Empowerment Technologies: Ict For Professional Tracks: Online Safety and Security, Ethics, and Etiquette
Empowerment Technologies: Ict For Professional Tracks: Online Safety and Security, Ethics, and Etiquette
ONLINE SAFETY
There's almost no limit to what you can do online. The Internet makes it possible to access information more.Computers can often give
us a false sense of security.
NETIQUETTE
It is a coined or portmanteau term of network and etiquette.
It is a set of ideal rules and conduct that a netizen should observe.
Netizen – person who is a member or part of the online community.
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details.
AVOIDING SPAM AND PHISHING
From email to instant messaging to social media, the Internet is an essential
communication tool. Unfortunately, it's also popular among scammers and
cybercriminals. To protect yourself from email scams, malicious software, and
identity theft, you'll need to understand how to identify and avoid potentially
dangerous content in your inbox, including spam and phishing attempts.
• Dealing with spam
If you've ever received unwanted email advertisements, you may already be
familiar with spam, also known as junk email. Spam messages can clutter your
inbox and make it more difficult to find the emails you actually want to read. Even
worse, spam often includes phishing scams and malware, which can pose a serious risk to your computer. Fortunately, most email
services now include several features to help you protect your inbox from spam.
• Spam filters
Whenever you receive an email, most email providers will check to see if it's a real message or spam. Any likely spam messages
will be placed in the spam folder so you don’t accidentally open them when checking your email.
Spam-blocking systems aren’t perfect, though, and there may be times when legitimate emails end up in your spam folder. We
recommend checking your spam folder regularly to make sure you aren’t missing any important emails.
PHISHING
Phishing scams are messages that try to trick you into providing sensitive information. These often appear to come from a bank or another
trusted source, and they'll usually want you to re-enter a password, verify a birth date, or confirm a credit card number. Phishing messages
may look real enough at first glance, but it’s surprisingly easy for scammers to create convincing details.
Phishing is the act of attempting to acquire information such as username, password and credit card details as a trustworthy entity in an
electronic communication.
Types of Phishing:
• Deceptive
• Malware-Based
Effects of Phishing:
• Internet fraud
• Identity theft
• Financial loss to the original institutions
• Erosion of Public Trust in the Internet.
Remember:
1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.
Copyright Infringement
If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by
others. This is called intellectual property.
The internet Security is very important. People get addicted to Internet very easily. Internet is tempting, We don't know when we started
browsing and when we finished.