0% found this document useful (0 votes)
134 views

Lesson 2 Rules of Netiquette 1

This document provides tips and information about internet safety, security, and responsible online behavior. It discusses risks of sharing personal information online, types of internet threats like malware and spam, protecting one's reputation, avoiding copyright infringement, and general rules of netiquette. The document aims to educate users on how to safely and appropriately use the internet.

Uploaded by

eloisaalonzo1020
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

Lesson 2 Rules of Netiquette 1

This document provides tips and information about internet safety, security, and responsible online behavior. It discusses risks of sharing personal information online, types of internet threats like malware and spam, protecting one's reputation, avoiding copyright infringement, and general rules of netiquette. The document aims to educate users on how to safely and appropriately use the internet.

Uploaded by

eloisaalonzo1020
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

LESSON 2:

Rules of Netiquette
We e k 2
Lesson Objectives:
1. Consider one’s and other’s safety when sharing
information using the Internet;
2.Consider one’s and other ’s reputation when using the
Internet;
3. Determine and avoid the dangers of the Internet;
4.Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through
p r o p e r re fe re nc i ng.
Online Safety and Security

The Internet, truly, is a powerful


tool. It can be used to promote your
business, gain ne w friends, and stay in
touch with the old ones.
It is also a source of entertainment
through games, online communities, and
everything in between.
How Safe Are You?
Type of Information Risks
1. First name There is a risk in sharing your first name.
Chances are, a hacker ma y already know
plenty of stuff about y ou even if y ou
only give out your first name.
2. Last name If sharing your first name is a small risk,
having both your first and last is more
risky. You will be vulnerable to being
searched for using search engines, which
include i mage search.
Type of Information Risks
3. Middle name Sharing your middle name alone is
probably not the most risky of these
shared information, but sharing your full
name w ould be.
4. Current and previous Most people who steal identifies study
school(s) their subject. They can use this
information for verification purposes.

5. Your Cellphone Number Your cellphone numbe r should never be


posted over the Internet. The
Internet is a public place. It is the same as
posting your numbe r on a billboard.
6. The name of your mother Risky, yet not as risky as posting their
and father full names, especially your mother ’s
ma i d e n n a m e
Type of Information Risks
7. The name of your siblings Disclosing this is a huge risk. Strangers
ma y pretend or use their identity to dupe
you.
8. Your address Hopefully, you answered “no” to this one.
Giving the Internet your number is one
thing; giving them your address is a whole
other level.
9. Your home phone number This shared information is more risky
than sharing your personal phone
number.
10. Your birthday Letting people k n o w your birthday is
probably a must if you want to get as many
gifts as possible.
The Internet is defined as the
information superhighway. This
means that anyone has access to this
highway, can place information, and
can grab that information.
Any information, even things
that you have set privately, can be
accessed one wa y or another.
Tips to Stay Safe Online

1. Be mindful of what you share


online and what site you share it to.

2. D o not just accept terms and


conditions; read it.
Tips to Stay Safe Online

3. Check out the privacy policy page of a


website to learn h o w the website handles
the information you share.

4. K n o w the security features of the social


networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile.
Tips to Stay Safe Online

5. Do not share your password with anyone.

6. Avoid logging in to public networks/Wi-Fi.


Browsing in “incognito (or private) mode,”
a feature of the browser, will not protect you
f r om hackers.
Tips to Stay Safe Online

7. D o not talk to strangers whether online or


face-to-face.

8. Never post anything about a future


vacation. It is similar to posting, “Rob my
house at this date.”
Tips to Stay Safe Online

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.


Tips to Stay Safe Online

11. Install and update an antivirus software


on your computer. Use only one anti-virus
software to avoid conflicts.

12. If you have a Wi-Fi at home, make it a


private netw ork by adding a password.
Tips to Stay Safe Online
13. Avoid downloading anything from untrusted
websites. Yo u are most vulnerable in peer-to-peer
downloads (torrents) as the download is most likely
not monitored by the site owner.

14.Buy the software; do not use pirated ones.

15. Do not reply or click links from suspicious


emails.
Internet Threats
1. Malw are – stands for malicious software

a. Virus – a malicious program


designed to replicate itself and transfer
from one computer to another either
through the Internet and local networks or
data storage like flash drives and CDs
Internet Threats

b. Wo r m – a malicious program that


transfers f r om one computer to another by
any type of means. Often, it uses a computer
network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm)
created by a Filipino.
The ILOVEYOU virus is a computer
w o r m that spread through email
attachments in 2000.

