0% found this document useful (0 votes)
17 views

Lesson 2

This document provides guidance on internet safety and etiquette. It discusses the risks of sharing personal information online and tips for staying safe. Specific risks outlined include sharing one's full name, school details, phone number, address, birthday and family member names. The document also covers internet threats like viruses, worms, Trojans and rogue security programs. Students are advised to avoid accepting all terms and conditions, only add friends they know, and not download anything from untrusted websites.

Uploaded by

x288
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Lesson 2

This document provides guidance on internet safety and etiquette. It discusses the risks of sharing personal information online and tips for staying safe. Specific risks outlined include sharing one's full name, school details, phone number, address, birthday and family member names. The document also covers internet threats like viruses, worms, Trojans and rogue security programs. Students are advised to avoid accepting all terms and conditions, only add friends they know, and not download anything from untrusted websites.

Uploaded by

x288
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Lesson 2 Empowerment Technologies

LESSON 2:
RULES OF NETIQUETTE

LESSON
OBJECTIVES:
At the end of this, the students Page 17 in Empowerment Technologies
should be able to: Book (Second Edition)
consider one's and others'
safety when sharing
information using the
Internet
consider one's and others'
reputation when using the
Internet
determine and avoid the
dangers of the Internet
be responsible in the use of
social networking sites; and
browse the Internet
efficiently and properly
through proper WHAT IS
referencing.
'NETIQUETTE?' DEFINITION
IMPORTANCE

How many hours do you spend


on the Internet per day? Can you Online Safety and Security
live without the Internet for a Risks
week? How many aspects of Tips to Stay Safe Online
your life depend on the Internet Threats
Internet? How many times have Protecting Reputation Online
you complained about your Think Before You Click
Internet connection speed? Copyright Infringement
Online Research
Lesson 2 Empowerment Technologies

ONLINE SAFETY
AND SECURITY

Page 20 in Empowerment Technologies


Book (Second Edition)

The Internet, truly, is a powerful tool. It can be used to promote


businesses, gain new friends, and stay in touch with the old ones. It is
also source of entertainment through games, online communities,
and everything inj between. But like most things in this world, there
is always the "other side of the coin." The Internet is one of most
dangerous places, especially if you do not know what you are doing
with it. But there is no need to worry; it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about
your use of the Internet.

Let us go back to the


HOW SAFE ARE YOU?
test. Let us visit each
item and see how
risky it is to share
personal information.
Lesson 2 Empowerment Technologies

INFORMATION RISKS

There is a risk in sharing your first


name. Chances are, a hacker may
already know plenty of stuff about
you even if you only give out your
1. First Name first name. Likewise, you cannot
just walk in a room and start
introducing yourself to everyone.
You do not know whom you can
come across with.

If sharing your first name is a small


risk, having both your first and last
is more risky. You will be
vulnerable to being searched for
2. Last Name using search engines, which
include image search. Matching a
name with a face is a modus to
several cybercrimes like identify
theft.

Sharing your middle name alone


is probably not the most risky of
3. Middle Name
these shared information, but
sharing your full name would be.

Most people who steal identities


4. Current and previous study their subject. They can use
school/s this information for verification
purposes.

Your cellphone number should


never be posted on the Internet.
The Internet is a public place. It is
the same as posting your number
5. Cellphone Number
on a billboard. You would not
want random strangers to text or
call you, or worse, pretend that
they are someone else.
Lesson 2 Empowerment Technologies

INFORMATION RISKS

Risky, yet not as risky as posting


their full names, especially your
mother's maiden name. In fact,
you may have already
6. Names of your Mother
encountered many websites that
and Father require your mother's maiden
name as an answer to a secret
question whenever you lose your
word.

Disclosing this is a huge risk.


7. Name of your siblings Strangers may pretend or use
their identity to dupe you.

Hopefully, you answered "no" to


this one. Giving the Internet your
number is one thing; giving them
8. Address
your address is a whole othe level.
It would be much easier for
criminals to find you.

This shared information is more


risky that sharing your personal
phone number. Scams usually use
9. Home phone number this information to deceive you,
one of which is when a stranger
pretends to know your parents or
pretends to be you.

Letting people know your


birthday is probably a must if you
want to get as many gifts as
10. Birthday
possible. But having it in your
profile makes you vulnerable to
identify theft.

