0% found this document useful (0 votes)
251 views

LESSON 2 - EMPTECH-Lesson 1 (Unit 2)

Empowerment technology
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
251 views

LESSON 2 - EMPTECH-Lesson 1 (Unit 2)

Empowerment technology
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Unit 2: Online Safety and Ethics

Lesson 1
Making One’s Self Safe in the
Cyber World

Empowerment Technologies
Senior High School Applied - Academic
How would you describe
the features of the app
and platform that help
protect its users from
Internet dangers and
threats?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 2
What are the
possible ways
that you can
think of to
protect
yourself from
different online
threats?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 3
● Define the cyber world and its
Learning features.
Objectives ● Identify and examine different
online threats and dangers.
At the end of the ● Practice various ways to be safe
lesson, you should
be able to do the in the cyber world.
following:

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 4
Are you familiar with these images? What do these images
mean?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 5
What is a password?

● a combination of texts, numbers, and/or


special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 6
Classifying the Password

1. Study the passwords in the succeeding slides.


2. Classify each password as either a weak password or a
strong password.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 7
Classifying the Password
vince15 alp@c@Pet2020 password_1

_paramore_For3ver_

StrongPassword 12345678ABC juandelacruz1994

Hola_amigo!

Beautiful G!v3_m3_Sunsh!n3 helloWorld123

Els@+AnN@_uWu 09_09_2001 erica_sanchez

67a12b90c_me l!v3_l@ugh_l0v3

moonlover22 18_funnygirl_18 alwaysSmile

9876_ABCDEFG
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 8
Classifying the Password

1.Among all the words included in the activity,


which password(s) was the hardest to
classify? Which was the easiest?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 9
Classifying the Password

2.What suggestions can you give to protect


online accounts aside from creating a strong
password?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 10
Classifying the Password
1. x

3.What would be the effect of not having


strong security and password for your online
accounts?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 11
What is the Cyber
World?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 12
The Cyber World, also known as
Cyberspace, is virtual in nature
and unbounded unlike our physical
environment. The Cyber World is a
vast and interconnected space
where digital devices, systems, and
networks facilitate the flow of data
and enable a wide range of online
experiences.
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 13
What are the
features of the
Cyber World?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 14
Virtual Self
● a digital representation of
humans to interact in
virtual world

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 15
15
Social Media Profile Heroes Professional
Persona

Anonymous User on a Forum


EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 16
Source of
Information
● data that are
available to
anyone as
long as they
have an
internet
connection

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 17
17
Search Engine Social Media Academic
Platforms Databases and
Online Libraries.

E-book application and Libraries


EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 18
Social
Interaction
● digital
socialization
using chat,
blogs, vlogs,
online games,
etc.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 19
Tools for Social
Interaction
● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends,
COD, etc.)
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 20
Dangers and
Threats on the
Internet

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 21
Hacking
● stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 22
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 23
Identity Theft
● the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 24
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 25
Internet
Predators
● individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 26
26
Cyberbullying
● an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 27
27
Malicious Software
● also known as malware,
is created to invade and
destroy computer
systems

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 28
Types of
Malware
● virus
● worms
● trojan
● spyware
● adware
● ransomware
● fileless
malware
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 29
EXAMPLE OF VIRUS:
The famous (ILOVEYOU VIRUS/WORM)
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 30
TROJAN VIRUS
- is type of malware that disguises itself as legitimate software.

31
SPYWARE:
Keyloggers: Record keystrokes to steal
passwords, credit card information, and
other sensitive data.

Screen recorders: Capture screenshots or


video of your computer screen to monitor
your activities.
32
Adware : Displays unwanted ads and
tracks user behavior for targeted
advertising

33
RANSOMWARE:
type of malicious software (malware) that encrypts your files,
making them inaccessible. Cybercriminals then demand a
ransom payment to provide you with the decryption key to
unlock your data.

34
35
About the dangers and threats
you may encounter in cyberspace,
can you think of any ways to
avoid these threats?

36
Stay Safe Online
How can you safeguard your virtual identity?

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 37
Tips to Stay Safe online

1. Think before you click.


2. Do not share personal
information.
3. Beware of phishing and
scam.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 38
Tips to Stay Safe online

4. Keep your device secure.


5. Never share passwords.
6. Never agree to meet
anyone you just met
online.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 39
Tips to Stay Safe online

7. Tell your guardian if


something goes wrong
online.
8. Cover your webcam when
not in used.
9. Use a strong password.
10. Make sure to logout your
account in public devices.

EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND 40
The cyber world allows us to navigate through Wrap Up
a virtual world, interact with other people
through the use of the internet, and retrieve
data from the vast information available
online.
The Internet is very powerful but along with
these advancements, we can encounter risks
such as exposure to unsuitable content,
crime-related dangers, privacy-related
dangers, and malicious software. 41
Wrap Up

Being a generation of technology-dependent


human beings, we need to be more careful on
the internet to avoid risks. We protect
ourselves by simply creating strong
passwords, and by avoiding sharing personal
information with others, especially with
strangers.

42
Bibliography
“About the Cyber World.” ICT Connection.
https://ictconnection.moe.edu.sg/cyber-wellness/cyber-wellness-101/about-
the-cyber-world (accessed February 21, 2020).
Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?”
Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen
College, 16 May 2018. https://www.rasmussen.edu/student-
experience/college-life/what-is-digital-footprint/
“Guidelines for Strong Passwords.” Information Technology Services Guidelines
for Strong Passwords Comments.
https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21,
2020).
“How to Stay Safe Online.” Bullying UK.
https://www.bullying.co.uk/cyberbullying/how-to-stay-safe-online/
(accessed February 22, 2020).

43
Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads. Bibliography
Goodreads. Accessed February 22, 2020.
https://www.goodreads.com/work/quotes/45331179-you-are-what-you-
tweet-harness-the-power-of-twitter-to-create-a-happier
Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of
Cyberspace and Analysis of Cyber Educational Institutions”. Accessed
February 21, 2020.
https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71
ef076.pdf
Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity
Magazine, 3 Aug. 2018. https://www.uscybersecurity.net/malware/
“Staying Safe Online.” Childline. Accessed February 22, 2020.
https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-
mobile-safety/staying-safe-online/
Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21,
2020. https://wiki.uiowa.edu/display/edtech/Internet+Dangers 44
Bibliography

“What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020.


https://www.cisco.com/c/en/us/products/security/advanced-malware-
protection/what-is-malware.html#~related-topics

45

You might also like