0% found this document useful (0 votes)
18 views

Rules of Netiquette

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Rules of Netiquette

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

RULES OF NETIQUETTE

NETIQUETTE IS A MADE-UP WORD FROM THE


WORDS NET AND ETIQUETTE. NETIQUETTE THUS
DESCRIBES THE RULES OF CONDUCT FOR RESPECTFUL
AND APPROPRIATE COMMUNICATION ON THE
INTERNET.
ACTIVITY : BELOW IS A QUESTIONNAIRE ABOUT HOW MUCH
INFORMATION YOU HAVE SHARED SO FAR. PUT A CHECK MARK
UNDER SHARED OR NOT SHARED
HOW SAFE ARE YOU?
INFORMATION SHARED NOT SHARED

1. First name

2. Last name

3. Middle name
INFORMATION SHARED NOT
SHARED
4. Current and previous school(s)
5. Cellphone number
6. Names of mother and father
7. Names of your siblings
8. Address
9. Home phone number
10. Birthday
ONLINE SAFETY AND SECURITY
INFORMATION RISK
1. First name There is a risk in sharing your first name.
Chances are, a hacker may already know
plenty of stuff about you even if you only
give out your first name. Likewise, you cannot
just walk in a room and start introducing
yourself to everyone.
You do not know whom you can come across
with.
INFORMATION RISK
2. Last name If sharing your first name is a small risk, having
both your first and last name is more risky. You
will be vulnerable to being searched for using
search engines, which include image search.
Matching a name with a face is a modus to
several cybercrimes like identity theft.
3. Middle name Sharing your middle name alone is probably
not the most risky of these shared information,
but sharing your full name would be.
INFORMATION RISK
4. Current and Most people who steal identities study their
previous school subject. They can use this information for
(s) verification purposes.

5. Cellphone Your cellphone number should never be posted


number on the internet. The internet is a public place. It
is the same as posting your number on a
billboard. You would not want random
strangers to text or call you, or worse, pretend
that they are someone else
INFORMATION RISK
6. Names of Risky, yet not as risky as posting their full
your mother names, especially your mother’s maiden name.
and father In fact, you may have already encountered
many websites that require your mother's
maiden name as an answer to a secret question
whenever you lose your password.
7. Names of Disclosing this is a huge risk. Srangers may
your siblings pretend or use their identity to dupe you.
INFORMATION RISK
8. Address Hopefully, you answered “no” to this one.
Giving the Internet your number is onething;
giving them your address is a whole other level.
It would much easier for criminals to find you.
9. Home phone Disclosing information is more risky than sharing
number your personal phone number. Scams usually use
this information to deceive you, one of which is
when a stranger pretends to know your parents
or pretends to be you
INFORMATION RISK
10. Birthday Letting people know your birthday is probably
a must if you want to get as many gifts as
possible. But having it in your profile makes you
vulnerable to identity theft

The Internet is defined as the information


superhighway. This means that anyone has access to
this highway, can place information and can grab
that information.
TIPS TO STAY SAFE ONLINE

1. Be mindful of what you share online and what you share it to.
2. Do not just accept terms and conditions; read them.
3. Check out the privacy policy stage of a website to learn how the
website handles the information you share
4. Know the security features of the social networking site you use.
By keeping your profile private, search engines will not be able to
scan your profile.
5. Do not share any of your password with anyone.
TIPS TO STAY SAFE ONLINE

6. Avoid logging in to public networks/wi-Fi. Browsing in “cognito”


(or private mode, a feature of the browser , will not protect you
from hackers.
7. Do not talk to strangers whether online or face to face
8. Never post anything about a future vacation. It is similar to
posting, “Rob my house at this date.”
9.Add friends you know in real life and refrain from adding
strangers
10. Avoid visiting untrusted websites
TIPS TO STAY SAFE ONLINE