The Internet is defined as the "information superhighway". This means that


anyone has access to this highway, can place information, and can grab that
information.
Lesson 2 Empowerment Technologies

TIPS TO
STAY SAFE
ONLINE
Page 21 to 22 (Empowerment
Technologies Book)

The Internet is a public place and it is up to you to protect yourself.


Here are some tips to help you stay safe when using the Internet.

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read them.
3. Check out the privacy policy page of a website to learn how the
website handles the information you share.
4. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile
5. Do not share any of your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito"
(or private) mode, a feature of the browser, will not protect you from
hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar posting,
"Rob my house at this date."
9. Add friends you know in real life and refrain from adding strangers.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only
one anti-virus software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by creating a
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is
most likely not monitored by the site owner.
14. But the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Lesson 2 Empowerment Technologies

INTERNET THREATS
Here are some of the threats you should be aware of when using
the Internet:

1. Malware - stands for malicious software.


a. VIRUS - a malicious software program loaded into
user's computer without the user's knowledge and
performs malicious actions and can be transferred
from one computer to another through the Internet
and local networks or data storage like flash drives.
b. WORM - stand-alone malicious programs that can self-
replicate and propagate via computer networks without
human help. An example is the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
c. TROJAN - a malicious program that is disguised as a
useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your
information.
1. *ROGUE SECURITY SOFTWARE - tricks the user into
posing that it is security software. It asks the user to
pay to improve his/her security but in reality, they are
not protected at all.

Page 22 (Empowerment
Technologies Book
Lesson 2 Empowerment Technologies

d. SPYWARE - unwanted
email mostly from bots or
advertisers. It can be used
to send malware.

1. *KEYLOGGERS - used
to record the keystroke
done by the users. This
is done to steal their
password or any other
sensitive information.
It can record email,
messages, or any
information you type
using your keyboard.

e. ADWARE - a program
designed to send you
advertisements, mostly as pop-ups.

2. SPAM - unwanted email mostly from bots or advertisers. It can


be used to send malware.
3. PHISHING - its goal is to acquire sensitive personal information
like passwords and credit card details. This is done by sending
you an email that will direct the user to visit a website and be
asked to update his/her username, password, credit card, or
personal information.
*PHARMING - a more complicated way of phishing where it
exploits the DNS (Domain Name Service) system.
Lesson 2 Empowerment Technologies

THINK BEFORE YOU CLICK

Page 24 (Empowerment
Technologies Book)

LOOK: 1. Before you post on the web, ask these


HERE ARE questions to yourself: Would you want

SOME
your parents or grandparents to see it?
Would you want your future boss to
THINGS see it? Once you post something on
the web, you have no control of who
YOU MIGHT WANT TO can see your post.
CONSIDER BEFORE 2. Your friends depend on you to protect
POSTING SOMETHING their reputation online. Talk to your
ON THE INTERNET: friends about this serious
responsibility.
3. Set your post to "private". In this way,
search engines will not be able to scan
In the past, doing
that post.
something embarrassing 4. Avoid using names. Names are easy
was not much of a big for search engines to scan.
deal. It happened; people 5. If you feel that a post can affect you or
would laugh at it, and other's reputation, ask the one who
they would move on. posted it to take it down or report it as
inappropriate.
Lesson 2 Empowerment Technologies

COPYRIGHT
INFRINGEMENT
As a responsible Internet user, you have to consider that not
everything out there is free for you to use. Just like your own,
contents that you see from websites have their respective
copyrights. There are several instances where employees or
business owners face copyright infringement and are
sentenced to a huge fine due to reckless copying of
materials.

literary works, photographs,


UNDERSTAND paintings drawings, films, music
choreography, sculptures.
even if a material does not say
BE RESPONSIBLE that it is copyrighted, it is not a
valid defense against copyright.
It is important to add your own
BE CREATIVE creative genius in everything
that will be credited to you.
If you have doubts that what
you are doing does not fall
KNOW THE LAW under the policy of fair use, seek
permission first.

Another misconception is that fan-fiction is


not copyright infringement. Inreality, it is Page 24 to 25 (Empowerment
some copyright holders ignore them but Technologies Book)
they can opt to use their rights.
Lesson 2 Empowerment Technologies

Have you ever searched the Internet for certain


information where the search engine returned a different
result? For example, if you were to search for "The
Madonna" as the representation of Mary in the form of art,
you would probably use the keyword "Madonna" to search
for it on the internet. Iif you use that keyword nowadays,
you are more likely to stumble upon "Madonna", the music
artist instead. But if you used "The Madonna" to search for
the "The Madonna" in the first place, you will be directed in
the right result.

