology tools by installing Anti-


virus software, a configuration oi settings on
the devices and by completing software
updates.
Here are some tips on how to protec yourself
against cyber threats
Monitor behavior on Understand how best
social networks to use passwords

Keep devices safe Handle unsafe content

Consider safety for


the future
Understand how best to use passwords

Passwords need to be complex and hard to


guess, but can still be remembered. One
strategy is "passphrase" or a password that
comes from the first letter of each word in the
phrase. There is also a password manager app
to help keep track of all the passwords called
"KeePass" which is free of charge. Importantly,
do not use the same password for all accounts.
Here are some tips on how to protec yourself
against cyber threats
Monitor behavior on Understand how best
social networks to use passwords

Keep devices safe Handle unsafe content

Consider safety for


the future
Handle unsafe content

Know exactly how to respond or react to


unsafe situations online, such as (1) suspicious
emails; (2) pop-ups claiming that your
computer is infected; and (3) BitTorrent sites.
Here are some tips on how to protec yourself
against cyber threats
Monitor behavior on Understand how best
social networks to use passwords

Keep devices safe Handle unsafe content

Consider safety for


the future
Consider safety for the future

Take individual responsibility in using devices


with an utmost care and critical thinking when
online.
What is Cyber
Citizenship?
Cyber Citizenship

Cyber citizenship refers to being responsible when


using the Internet. Doing online when no one is
looking speaks a lot about one's character and
morals. The power of this digital world is associated
with responsibilities and consequences. Therefore, we
can explore and navigate all information available
online however.we should observe cyber citizenship
or manners and etiquette on the Web.
How to be a
Good Cyber
Citizen?
Ways on How to be a Good Cyber Citizen

The enlisted ways of becoming a good cyber citizen


would guide everyone on his/her digital operations
and information processing and would prevent
anyone from further consequences, distractions,
moral damages and risks.
Ways on How to be a Good Cyber Citizen

1. Be careful and critical for whatever you post


online that could be visible to the public even if on
a "private" page through tagging by a friend.
Ways on How to be a Good Cyber Citizen

2. If you have a problem with someone, go to that


person or an adult to help work it out, instead of
posting your expression online.
Ways on How to be a Good Cyber Citizen

3. Use the Internet to help you with your schoolwork,


but give credit to the sources you use and critically
analyze everything you search online.
Ways on How to be a Good Cyber Citizen

5. Make sure you verify an information before you


share it or use it in a project and check on accuracy
and fruth in the information you search on the web.
Ways on How to be a Good Cyber Citizen

6. Give out certain information only.


7. Don't answer questions that make
you uncomfortable.
Ways on How to be a Good Cyber Citizen

8. Always make sure you have told a reliable adult if


you decide to meet someone you knew through the
Internet.
Ways on How to be a Good Cyber Citizen

9. Always be aware of copyright laws and give credit


to whom an article or a part of it is due.
Ways on How to be a Good Cyber Citizen

10. Use only the computers that you are allowed to use.
Avoid hacking.
Importance of Cyber Citizenship
1. It keeps the Internet free from hurtful statements.
2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for
what they have created.
4. More criminals or bullies can be caught when kids
are honest and talk to adults.
5. It keeps information private.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
1. Make sure you have the correct address (with proper spelling), correct link
and you are sending the information to the right person when doing it
online.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
2. Check information before sending or posting any message and avoid
false statements and information on the web or forwarding junk mail or
chain letters to family or friends.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
3. Re-read what you wrote to make sure it is what you want to
say and the other person would interpret it the same way.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
4. Keep your comments clean and don't confront others online or
say anything that could be hurtful to them.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
5. Keep your personal and friends' information private and don't
forward information that was just given to you without his/her
permission.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
6. Watch out for spam and other fraud e-mails and never reply to
them.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.

7. If you are going to write something personal or private, think twice


because messages can get misdelivered.
Proper Netiquette
Follow these simple rules to ensure that you make wise choices when
sending messages online.
8. Adults should monitor kids' messages, especially when theyare sending
e-mails to others without permission.
The Ten Commandments of Teacher Cyber Citizenship

At some point, misuse and abuse of technology may also happen in schools
involving teachers with their students, colleagues and others. The following
are reminders to teachers regarding the use of media tools.
The Ten Commandments of Teacher Cyber Citizenship

1. Thou shall not post any personal matter, confidential information and
obscene pictures and messages online that can be accessed by students
and parents.
2. Thou shall not respond or thread to any personal message
created by students online other than those school-related.
3. Thou shall not lend or let students access your cellphone.