11. Install and update an antivirus software on your computer. Use


only one antivirus software to avoid conflicts.
12. If you have wifi at home, make it private network by creating a
password
13. Avoid downloading anything from untrusted websites. You are
most vulnerable in peer to peer downloads (torrents) as the
download is most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
INTERNET THREATS
1.MALWARE
a. Virus – a malicious software program loaded into a user’s
computer without the users knowledge and performs malicious
actions and can be transferred from one computer to another
through the internet and local networks or data storage like
flash drives
b. Worm – stand alone malicious programs that can self
replicate and propagate via computer networks without human
help . An example is the I love you worm (Love Bug Worm)
created by a Filipino.
INTERNET THREATS
1.MALWARE
c. Trojan – a malicious program that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
1. Rogue security software – tricks the user into posing that it
is security software. It asks the user to pay to improve his/her
security but in reality, they are protected at all.
INTERNET THREATS
1.MALWARE
1. Rogue security software – tricks the user into posing that
it is security software. It asks the user to pay to improve his/her
security but in reality, they are protected at all.
INTERNET THREATS
1.MALWARE
d. Spyware – a program that runs in the background without
you knowing it (thus called “spy”). It has the ability to mintor what
you are currently doing and typing through keylogging.
1. Keyloggers- used to record the keystroke done by the users.
This done to steal their password or any other sensitive
information. It can record email, messages, or any information
you type using keyboard.
e. Adware- a program designed to send you advertisements,
mostly as pop-ups.
INTERNET THREATS
2. Spam – unwanted email mostly from bots or advertisers. It can
be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal information
like passwords and credit card details. This is done by sending you
an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card, or personal
information.
*Pharming- a more complicated way of phishing where it exploits
the DNS (Domain Name Service) system)
THINK BEFORE YOU CLICK
1. Before you post something on the web , ask these questions to
yourself : Would you want your parents or grandparents to
see it? Would you want your future boss to see it ? Once you
post something on the web , you have no control of who can
see you.
2. Your friends depend on you to protect their reputation online
. Talk to your friends about this serious responsibility
3. Set your post to " private . " In this way , search engines will
not be able to scan that post .
4. Avoid using names . Names are easy for search engines to
scan
THINK BEFORE YOU CLICK
5. If you feel that a post can affect you or other's reputation , ask
the one who posted it to take it down or report it as
inappropriate
COPYRIGHT INFRINGEMENT
If you create something – an idea, an invention, a form of
literary work, or a research, you have the right as to how it
should be used by others – Intellectual Property
Copyright Law includes your right over your work, and
everyone who uses it without your consent is punishable by law.
Tips to avoid copyright infringement
1. Understand – Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography,
and sculptures , but it generally does NOT protect underlying
ideas and facts. This means that you can express something
using your own words, but you should give credit to the
source.
2. Be responsible . Even if a material does not say that it is
copyrighted, it is not a valid defense against copyright. Be
responsible enough to know if something has a copyright.
Tips to avoid Copyright Infringement
3. Be creative . Ask yourself whether what you are making is
something that came from your own work or something made
out of somebody else's creativity . It is important to add your
own creative genius in everything that will be credited to you .
4. Know the law . There are some limitations to copyright laws . For
instance in the Philippines , copyrights only last a lifetime ( of the author
) plus 50 years . There are also provisions for " fair use , " which means
that an intellectual property may be used without a consent as long as it is
used in commentaries , criticisms , search engines , parodies , news
reports , research , library archiving , teaching , and education . If you
have doubts that what you are doing does not fall under the policy of fair
use , seek permission first .
Tips in Conducting Online Research
1. HAVE A QUESTION IN MIND
Focus on a question you want to be answered

2. NARROW IT DOWN
Ex. If you were to look for “Tom Sawyer”, the animation
series, you would better use the keywords “Tom Sawyer
Animation” rather than just “Tom Sawyer”
Tips in Conducting Online Research
3. ADVANCED SEARCH
Tips in Conducting Online Research
3. ADVANCED SEARCH
Tips in Conducting Online Research
3. ADVANCED SEARCH
Tips in Conducting Online Research
4. LOOK FOR CREDIBLE SOURCE
SCIENTIFIC JOURNALS, ESTABLISHED NEWS AND MAGAZINE
WEBSITES, ONLINE ECYCLOPEDIAS AND SCHOLARLY
ARTICLES

. edu - education
.com- commercial
.org- organization
.net - network
Tips in Conducting Online Research
4. LOOK FOR CREDIBLE SOURCE
Tips in Conducting Online Research
5. Give Credit
Name of the person or organization (the author of the
information). Title of the homepage in italics (title is
shown in title bar but is sometimes missing or
unrelated) URL. Date last seen.

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about


Bananas.”http://oleander.penz.com/random/bananal
ove.htm. Last viewed on September 7, 2015.
PERFORMANCE TASK 1

Directions : In not less than 300 words, compose an insightful


reflection paper on the nature of ICT in the context of your
lives, society and professional track (academic).
Criterion:
Responsiveness to the topic – 25 pts
Communication of ideas- 25 pts
Organization- 25 pts
Control of Mechanics (Sentence structure, grammar, spelling)- 15 pts
Length – 10 pts

You might also like