EmTech Module 2
EmTech Module 2
01 02 03 04
RESEARCH
ONLINE
INTERNET AND
SAFETY AND NETIQUETTE
THREATS INROMATION
SECURITY
SEEKING
01
ONLINE SAFETY
AND SECURITY
EMPOWERMENT TECHNOLOGIES
ONLINE SAFETY Just like in the real
AND SECURITY world we are not
invulnerable to the
threats and dangers
present on the internet.
Anything we do
online can be viewed
TRUE OR FALSE?
and access by other
people, as well as to
grab whatever
information we put
there
TRUE
HOW
CAN YOU
STAY
SAFE
ONLINE?
TIPS TO
STAY SAFE
ONLINE
LISTEN VERY CAREFULLY
1.Be mindful of what you share
online and what site you share it
to.
2.Do not just accept terms and
conditions; read it.
3.Check out the privacy policy
TIPS TO STAY SAFE
page of a website to learn how the ONLINE
website handles the information
you share.
4.Know the security
features of the social
networking site you use.
5.Do not share password
with anyone.
6.Avoid logging in to public
networks/WI-FI. Browsing in
“incognito (or private) TIPS TO STAY SAFE
mode,” a feature of the ONLINE
NETIQUETTE
Etiquette Netiquette
the Proper a term used to describe
requirement proper etiquette and
s for social rules for online behavior
behavior. on the internet.
1. •Remember the human part
2. •Adhere to the same standards
of behavior online that you
follow in real life
3. •Know where you are in
cyberspace
4. •Respect other people’s time
and preferences
5. •Make yourself look good
6. •Share expert knowledge
7. •Help keep flame wars
under control.
8. •Respect other people’s
privacy
9. •Be forgiving of other
people’s mistake.
10. • Don’t abuse your power.
03
INTERNET
THREATS
MALWARE These are programs
designed to damage your
(MALICIOUS SOFTWARE) computer.
Virus - A malicious program that
replicates itself and damages computer
files
Worm - A malicious program that also
replicates itself and makes your
computer slow
Trojan - A malicious program that disguises itself as a
useful tool but once installed or downloaded it hacks
your computer to get sensitive information
MALWARE These are programs
designed to damage your
(MALICIOUS SOFTWARE) computer.
Vishing
information from victims.
Often referred to as voice
phishing, cyber criminals
use savvy social
engineering tactics to
convince victims to act,
giving up private
information and access to
bank accounts.
PROTECTING
REPUTATIONS
ONLINE
Statement: Anything that we
post online can be
viewed or seen by
almost anyone.
How can we
protect
ourselves?
1. Conduct a Simple
Google Search: Ideally you must try to
search your name on
google at least once a
month for you to
determine if there will be
negative search results
about yourself.
2. Setup a comprehensive
Google Alert:
Google will notify you
of stories, posts,
comments, etc. as long
as your name is
associated with it.
3. Take advantage of people
search tools: