LESSON 2 - EMPTECH-Lesson 1 (Unit 2)
LESSON 2 - EMPTECH-Lesson 1 (Unit 2)
Lesson 1
Making One’s Self Safe in the
Cyber World
Empowerment Technologies
Senior High School Applied - Academic
How would you describe
the features of the app
and platform that help
protect its users from
Internet dangers and
threats?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 2
What are the
possible ways
that you can
think of to
protect
yourself from
different online
threats?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 3
● Define the cyber world and its
Learning features.
Objectives ● Identify and examine different
online threats and dangers.
At the end of the ● Practice various ways to be safe
lesson, you should
be able to do the in the cyber world.
following:
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 4
Are you familiar with these images? What do these images
mean?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 5
What is a password?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 6
Classifying the Password
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 7
Classifying the Password
vince15 alp@c@Pet2020 password_1
_paramore_For3ver_
Hola_amigo!
67a12b90c_me l!v3_l@ugh_l0v3
9876_ABCDEFG
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 8
Classifying the Password
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 9
Classifying the Password
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 10
Classifying the Password
1. x
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 11
What is the Cyber
World?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 12
The Cyber World, also known as
Cyberspace, is virtual in nature
and unbounded unlike our physical
environment. The Cyber World is a
vast and interconnected space
where digital devices, systems, and
networks facilitate the flow of data
and enable a wide range of online
experiences.
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 13
What are the
features of the
Cyber World?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 14
Virtual Self
● a digital representation of
humans to interact in
virtual world
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 15
15
Social Media Profile Heroes Professional
Persona
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 17
17
Search Engine Social Media Academic
Platforms Databases and
Online Libraries.
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 19
Tools for Social
Interaction
● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends,
COD, etc.)
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 20
Dangers and
Threats on the
Internet
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 21
Hacking
● stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 22
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 23
Identity Theft
● the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 24
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 25
Internet
Predators
● individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 26
26
Cyberbullying
● an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 27
27
Malicious Software
● also known as malware,
is created to invade and
destroy computer
systems
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 28
Types of
Malware
● virus
● worms
● trojan
● spyware
● adware
● ransomware
● fileless
malware
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 29
EXAMPLE OF VIRUS:
The famous (ILOVEYOU VIRUS/WORM)
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 30
TROJAN VIRUS
- is type of malware that disguises itself as legitimate software.
31
SPYWARE:
Keyloggers: Record keystrokes to steal
passwords, credit card information, and
other sensitive data.
33
RANSOMWARE:
type of malicious software (malware) that encrypts your files,
making them inaccessible. Cybercriminals then demand a
ransom payment to provide you with the decryption key to
unlock your data.
34
35
About the dangers and threats
you may encounter in cyberspace,
can you think of any ways to
avoid these threats?
36
Stay Safe Online
How can you safeguard your virtual identity?
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 37
Tips to Stay Safe online
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 38
Tips to Stay Safe online
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 39
Tips to Stay Safe online
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 40
The cyber world allows us to navigate through Wrap Up
a virtual world, interact with other people
through the use of the internet, and retrieve
data from the vast information available
online.
The Internet is very powerful but along with
these advancements, we can encounter risks
such as exposure to unsuitable content,
crime-related dangers, privacy-related
dangers, and malicious software. 41
Wrap Up
42
Bibliography
“About the Cyber World.” ICT Connection.
https://ictconnection.moe.edu.sg/cyber-wellness/cyber-wellness-101/about-
the-cyber-world (accessed February 21, 2020).
Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?”
Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen
College, 16 May 2018. https://www.rasmussen.edu/student-
experience/college-life/what-is-digital-footprint/
“Guidelines for Strong Passwords.” Information Technology Services Guidelines
for Strong Passwords Comments.
https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21,
2020).
“How to Stay Safe Online.” Bullying UK.
https://www.bullying.co.uk/cyberbullying/how-to-stay-safe-online/
(accessed February 22, 2020).
43
Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads. Bibliography
Goodreads. Accessed February 22, 2020.
https://www.goodreads.com/work/quotes/45331179-you-are-what-you-
tweet-harness-the-power-of-twitter-to-create-a-happier
Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of
Cyberspace and Analysis of Cyber Educational Institutions”. Accessed
February 21, 2020.
https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71
ef076.pdf
Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity
Magazine, 3 Aug. 2018. https://www.uscybersecurity.net/malware/
“Staying Safe Online.” Childline. Accessed February 22, 2020.
https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-
mobile-safety/staying-safe-online/
Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21,
2020. https://wiki.uiowa.edu/display/edtech/Internet+Dangers 44
Bibliography
45