0% found this document useful (0 votes)
23 views

Lesson 2 Rules of Netiquette

Uploaded by

makmaklacbanes03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Lesson 2 Rules of Netiquette

Uploaded by

makmaklacbanes03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

ONLINE SAFETY, SECURITY,

ETHICS, AND ETIQUETTE


EMPOWERMENT TECHNOLOGIES
Consider one’s and other’s reputation and safety when
sharing information using the internet; LESSON
OBJECTIVES
Determine and avoid the dangers of the Internet;

Be responsible in the use of social networking sites; and

Browse the Internet efficiently and properly through proper


referencing.
In these times, more and more people are
ONLINE already engaged in the use of technology.
SAFETY, These people who are raised in a digital,
SECURITY, media-saturated world are called digital
AND natives.
NETIQUETT
E
The Internet, truly, is a powerful tool.
 It can be used to promote your business, gain
ONLINE friends, and stay in touch with the old ones.
 Source of entertainment through games,
SAFETY online communities, etc.
AND
SECURITY
“Other side of the coin”
 Most dangerous places.
HOW SAFE ARE YOU?
Online safety refers to the practices and precautions that should be observed
Types of Information Risks
1. First Name There is a risk in sharing your first name. Chances are,
a hacker may already know plenty of stuff about you
even if you only give out your first name. Likewise,
you cannot just walk in a room and start introducing
yourself to everyone. You do not know whom you can
come across with.
2. Last Name If sharing your first name in a small risk, having both
your first and last is more risky. You will be vulnerable
to being searched for using search engines, which
include image search. Matching a name with a faces is
a modus to several cybercrimes like identity theft.
HOW SAFE ARE YOU?
Types of Information Risks
3. Middle Name Sharing your middle name alone is probably not the
most risky of these shared information, but sharing
your full name would be.
4. Current and Previous Most people who steal identities study their subject.
School(s) They can use this information for verification
purposes.
5. Your Cellphone Your cellphone number should never be posted over
Number the internet. The internet is a public place. It is the
same as posting your number on a billboard. You
would not want random strangers to text or call you, or
worse, pretend that they are someone else.
HOW SAFE ARE YOU?
Types of Information Risks
6. The name of your Risky, yet not as risky as posting their full names,
mother and father especially your mother’s maiden name. In fact, you
may have already encountered many websites that
require your mother’s maiden name as an answer to a
secret question whenever you lose your password.
7. The name of your Disclosing that is a huge risk. Strangers may pretend or
siblings use their identity to dupe you.
8. Your address Giving the Internet your number is one thing; giving
them your address is a whole other level. It would be
much easier for criminals to find you.
HOW SAFE ARE YOU?
Types of Information Risks
9. Your home phone This shared information is more risky than sharing
number your personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends to
be you.
10. Your Birthday Letting people know your birthday is probably a must
if you want to get as many gifts as possible. But
having it in you profile makes you vulnerable to
identity theft.
Never give any personal information about yourself over the
internet. TO AVOID THESE ONLINE CRIMES, FOLLOW
THE ONLINE SAFETY MEASURES:
Do not give any banking or sensitive information unless you are
sure that it is a reputable business having a secure service.

Regularly review your privacy settings in your online accounts to


make sure you are not sharing important personal information.

Do not download or install software or anything on your computer


or cell phone that is unknown to you.
Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read it.
Check out the privacy policy page of a website to learn how the website handles
the information you share.
Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in “incognito” (or private)
mode, a feature to the browser, will not protect you from hackers.
Do not talk to strangers whether online or face-to-face.
Never post anything about a future vacation. It is similar to posting “Rob my
house at this date”.
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflicts.
If you have a Wi-Fi at home, make it a private network by adding a password.
Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer downloads (torrents) as the download is most likely not
monitored by the site owner.
But the software; do not use pirated ones.
Do not reply or click links from suspicious emails.
HERE ARE SOME WAYS YOU CAN
CHECK IF A WEBSITE IS
TRUSTWORTHY.

RELIABLE WEBSITES UNRELIABLE


WEBSITES
Usually end in .edu or .gov Might end in .com
Don’t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable source
INFORMATION
SUPERHIGHWAY
Access

Place Information

Grab Information
INTERNET THREATS
1. Malware – stands for malicious software
a. virus – a malicious program designed to replicate itself and
transfer from one computer to another either through the Internet and local
networks or data storage like flash drives and CDs.
b. worm – a malicious program that transfers form one computer to
another by any type of means. Often, it uses a computer network to spread
itself.
c. Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
INTERNET THREATS
*Rogue security software – tricks the user into posing that is a
security software. It asks the user to pay to improve his/her security but
in reality, they are not protected at all.
d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keylogger – used to record the keystroke done by the users. This is
done to steal their password or any other sensitive information. It can
record email, messages, or any information you type using your
keyboard.
INTERNET THREATS
e. Adware – a program design to send you advertisements, mostly as
pop-ups.
2. Spam – Unwanted email mostly from bots or advertisers. It can be used to
send malware.
3. Phishing – Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an email that
will direct the user to visit a website and be asked to update his/her username,
password, credit card, or personal information.
*Pharming – a more complicated way of phishing where it exploits
the DNS (Domain Name Service) system.
A combination of the words
network and etiquette. It is a set of
NETIQUET rules for behaving properly online.
TE
10 Rules of Netiquette
The Core Rules of Netiquette Rule 5: Make yourself look good online.

Rule 1: Remember the Human Rule 6: Share expert knowledge/

Rule 2: Adhere to the same standards of Rule 7: Help keep flame wars under control.
behavior online that you follow in real life.
Rule 8: Respect other’s people’ privacy.
10 RULES OF NETIQUETTE
Rule 3: Know where you are in cyberspace.
The core Rules of Netiquette
Rule 9: Don’t abuse your power.
Rule 4: Respect other people’s time and
bandwidth. Rule 10: Be forgiving of other people’s
mistake.
A series of flame posts on messages in a
thread that are considered derogatory in
nature or are completely off-topic.

Often these flames are posted for the sole


purpose of offending or upsetting other
users.

The Flame becomes a flame war when


other users respond to the thread with their
own flame message.
ASSESSMENT
TRUE or FALSE
Write T if the statement is correct, otherwise write F
1. Philippines is the “ICT hub of the World”.
2.Blogging sites are sites that focus on short updates.
3.Android is a mobile operating system for Apple devices.
4.Folksonomy deals with information tagging.
5.ICT deals with the use of different technologies to work on a
similar goal or task.

You might also like