ILOVEYOU was created by Onel


de G u z ma n of the Philippines. Infecting
45 million machines worldwide, leading
to more than $8 billion in damages.
c. Trojan – a malicious program that is
distinguished as a useful program but
once downloaded or installed, leaves
your P C unprotected and allows
hackers to get your information
~ Rogue security software – tricks
the user into posting that it is a security
software. It asks the user to pay to
improve his/her security but in reality,
they are not protected at all.
d. Spyw are – a program that runs in
the background without you knowing
it (thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
~ Keyloggers – used to record
the keystroke done by the users. This is
done to steal their password or any
other sensitive information. It can
record email, messages, or any
information you type using your
keyboard.
e. Adw are – a program
designed to send y ou
advertisements, mostly as
p o p -ups.
2. Spam – unwanted
email mostly from
bots or advertisers. It
can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive
personal information like pas s w ords a n d
credit card details. This is done by sending
you an email that will direct the user to visit
a website and be asked to update his/her
username, password, credit card, or
pers onal information.
~ Pharming – a more complicated way
of phishing where it exploits the D N S
(Domain Name Service) system.
Protecting Reputations Online
Nowadays, embarrassing moments are
captured using any device y ou could
imagine. What is worse is that people can easily
upload it to the Internet, where it can be stored
forever.
O nc e y o u post something over the
Internet, search engines keep them in their
archives for search results. This make s
anything you post to last forever.
Think Before You Click
1. Before you post something o n the w eb , ask these questions to yourself:
Would you want your parents or grandparents to see it? Would you want your
future boss to see it? Once you post something on the web, you have no control of who
sees your posts.
Think Before You Click

2. Your friends depend on you to


protect their reputation online.
Talk to your friends about this
serious responsibility.
Think Before You Click

3. Set your post to “private”.


In this way, search engines will not be
able to scan that post.

4. Avoid using names.


Names are easy for search engines to
scan.
Think Before You Click

5. If you feel that a post can affect


you or other’s reputation, ask the
one who posted it to pull it down or
report it as inappropriate.
Copyright Infringement
If you create something – an idea, an
invention, a form of literary work, or a
research, you have the right as to how it
should be used by others.
This is called intellectual property.
In other words, the copyright law includes
yourrights over your work, an d an yon e
w h o uses it without your consent is
punishable by law.
Tips to avoid copyright infringement:
1. Understand – Copyright protects literary works,
photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does N O T
protect underlying ideas a n d facts.

2. Be responsible. Even if material does not say that it is


copyrighted, it is not a valid defense against copyright.
Tips to avoid copyright infringement:
3. Be creative – Ask yourself whether you are making is
something that came from you or something made from
somebody else’s creativity.

4. K n o w the law – There are some limitations to copyright


laws. For instance in the Philippines, copyrights only last a
lifetime (of authors) plus 50 years. There are also provisions
for “fair use” which mean that intellectual property may be
used without a consent.
Online Research
What is the difference between “Madonna” and the Madonna”?

Madonna The Madonna


1. Have a question in mind.

Focus on a question you w ant answ ered. If it is a series of


questions, start with one. Never search everything on one go.
2. Narrow it down.
Search engines like Google,
Bing, or Yahoo use several filters to
determine the m os t appropriate
result for you.
For example, if you were to
look for Tom Sawyer, the animation
series, you would better use the
keywords “Tom Sawyer animation”
rather than just “Tom Sawyer”.
3. Advanced Search.

The best way to filter


i n f o r ma t i o n yo u g e t f r o m s e a rc h
e n g i n e s is b y u s i n g t h e a d v a n c e d
s e a rc h . T h i s w ill a l l o w yo u to filter
out information you do not need.
3. Advanced Search.
4. Look for credible source

Some wikis, are not a credible


source. This is due to the fact that
anyone can edit its content.
The more credible sources
are scientific journals, websites,
online encyclopedias a n d
scholarly databases.
5. Give credit.
If you are going to use information from a source for education
purposes, give credit to the original author of the page or information.
To properly cite a reference, you may use the format below:

N ame of the person or organization (the author of the information).


Title of the home page in italics (title is shown in the title bar but is
sometimes missing or unrelated). URL. Date last seen.
Examples:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas”.


http://oleander.penz.com/random/bananalove.htm . Vi e w e d o n
September 7, 2015.

“Accounting: What you should know”. Jargon Online Network.


http://www. jargononline.com/accounting101.html. View ed on
April 13, 2015.

You might also like