0% found this document useful (0 votes)
27 views107 pages

Online Safety Tips Against Malware

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views107 pages

Online Safety Tips Against Malware

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

EMPOWERMENT

TECHNOLOGIES
1
Review
We have defined ICT or Information Communication
and Technology.
Explained the effects of ICT in the Philippines from
different sectors
Tackled about the state of ICT existing worldwide, its
progress from Web 1.0 to Web 3.0.
Discussed Trends in ICT, current and existing trends
all over the world and its components and why are
they important.
2
ONLINE SAFETY, SECURITY,

ONLINE SEARCH SKILLS


Empowerment Technologies
3
ONLINE SAFETY,
SECURITY, ETHICS,
AND ETIQUETTE
and
CONTEXTUALIZED
ONLINE SEARCH AND
RESEARCH SKILLS
Empowerment Technologies 4
Learning Competency
 apply online safety, security, ethics, and
etiquette standards and practice in the use of
ICTs as it would relate to their specific
professional tracks

 use the Internet as a tool for credible research


and information gathering to best achieve
specific class objectives or address situational.
Objectives
At the end of this lesson, the students should be able to:
practice privacy of important information;
consider his/her reputation when using the Internet;
determine and avoid the dangers of the internet;
be a responsible user and content producer of new
media, and;
use the Internet as a tool for credible research and
information gathering

6
GUESS THE WORD

(W,V,I,S,R,U,T)

ANSWER:

V
_ _I R
_U_ _S
7
GUESS THE WORD

(P,R,I,C,Y,A,G,F,V)

ANSWER:

P_ R
_ _I V_ A
_C_ _Y
8
GUESS THE WORD

(E,R,I,N,C,S,I,T,U,Y)

ANSWER:

S_
_ E_
C _U _R_I T
_Y_
9
GUESS THE WORD

(A,C,G,H,D,E,Y,K,R)

ANSWER:

H
_A_C
_K E_
__ R
10
Think of this:

Am I Safe and Secured online?

How Safe and Secured are you


online?
11
INTERNET
Internet is defined as the
information superhighway

12
What kind of
information
do you
usually share
online?
13
14
INFORMATION
AT RISK
Empowerment Technologies

15
Information with RISK
Complete Name (First, Middle,
and Last)
Birthday
Address
E-Mail Address
Current & Previous School
Home and Cell Phone Numbers
Father’s and Mother’s Name
Sibling’s Name

16
HOW TO BE
SAFE ONLINE
Empowerment Technologies

17
ONLINE
SAFETY TIPS
Empowerment Technologies

18
SOME TIPS TO STAY SAFE ONLINE:
Be mindful on what you
share online

Do not just accept terms


and conditions, read it.

19
SOME TIPS TO STAY SAFE ONLINE:
Do not share
your password
with anyone.

20
21
Have a
good
Password

22
SOME TIPS TO STAY SAFE ONLINE:
Do not talk to
strangers whether
online or face-to-
face.

23
SOME TIPS TO STAY SAFE ONLINE:
Never post anything about a
future vacation.

24
SOME TIPS TO STAY SAFE ONLINE:
Add friends
you know in
real life.

25
SOME TIPS TO STAY SAFE ONLINE:
Avoid visiting untrusted
websites.

26
SOME TIPS TO STAY SAFE ONLINE:
Avoid
visiting
untrusted
websites.

27
SOME TIPS TO STAY SAFE ONLINE:
If you have WiFi at
home, make it private by
adding a password.

Install and update an


antivirus software on
your computer.
28
SOME TIPS TO STAY SAFE ONLINE:

Buy the software,


do not use pirated
ones.

29
SOME TIPS TO STAY SAFE ONLINE:
Do not reply or click
links from suspicious
emails.

Avoid downloading
anything from
untrusted websites.
30
SOME TIPS TO STAY SAFE ONLINE:
Don’t share
unreliable
information and
plagiarized,
always give
credits

31
ONLINE THREATS
Empowerment Technologies

32
Online Threats

MALWARE
stands for malicious
software
An umbrella term used to
refer to a variety of forms
of harmful or intrusive
software. 33
Types of Malware
A. VIRUS
a malicious program designed to
replicate itself and transfer from one
computer to another either through the
V – VITAL Internet and local networks or data
I - INFORMATION storage like flash drives and CDs.
R - RESOURCE This are typically attached to an
U - UNDER executable file or a word document
S - SIEGE
34
Types of Malware

B. WORM
a malicious program that replicates
itself through a network.
Worms may delete files, others
interrupt the network functions and
LOVEYOU worm other send junk mails from infected
computers.

