0% found this document useful (0 votes)
15 views30 pages

Emptech Lecture 1.1

It's about software use

Uploaded by

riveraezra30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views30 pages

Emptech Lecture 1.1

It's about software use

Uploaded by

riveraezra30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Quarter 1 Lesson 2

Online Safety, Security,


Ethics
and Etiquette
Joven S. Rios
MELC:

✓ Apply online safety, security,


ethics, and etiquette standards
and practice in the use of ICTs
as it would relate to their
specific professional tracks
MELC:
✓ Use the Internet as a tool for
credible research and
information gathering to best
achieve specific class objectives
or address situational
challenges
Directions: Reflect and assess yourself on your
online habits. Check “Yes” or “No” on the table
below.
Activity
1:
Self-
Check
on
Online
Habits
Refer to the practices and
precautions that should be
Online observed when using the internet
Safety
to ensure that the users as well as
their computers and personal
information are safe from crimes
associated with using the internet.
➢ Do not share your password with anyone.
➢ Add friends you know in real life.
➢ Do not visit untrusted websites.
Tips on ➢ Add password to your WIFI at home to make
how to it private.
be safe ➢ Install and update antivirus in your computer.
online ➢ Do not give your personal information to
anyone
➢ Think before you click.
➢ Never post about your future vacation.
Malware
-also known as
Internet
Threats Malicious Software
An email sent from an
Internet criminal disguised as
an email from a legitimate,
trustworthy source. The
Internet message is meant to lure you
Threats into revealing sensitive or
confidential information.
A malicious website that
resembles a legitimate website,
Internet used to gather usernames and
passwords.
Threats
A malicious website that
resembles a legitimate website,
Internet used to gather usernames and
passwords.
Threats
❑ A type of scam that misleads the
user in many ways attempting to
take lead of them.
❑ The purpose of this scam is to
cheat the target of their personal
property directly rather than
private information through
fabricated promises, confidence
tricks and many more.
❑ A network of zombie computers
that have been taken over by a
robot or bot that performs large-
scale malicious acts for the
creator of the botnet.
❑ Captcha technology is used to
avoid this type of security threat.
❑ A generic term for spyware and
adware.
❑ It is a malicious software
disguised as real software often
secretly installed, intended to
transfer and gather private
information, like passwords,
without the user's permission.
❑ Virus is a program designed to
replicate by attaching itself into
other computer programs, data
files, or the boot sector of the
hard drive.
❑ Worm is can be injected into a
network by any types of means,
like a USB stick or an email
attachment.
❑ A malfunction on a computer
system through its runtime.
❑ The term “bug” originated to the
Moth found on the Mark II by
Grace Hopper that cause a
system malfunction.
❑ The use of the internet or other
electronic device to harass or
stalk individual, group or
organization
❑ The act of tormenting,
threatening, harassing another
person using the internet or
other technologies.
❑ Describes a criminal who
impersonates another individual
or organization, with the intent
to gather personal or business
information.
Directions: Suppose you have read a post like this
“Strong men don’t cry” in social media. How would
you react? Post your reaction in comment section on
Activity our #Wall.
2: #Wall
#Wall
“Strong men don’t cry.”
Comment:
________________________________________________________________
________________________________________________________________
________________________________________________________________
N ➢A word that came from the two words “net” and
“etiquette”.
E
T ➢An etiquette applied online that shows proper
I manner and behavior.
Q
U ➢Netizen ➔ is a member of an online society through
E social media.
T
➢And in interacting with other netizen online, we
T need to maintain good behavior which is acceptable
E to others in online community.
✓ Remember the human.
✓ Adhere to the same standards of
The Core
Rules of
behavior online that you follow in
Netiquette real life.
by
Seth ✓ Know where you are in cyberspace.
T. ✓ Respect other people's time and
Ross
bandwidth.
✓ Make yourself look good online.
✓ Share expert knowledge.
The ✓ Help keep flame wars under
Core control.
Rules of
Netiquet
✓ Respect other people's privacy.
te by ✓ Don't abuse your power.
Seth ✓ Be forgiving of other people's
T.
Ross mistakes.
Directions: Answer the following questions below.

Activity
3:
Generaliz
ation
Directions: Make a poster with a theme “think before
you click”. Use a ½ illustration board or cartolina.

Activity
4:
Shout
Your
Mind
REFLECTION
•What are the 3 things that you have
learned in the lesson?

•What are the 2 things that you found


interesting while studying the lesson?

You might also like