4. Thou shall not give your email password to students.


The Ten Commandments of Teacher Cyber Citizenship

5. Thou shall not use concepts and information from texts and
references without the author's citation.
6. Thou shall not post to any social media account, for whatever
purposes, the pictures of students without their or their parents'
consent.
7. Thou shall not express sentiments, disappointments and
disagreements against superiors, colleagues, students and their
parents using their social media accounts.
The Ten Commandments of Teacher Cyber Citizenship

8. Thou shall not use data from Internet sources in any


documents like lesson plans, researches and requirements
without the consent of the author.
9. Thou shall not give any personal data or other's information to
anyone unless for specific purposes and given the consent.
10. Thou shall not post any student data publicly online including
academic rankings, school records, class outputs and record of
grades. De Leon (2019)
Internet Safety

Internet safety, online safety or cyber safety means trying to be safe


on the Internet. It is maximizing the user's personal safety and security
risks to private information and property associated with using the
Internet, including self-protection from computer crime. As the number
of Internet users continues to grow worldwide, issues and concerns
also continuously exist.
Information Security

Sensitive information, such as personal information, identity and


passwords are often associated with personal property and privacy
and may present security concerns if leaked.Unauthorized access and
usage of private information may result in consequences, such as
identity and property theft.
Information Security
Common causes of information security breaches include:

1. Phishing. It is a common type of scam, of which the scammers


disguise as a trustworthy source in an attempt to obtain private
information, such as passwords, credit card information, etc. through
the use of fake websites that look identical and legitimate.

2. Internet scams. These are schemes that deceive the users


in various ways in an attempt to take advantage of them.
Information Security
Common causes of information security breaches include:

3. Malware. It is a malicious software (particularly spyware) disguised


to collect and transmit private information, such as password without
the user's consent or knowledge, of which it is impossible to determine
whether a file is infected.
Personal Safety and Threats
The growth of the Internet gave rise to many important services accessible to anyone
with a connection, such as digital communication. While it allows communication with
others, it is also being grabbed by malicious users for bad intent.

The following are common threats to personal safety.

1. Cyberstalking. It is the use of the Internet or other electronic means to stalk or


harass an individual, group or organization through false accusations, defamation,
slander and libel, intentional monitoring, identity theft, threats, vandalism, solicitation
for sex, or gathering information that may be used to threaten, embarrass or harass
Personal Safety and Threats
The following are common threats to personal safety.

2. Cyberbullying. It is the use of electronic means, such as instant messaging, social


media, e-mail and other forms of online communication with the intent to abuse,
intimidate, or overpower an individual or group.
Personal Safety and Threats
The following are common threats to personal safety.

3. Online predation. It is the act of engaging an underage minor into inappropriate


sexual relationships through the Internet. Online predators may attempt to initiate and
seduce minors into relationships through the use of chat rooms or Internet forums.

The behavior characteristics are categorized into three groups:


A) Manipulative - typically a child molester;
B) Opportunist - typically a rapist; and
C) Coercive being a mixture of both rapists and child molesters
Personal Safety and Threats
The following are common threats to personal safety.

4. Obscene/offensive content. Various websites on the Internet contain material that


may deem offensive, distasteful or explicit, which may often not be of the user's liking.
Such websites may include the Internet, shock sites, hate speech or otherwise, and
inflammatory content. Such content may manifest in many ways, such as pop-up ads
and unsuspecting links.
Personal Safety and Threats
The following are common threats to personal safety.

5. Sextortion. It is the use of webcams for flirting and cybersex. Often, this involves a
cybercriminal posing as someone else, such as an attractive person initiating
communication of a sexual nature with the victim. The video is recorded by the
cybercriminal to demand money or other services, threaten to publicly release the video
and send to family members and friends of the victim if they do not comply
Computer Threats and Fixing Solutions

IT security is a growing concern as cyber threats continue to rise. A threat in computer


security refers to anything that can potentially harm a system, leading to attacks on
networks. Cybercriminals steal sensitive information, such as financial and personal
details, for profit. Viruses, once primarily spread through email, can now enter systems
via USB devices, downloads, infected websites, social media messaging, file sharing,
and remote access. Once inside a network, they spread rapidly, causing significant
damage.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all
computers, including all servers, PCs and laptops.

2. Ensure that the anti-virus software is up-to-date. New


computer viruses are being released daily and so it is essential
that computers are protected by keeping the anti-virus
software-up-to-date
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

3. Employ a firewall to protect networks. As computer viruses can spread by means


other than email, it is important that unwanted traffic is blocked from entering the
network by using a firewall.

4. Filter all email traffic. Example of emails with certain file


attachments commonly used by computer viruses to spread
themselves, such as EXE, .COM and SCR files. These should be
prevented from entering the network.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to
never open an attachment or to click on a link in an email they are not expecting.

6. Scan Internet downloads. Ensure that all files downloaded from


the Internet are scanned against computer viruses from one central
point on the network.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

7. Do not run programs of unknown origin. It is important to use a trusted source for
software requirements to be installed and ensure it can be accounted for.

8. Implement a vulnerability management system. It is important to regularly review


network and the applications running on it for new vulnerabilities and a plan on how
to manage them, either by patching or upgrading them using tools, such as firewalls
or Intrusion Detection Systems that should be put in place.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

9. Make regular backups of critical data. There is a need to keep important files on
removable media, such as portable drives or tape for back-up in the event that the
network is infected with a computer virus.

