0% found this document useful (0 votes)
26 views

EmTech Module 2

The document discusses empowerment technologies related to online safety, security, ethics and etiquette. It covers topics like maintaining safety and security online, proper internet etiquette or "netiquette", common internet threats like malware, spam and phishing, protecting one's reputation online, and methods for effective online research and information seeking such as search engines, research indexing sites, MOOCs, employment websites and e-commerce sites. The document provides objectives, a table of contents and goes into details on each topic through explanatory text, lists, diagrams and examples.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

EmTech Module 2

The document discusses empowerment technologies related to online safety, security, ethics and etiquette. It covers topics like maintaining safety and security online, proper internet etiquette or "netiquette", common internet threats like malware, spam and phishing, protecting one's reputation online, and methods for effective online research and information seeking such as search engines, research indexing sites, MOOCs, employment websites and e-commerce sites. The document provides objectives, a table of contents and goes into details on each topic through explanatory text, lists, diagrams and examples.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

EMPOWERMENT TECHNOLOGIES

ONLINE SAFETY, SECURITY,


ETHICS AND ETIQUETTE
JONALD GRACE C. ZAFRA
Objectives
• Consider one’s and others’ safety when sharing
information using the internet;
• Consider one’s and others’ reputation when using
the internet;
• Determine and avoid dangers of the Internet;
• Be responsible in the use of social networking;
• Browse the Internet efficiently and properly
through proper referencing; and
• Browse the internet efficiently and properly
through proper referencing.
TABLE OF CONTENTS

01 02 03 04

RESEARCH
ONLINE
INTERNET AND
SAFETY AND NETIQUETTE
THREATS INROMATION
SECURITY
SEEKING
01
ONLINE SAFETY
AND SECURITY
EMPOWERMENT TECHNOLOGIES
ONLINE SAFETY Just like in the real
AND SECURITY world we are not
invulnerable to the
threats and dangers
present on the internet.
Anything we do
online can be viewed
TRUE OR FALSE?
and access by other
people, as well as to
grab whatever
information we put
there
TRUE
HOW
CAN YOU
STAY
SAFE
ONLINE?
TIPS TO
STAY SAFE
ONLINE
LISTEN VERY CAREFULLY
1.Be mindful of what you share
online and what site you share it
to.
2.Do not just accept terms and
conditions; read it.
3.Check out the privacy policy
TIPS TO STAY SAFE
page of a website to learn how the ONLINE
website handles the information
you share.
4.Know the security
features of the social
networking site you use.
5.Do not share password
with anyone.
6.Avoid logging in to public
networks/WI-FI. Browsing in
“incognito (or private) TIPS TO STAY SAFE
mode,” a feature of the ONLINE

browser, will not protect you CRTL + SHIFT + N


from hackers. INCOGNITO SHORTCUT
7.Do not talk to strangers
whether online or face-to-face.
8.Never post anything about a
future vacation.
9.Add friends you know in real
life.
10.Avoid visiting untrusted
websites. TIPS TO STAY SAFE
11.Install and update an ONLINE
antivirus software on your
computer.
12.If you have Wi-Fi at home
make it private network by
adding password.
13. Avoid downloading
anything from Untrusted
websites.
14.Buy the software; do not
use pirated ones. TIPS TO STAY SAFE
ONLINE
02
CORE RULES OF

NETIQUETTE
Etiquette Netiquette
the Proper a term used to describe
requirement proper etiquette and
s for social rules for online behavior
behavior. on the internet.
1. •Remember the human part
2. •Adhere to the same standards
of behavior online that you
follow in real life
3. •Know where you are in
cyberspace
4. •Respect other people’s time
and preferences
5. •Make yourself look good
6. •Share expert knowledge
7. •Help keep flame wars
under control.
8. •Respect other people’s
privacy
9. •Be forgiving of other
people’s mistake.
10. • Don’t abuse your power.
03
INTERNET
THREATS
MALWARE These are programs
designed to damage your
(MALICIOUS SOFTWARE) computer.
Virus - A malicious program that
replicates itself and damages computer
files
Worm - A malicious program that also
replicates itself and makes your
computer slow
Trojan - A malicious program that disguises itself as a
useful tool but once installed or downloaded it hacks
your computer to get sensitive information
MALWARE These are programs
designed to damage your
(MALICIOUS SOFTWARE) computer.

Spyware - A program that runs in the


background and monitors your every
action
Adware – A program designed to give
you ads that usually carry malware.
SPAM
(Not the Food)

Unwanted emails that


usually carry Malware
Phishing
(Not Fishing)
Its goal is to acquire sensitive
information like credit card
details. Commonly it is done
through emails
Pharming
(Not Farming)
is like phishing in that it is a
threat that tricks users into
divulging private information, but
instead of relying on email as the
attack vector, pharming uses
malicious code executed on the
victim’s device to redirect to an
attacker-controlled website.
is a cyber crime that uses
the phone to steal
personal confidential

Vishing
information from victims.
Often referred to as voice
phishing, cyber criminals
use savvy social
engineering tactics to
convince victims to act,
giving up private
information and access to
bank accounts.
PROTECTING
REPUTATIONS
ONLINE
Statement: Anything that we
post online can be
viewed or seen by
almost anyone.
How can we
protect
ourselves?
1. Conduct a Simple
Google Search: Ideally you must try to
search your name on
google at least once a
month for you to
determine if there will be
negative search results
about yourself.
2. Setup a comprehensive
Google Alert:
Google will notify you
of stories, posts,
comments, etc. as long
as your name is
associated with it.
3. Take advantage of people
search tools:

You may use


pipl.com, it will do a
thorough search on
you.
4. Don’t allow anyone to tag you pictures
or posts that might damage your
reputation:
Immediately ask the person
to untagged or take down
the post you were tagged
into because it might give
your image a bad reputation.
5. Think twice before you post:
Once posted
something online we
no longer have the
control on it.
6. Avoid copyright infringement:
let us avoid copying the
work of other people
because it is possible for
us to face copyright
infringement resulting
into imprisonment and a
fine.
04
RESEARCH AND
INFORMATION SEEKING
1. Web Search Engines:
These programs are designed to search or
mine the World Wide Web based on the
keywords provided by the user.
2. Research Indexing Sites:
These are Web sites dedicated to compile
and index researches done by the academic
researchers, engineers, social scientist,
and so on.
3. Massive Open Online Course
(MOOC):
These are web sites dedicated to teach
and inform users focused on
different areas. The delivery of
information is similar to a
classroom lecture setup, wherein
lectures and assignments are
delivered and submitted,
respectively, online.
4. Employment Websites:
These are websites that enable
companies to post job vacancies and
also accommodate job seekers by
providing a resume-submission
facility.
5. Electronic Commerce:
These are websites that enables
users to buy and sell online.
QUESTIONS?
THANK
YOU

CREDITS: This presentation template was created by Slidesgo,


including icons by Flaticon, and infographics & images by Freepik

Please keep this slide for attribution

You might also like