ONLINE
RESEARCH
PAGE 25 TO 30
Lesson 2 Empowerment Technologies

Figure 1. Google Search results when you use "Madonna" as your keyword.

Figure 2. Google Search results when you use "The Madonna" as your
keyword.

The information that we need is more likely already on the Internet. It


is just a matter of how to look for it and how to use information from
the most credible source.
Page 26 (Empowerment
Technologies Book)
Lesson 2 Empowerment Technologies

1. HAVE A QUESTION IN MIND.


Focus on a question you want to be
answered. If it is a series of questions,
TAKE A LOOK starts with only one. Never search
everything on one go.
AND STUDY
2. NARROW IT DOWN.
Search engines like Google, Bing or
Yahoo use several filters to determine
the most appropriate results for you.
HERE ARE
3. ADVANCED SEARCH.
SOME TIPS IN The best way to filter information you

CONDUCTING get from search engines is by using


the advanced search. This will allow

ONLINE you to filter out information you do


not need.
RESEARCH: In Google, simply search a word like
you would normally do, then click the
Advanced search and Settings
button under the search box.

Page 26 to 30 (Empowerment
Technologies Book)
Lesson 2 Empowerment Technologies

Figure 3. Google's Advanced search option

Once you are done, you can now filter your search results:

Figure 4. Screenshot of Google's Advanced


Search
Lesson 2 Empowerment Technologies

Page 28 (Empowerment
Technologies Book)

SYMBOL FUNCTION

Find web pages that contain all the terms that are
+ preceded by the + symbol; allows you to include terms
that are usually ignored.

"" Finds the exact words in a phrase.

Finds or excludes web pages that contain a group of


() words.

AND or & Finds wed pages that contain all the terms or phrases

NOT or - Excludes web pages that contain a terms or phrases

Finds web pages that contain either of the terms or


OR or | phrases
Lesson 2 Empowerment Technologies

Page 28 (Empowerment
Technologies Book)

READ!
4. LOOK FOR A CREDIBLE SOURCE.
Some wikis, though filled with updated information, are not credible
sources. This is because anyone can edit its content. When using wikis,
check out the link of the cited text (indicated by superscript number)
to be navigated to the footnote where the list of sources is located.
Click the source of the information and see if it is credible.

Figure 5. References at the bottom of


Wikipedia page contain links to the
entry's sources of information
Lesson 2 Empowerment Technologies

Page 29 (Empowerment
Technologies Book)

READ!
5. GIVE CREDIT.
If you are going to use pieces of information from a source for
educational purposes, give credit to the original author of the page or
information. To properly cite a reference, you may use the format
below:

Name of the person or organization (the author of the


information). Title of the home page in italics (title is
shown in title bar but is sometimes missing or unrelated).
URL. Date last seen.

EXAMPLES:
Lapiz, Adrian Harold L. "Oleander's Fun Facts about Bananas."
https://oleander.penz.com/random/bananalove.htm. Last viewed on September 7, 2015.

"Accounting: What you should know." Jargon Online Network.


https://www.jargononline.com/accounting101.html. Last viewed on April 13, 2015.
Lesson 2 Empowerment Technologies

Cybercrime - crime monitor what you are


committed or assisted currently doing and typing
through the use of Internet. through keylogging.
Privacy Policy - tells the user Adware - program designed
how the website will handle to send you advertisements
its data. Spam - unwanted email
Malwares - stands for mostly from bots or
malicious software. advertisers
Virus - a malicious software Phishing - acquires sensitive
loaded onto a user's computer personal information like
without the user's knowledge passwords and credit card
and performs malicious details.
actions. Pharming - a more
Worm - stand-alone malicious complicated way of phishing
program that self replicates where it exploits the DNS
via computer networks. (Domain Name Service)
Trojan - malicious program system.
that is disguised as a useful Copyright - section of the law
program but once that states the rights of a
downloaded or installed, person regarding his own
leaves your PC unprotected work, and anyone who uses it
and allows hackers to get your without consent is punishable
information. by law.
Spyware - program that runs Fair Use - an intellectual
in the background without property may be used without
you knowing it; has the ability consent as long as it is used in
to commentaries & criticism.

KEY TERMS
TO REMEMBER

You might also like