10. Develop an Information Security Policy. The creation and publication of an


Information Security Policy is key to ensuring that information security receives the
profile it requires in order to secure the systems and data.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

11. Monitor logs and systems. Regular monitoring of network and system logs can assist
in the early identification of a computer virus infecting the network or other attacks by
criminals.

12. Develop an Incident Response Plan. The incident response plan outlines the roles
and responsibilities of people in the event of a computer virus infecting the network or
any other type of security breach.
Computer Threats and Fixing Solutions
Given the numerous ways a computer virus can spread, the following are ways on how
to ensure that computer networks can be protected.

13. Restrict end-user access to the systems. Where possible, end users are prohibited
from access to the system so that the virus will also be restricted.
Cyberbullying
Cyberbullying, cyberharassment or online bullying is a form of bullying or harassment
using electronic means usually among minors in a school setting and has become
increasingly common, especially among teenagers.

It is a deliberate and repeated act of harming someone through


electronic communication. The National Crime Prevention Council
defines it as using the Internet, cell phones, or other devices to send
harmful messages or images. This includes threats, harassment, false
accusations, public humiliation, hacking, and spreading false
information to damage a person’s reputation.
Cyberbullying
Cyberbullying is similar to traditional bullying, It is just that victims may not know the
identity of their bully and the reason for bullying them. Cyberbullies may disclose
victims' personal data on websites or forums-called doxing, or may use impersonation,
and create fake accounts, comments or sites for the purpose of publishing material in
their names. This can leave the cyberbully anonymous and difficult to be caught or
apprehended for his/her behavior
Cyberbullying
Cyberbullying types. There are various types of cyberbullying and research has
revealed serious profound consequences on victims.

1. Internet trolling is a common form of bullying over the Internet in an online community
to elicit a reaction, disruption or intentionally provoke and offend others.

2. Cyberstalking is another form of bullying or harassment that uses electronic


communication to stalk a victim and pose a credible threat to harass him/her.
Cyberbullying
Implications of bullying in schools. Schools should initiate various anti-bullying programs
and campaigns to protect students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in handling bullying cases
and executing teaching strategies to address and reduce bullying cases in class. Also,
schools should conduct student empowerment activities that can be engaged in by
students, including the bullies to divert their attention and energy into something
worthwhile and engagements that they can be busy about.
Cyberbullying
Implications of bullying in schools. Schools should initiate various anti-bullying programs
and campaigns to protect students from being threatened or victimized by such
offense. More so, teachers should be oriented and trained in handling bullying cases
and executing teaching strategies to address and reduce bullying cases in class. Also,
schools should conduct student empowerment activities that can be engaged in by
students, including the bullies to divert their attention and energy into something
worthwhile and engagements that they can be busy about.
Cybercrime
Avast defines cybercrime as any criminal activity carried out
using computers or the Internet. Cybercrime uses tools like
phishing, viruses, spyware, ransomware and social engineering to
break the law (https://www.avast.com/c-cybercrime).

On the other hand, cybercrime is defined by Techopedia as a


crime with the computer as the object of the crime (i.e.
hacking, phishing, spamming) or is used as a tool to commit
an offense (i.e. child pornography, hate crimes).
Cybercriminals may use computer technology to access
personal and confidential information or use the Internet for
exploitative or malicious purposes.
Cybercrime

There is a wide variety of cybercrimes, which can broadly be


placed into two categories: one-off crimes, such as installing a
virus that steals your personal data; and ongoing crimes, such as
cyberbullying, extortion, distributing child pornography or
organizing terrorist attacks (https://www.avast.com/c-
cybercrime).
Cybercrime

Cybercrime may also be referred to as computer crime


practiced by those who have technological skills and use the
Internet to achieve their bad motive. Cybercriminals employ their
diverse skill to access bank accounts, steal identities, blackmail,
defraud, stalk, and harass or use a compromised computer to
attack their victims. Criminals can also use computers for
communication and document or data storage and those, who
perform these illegal activities, are often referred to as hackers.
Cybercrime

On the other hand, malware downloaded from the computer


may slow it down and prompt it to give error messages. Likewise,
phishing attacks usually involve receiving emails from unknown
sources while trying to trick someone into giving up his/her
passwords or personal data. Keyloggers leave their own telltale
signs, like strange icons, or duplicating the messages.
Cybercrime

Techopedia cites common types of cybercrime that include


online bank information theft, identity theft, online predatory
crimes, unauthorized computer access, and the most serious one
like cyberterrorism. Cybercrime encompasses a wide range of
activities that can be categorized as: (1) crimes that target
computer networks or devices, including viruses and denial-of-
service (DoS) attacks; and (2) crimes that use computer networks
to advance other criminal activities, including cyberstalking,
phishing and fraud or identity theft.
(https://www.techopedia.com/definition/2387/cybercrime)

You might also like