35
Types of Malware
C. TROJAN
a malicious program that disguises as a
useful program but once downloaded or
installed, leaves your PC unprotected
and allows hackers to get your
information.
ROGUE SECURITY SOFTWARE —
tricks the user into posing that it is a
security software. It asks the user to pay
to improve his/her security but in reality,
they are not protected at all 36
Types of Malware

D. SPYWARE
a program that runs in the background
without you knowing it (thus called
“spy”). It has the ability to monitor what
you are currently doing and typing
through keylogging.

37
Types of Malware

E. ADWARE
a program designed to send you
advertisements, mostly as pop-ups.

38
Types of Malware

E. ADWARE
a program designed to send you
advertisements, mostly as pop-ups.

39
Online Threats

SPAM
unwanted email mostly
from bots or advertisers.
It can be used to send
malware.

40
Online Threats

PHISHING
is an attempt to acquire
information by
pretending to be a
trustworthy entity.

41
42
Online Threats

PHARMING
a more complicated
way of phishing
where it exploits the
DNS (Domain Name
Service) system.

43
HOW SHOULD WE
BEHAVE ONLINE?
Empowerment Technologies

44
What is NETIQUETTE?
interNET + etIQUETTE

set of rules for behaving properly online


( The Core Rules of Netiquette by Virginia Shea )

respecting other users’ views and


displaying common courtesy when
posting your views to online discussion
groups 45
10 Rules of NETIQUETTE
[Link] THE HUMAN

2. Adhere to the same standards of


behavior online that you follow in
real life

3. Know where you are in cyberspace


46
10 Rules of NETIQUETTE
4. Respect other people's time and
bandwidth

5. Make yourself look good online

6. Share expert knowledge

47
10 Rules of NETIQUETTE
7. Help keep flame wars under control

8. Respect other people's privacy

9. Don't abuse your power

[Link] forgiving of other people's


mistakes 48
THINK BEFORE YOU CLICK
Everyone’s own information is
important, we must keep this on to
ourselves and if ever shared by
others, we must learn to keep it.
Respect begets respect is also
applied in technology settings, not just
real life setting.
49
3 Quiz
rd

in EMTECH
REMAIN SILENT
DURING THE
QUIZ.
¼ SHEET OF
PAPER
ERASURES
ARE
WRONG!
Know
the
rules!
1. The fraudulent practice
of sending emails
purporting to be from
reputable companies in
order to induce individuals
to reveal personal
information, such as
passwords and credit card
numbers.
2. These malicious programs
can infect a user’s computer or
network, alter DNS settings, or
manipulate the host’s file.
When users try accessing a
legitimate website, they’re
unknowingly redirected to a
malicious site.
3. It is a malware that
misleads users of its true
intent by disguising itself
as a standard program.
4. Twitter is an example of
what type of social media?
5. These are sites that
allow users to post their
own news items or links to
other news sources.
6. It is a multitasking
operating system for
smart devices such as
Smart TVs and it has
been used as a mobile
operating system.
7. It is a mobile
operating system
developed by Google and
designed primarily for
touchscreen mobile
devices such as
smartphones and
tablets.
8. It refers to a mobile
operating system
created and developed
by Apple Inc. exclusively
for its hardware.
9. Refers to a group of
software or hardware
devices by which people
with disabilities can
access computers.
10. It has the ability to
monitor what you are
currently doing and
typing through
keylogging.
11. It refers to
different forms of
dangerous or
unwelcome
software.
12. It refers to
the combination
of technological
features in one
device.
13. These are sites
that allow you to
upload and share
media content like
images, music, and
video.
14. It is an interactive
experience that combines
the real world and
computer-generated
content.
15. It copied the
capability to do
tasks that were
originally found in
personal computers.
PERFORMANCE
TASK
Empowerment Technologies

71
DEADLINE:
September 27, 2023
Wednesday
You will be doing a short
video clip about the
problems within your
barangay, school, or
community. You have to
message me personally
about the final output.
You have your free will, you
may use your creativity in
presenting the problem
such as but not limited to
vlogging, reporting or
documenting.
PERFORMANCE TASK

75
ONLINE
SEARCHING
Empowerment Technologies

76
WHAT DO YOU THINK?

An article from RELIABLE


Wikipedia about
CoVID-19.
NOT RELIABLE

77
WHAT DO YOU THINK?

NOT RELIABLE
Wikipedia authors are anonymous, and any Wikipedia reader can
contribute information to most posted articles. Readers have no way of
knowing if authors and contributors are experts.

Wikipedia articles often provide lists of sources to consult, but these


also may or may not be reliable. Consult with caution!

78
ONLINE SEARCH
• Online Search - is the
process of interactively
searching for and
retrieving requested
information via a
computer from
databases that are
online.

