ONLINE SAFETY,
SECURITY, ETHICS
AND ETIQUETTE
STANDARD
MOST ESSENTIAL LEARNING
COMPETENCIES:
• Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate
to their specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b- 2)
After going through this module, you are expected to:
a. determine the dangers of the internet
b. consider one’s safety when sharing information on
the internet
c. Be responsible in the use of social networking sites
LIST OF
CONTENTS
ONLINE SAFETY Security
Introduction
Ethics
Etiquette Standards
INTRODUCTIO
N
We have learned in lesson 1 about the current state
of Information and Communication Technology in
global setting. There are various online platforms
and sites that people used today as their medium of
communication and source of information. This
communication technology spread fast to the people
and even controls their lives. Despite of the good
benefits given to us by the technology there are
stills things that we must be aware of. In this lesson
Online
Safety
The importance of internet plays a crucial part in
human development. Life becomes easy and
comfortable because of this technology. Most of us are
connected to the internet via laptop, mobile phone,
tablet, personal computer and other electronic
gadgets. Behind this technology there is a risk that
everyone should be aware of. You could be at risk on
scam, bullying, and illegal activities if you will not take
precautions in using internet. We need to keep
ourselves safe and secure whenever we use the
internet. That is why it is very important to know and
learn the ways on how to be safe and secured online.
Here are some tips to help you
stay safe when using the
internet:
1. Be mindful of what you share and what site you
share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking
site you use.
6. Logging into public networks/Wi-Fi is a bad idea. Hackers' ability
to position themselves between you and the connection point is
one of the most serious dangers to free WiFi. As a result, instead of
speaking directly with the hotspot, you send your data to the
hacker. Any information you provide or gain access to on these
networks is gone in a blink of an eye.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. You are inviting
theburglarto rob your house at that date.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. On your computer, install and update antivirus software. To
avoid conflicts, use only one antivirus software.
12. If you have a Wi-Fi at home, make it a private network by
adding a password.
13. Downloading anything from untrusted websites is a bad idea.
Malware can infect your computer if you visit certain websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails. if you havea
Wi-Fi at home, make it a private network by adding a password.
Internet risk
CYBERBULLYING
It happens when someone CYBER STALKING
intentionally abused, harass, and A criminal practice where
mistreated by electronic communication is
other person using electronic used to stalk or harass
communication. individual or group.
IDENTITY THEFT
It is a crime of stealing personal
information for the purpose of SEXTING
assuming that The act of sending sexually
person’s name or identity to make explicit text messages,
any form of transactions. images, and videos..
INTERNET
THREATS
Spam -also known as junk email or unwanted email send by advertiser
or bot. It can be used to send malware.
Phishing -a cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
Cybercrime -a crime in which computer is used as object and tool in
committing a crime such hacking, phishing, spamming, child
pornography, libel, hate crimes, identity thief and others.
Pharming- is a more sophisticated form of phishing that takes
advantage of the DNS system. Pharmers frequently construct web pages
that look like those of a reputable company, such as an online banking
log-in page. Users will then submit their credentials, assuming they are
logging in to their regular service, and the pharmer will steal their
credentials.
MALWARE – also known as Malicious Software.
TYPES OF MALWARE
1. Virus – a malicious program that replicate itself by copying itself
to another program.
2. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take control of your
computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from
victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several
6. Keylogger – A program that runs in the background and
steals user credentials and confidential information and send
back to hack by recording every keystroke that a user makes
on their computer or device.
7. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the
ransom through online method for the removal of the virus.
8. Rogue Security Software- This is a form of malicious
software and internet fraud that misleads users into believing
there is a virus on their computer and aims to convince
themto pay for a fake malware removal tool that actually
NETIQUETTE
is a short for "Internet etiquette," and it is a cod
appropriate online behavior that is similar to polite
in society. Email,
social media, online chat, web forums, website
comments, multiplayer
gaming, and other forms of online communication
all examples of this.
The Core Rules of Netiquette by Seth T.
Ross
1. Remember the human.
2. Adhere to the same standards of behavior
online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and
bandwidth.
5. Make yourself look good online.
M
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's
mistakes
6. Stick to the topic when posting in
online forums or when commenting
on photos or videos, such as
1. Avoid posting inflammatory or YouTube or Facebook comments.
offensive comments online (aka
flaming). 7. Don't swear or use offensive
language.
2. Respect others' privacy by not
sharing personal information, 8. Avoid replying to negative
photos, comments with more negative
or videos that another person may comments.
not want published online. Instead, break the cycle with a
positive post.
3. Never spam others by sending 9. If someone asks a question and
large amounts of unsolicited email. you know the answer, offer to help.
4. Show good sportsmanship when 10. Thank others who help you
playing online games, whether you online
win or lose.
5. Don't troll people in web forums
What I Can do
Activity 1: Shout Your Mind
Directions: Make a poster with a theme “think before you click”. Use a 1/8
illustration board or cartolina
THANK
YOU