79
SEARCH ENGINE
Search Engine – is a
software system that is
designed to search for
information on the World
Wide Web. The search
results are generally
presented in a line of
results often referred to
as search engine results
pages. 80
EXAMPLES OF
SEARCH ENGINE
Google [Link]
Bing Yandex
Yahoo DuckDuckGo
Baidu

81
TIPS IN CONDUCTING ONLINE
RESEARCH
Have a question in
mind.
Narrow it down.
Use Advanced search.
Look for credible
sources.
Give credit.
82
USE ADVANCED SEARCH

[Link]
USE
ADVANCED
SEARCH
WEBSITE CREDIBILITY
1. Check the Domain – Some domains such
as .com, .org, and .net can be purchased and used by any
individual.

.edu is reserved for colleges and universities


.gov denotes a government website.

These two are usually credible sources for information


CHECK THE DOMAIN

87
CHECK THE DOMAIN

88
CHECK THE DOMAIN
Be careful with the
domain .org, because .org is
usually used by non-profit
organizations which may
have an agenda of
persuasion rather than
education.

HyperText Transfer Protocol (HTTP)


HyperText Transfer Protocol Secure (HTTPS)
89
WEBSITE CREDIBILITY
2. Check the Author

 Information on the internet with a


listed author is one indication of a
credible site.
 Is the author affiliated to an academic
institution or credible organization?
CHECK THE AUTHOR

91
WEBSITE CREDIBILITY
3. Check the DATE
 By including a date, the website
allows readers to make decisions
about whether that information is
recent enough for their purposes.
 look for a "last updated" date on the
page or site.
CHECK THE DATE

93
WEBSITE CREDIBILITY
4. Check the SOURCE
 Credible websites, like books and
scholarly articles, should cite the
source of the information presented.

 Can information be verified through


another source?
GOOD SOURCE OF INFORMATION

Google Scholar allows the students


and educators to search across a
wide range of academic literature.

[Link]

95
GIVE CREDITS
Format in citing a reference :
Name of the person or organization (the
author of the information). Title of the home
page in italics (title is shown in title bar but is
sometimes missing or unrelated). URL. Date
last seen.
GIVE CREDITS
Example 1:
Lapiz, Adrian Harold L. “Oleander’s Fun
Facts about Bananas.”
[Link]
[Link] on September 7, 2015.
GIVE CREDITS
Example 2:
“Accounting: What you should know.”
Jargon Online Network.
[Link]
.[Link] on April 13, 2015
PLAGIARISM
What is intellectual property?

 is claiming attribution
for a work you did not
author, or using
someone else's work
without proper
attribution
INTELLECTUAL PROPERTY
What is intellectual property?

refers to creations of the


mind, such as inventions;
literary and artistic works;
designs; and symbols,
names and images used in
commerce
(Source: [Link]
INTELLECTUAL PROPERTY IS PROTECTED BY LAW
TYPES OF INTELLECTUAL PROPERTY

TYPES OF IP DEFINITION
1. Copyright • a legal term used to describe the rights
that creators have over their literary and
artistic works
• books, music, paintings, sculpture and
films, to computer programs, databases,
advertisements, maps and technical
drawings
COPYRIGHT INFRINGEMENT
The use of works protected by
copyright law without permission,
infringing certain exclusive rights
granted to the copyright holder
FAIR USE
Fair use means you can use copyrighted
material without a license only for certain
purposes. These include:
• Commentary
• Criticism
• Reporting
• Research
• Teaching
Fair use

Guidelines for Fair Use


• A majority of the content you create
must be your own.
• Give credit to the copyright holder.
• Don't make money off of the
copyrighted work.
Rubric
CRITERIA Points
Clarity and focus of the idea and based from
Ideas the set topic and the ability to holds the readers 5
attention.
The idea is organize which showcases and
Organization 5
enhances the central idea or the theme.
The writings have an easy flow and rhythm.
Sentence
Stanzas are well built with strong and varied 5
Fluency
structure that invites expressive oral reading
Creative idea and presentation of the literary
Creativity 5
work.
TOTAL 20
LET’S DO THIS: LET US ALL BE SAFE ONLINE
Create an acrostic poem on how can you
apply online safety, security and ethics and
how can we use internet as a reliable source
of information for research.
Use your First Name for applying online safety,
security and ethics
And your Last Name for using internet as a reliable
source of information for research
Make your acrostic poem creative (do it on a clean sheet of
bond paper or special paper if you have. you may use recycle
paper in making your output)
[Link]
d1/5b14d1b80ba533e118761b2df8f634a0--acrostic-poems-test-
[Link]
MY Reflection:

• I learned that __________________

• I enjoyed most on ______________________

• I want to learn more ____________________


108

You might also like