0% found this document useful (0 votes)
59 views32 pages

Online Safety Netiquette

Jxfkncdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views32 pages

Online Safety Netiquette

Jxfkncdr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Online Safety,

Security,
Ethics and
Etiquette

Quarter 3 Week 1
Module 1 Lesson 2
Most Essential Learning Competencies:

apply online safety, security, ethics, and etiquette


standards and practice in the use of ICTs as it
would relate to their specific professional tracks

Specific Objectives:
1. name the various online threats;
2. identify the online safety measures; and
3. consider one’s and others’ reputation when using
the Internet.
Activity 1. Self-Check
on Online Habits

Reflect and assess


yourself on your online
habits. Check “Yes” or
“No” on
the table below.
Self-Check on Online Habits
YES NO
I always talk to strangers on social
media.

Giving your password to your friends.

Posting about future your vacations.

Visiting unsecured websites.

Ranting on social media.

Posting image or video without asking


permission from the owner.
Online Safety and
Security

Is trying to be safe on the


internet and is the act of
maximizing a user’s
awareness of personal
safety and security risks
to private information
and property associated
with using the internet,
and the self protection
from the computer
crime.
Tips on how to be safe online
 Do not share your password with anyone.
 Add friends you know in real life.
 Do not visit untrusted websites.
 Add password to your WIFI at home to make it
private.
 Install and update antivirus in your computer.
 Do not give your personal information to
anyone
 Think before you click.
 Never post about your future vacation.
DO NOT SHARE YOUR
PASSWORD WITH ANYONE.
ADD FRIENDS YOU KNOW IN
REAL LIFE.
Cyberbullying
It happens when
someone intentionally
abused, harass, and
mistreated by other
person using
electronic
communication.
Identity Theft
It is a crime of stealing personal information for
the purpose of assuming that person’s name or
identity to make any form of transactions.
Cyber Stalking

A criminal practice where electronic


communication is used to stalk or harass
individual or group.
Sexting

The act of
sending sexually
explicit text
messages,
images, and
videos.
Internet Threats
Malware – also known as
Malicious Software.
Types of Malware
1. Virus – a malicious program that
replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious
program that disguised as
legitimate program that user will
accept and use but take control of
your computer.
3. Worm – malicious program that copy’s
itself and spreads to other computers.

Malicious email attachments or USB sticks are


the most common ways for worms to get
onto a computer. When a worm infects your
computer, it will most likely send itself to every
email account on your machine. Your email
will appear innocent to the recipient until
they read it and find themselves infected by
the same worm.
4. Spyware – A malicious program
that gathers information from
victim’s computer and send it
back to the hacker.
5. Adware – An unwanted
advertisement that will pop-up
several times on victim’s computer
then behave abnormally and
tedious to close them.
Phishing

Phishing is a type of fraudulent


behavior in its most basic form. Official
looking emails impersonating a well-
known source, such as a bank, are
frequently sent.

It is the purpose of these emails to


acquire people's passwords and credit
card information.
Pharming

Pharming is a more sophisticated form of


phishing that takes advantage of the DNS
system.
Pharmers frequently construct web pages
that look like those of a reputable company,
such as an online banking log-in page.
Users will then submit their credentials,
assuming they are logging in to their regular
service, and the pharmer will steal their
credentials.
Rogue Security Software

This is a form of malicious software and


internet fraud that misleads users into
believing there is a virus on their computer
and aims to convince them to pay for a fake
malware removal tool that actually installs
malware on their computer.
Keyloggers

Keyloggers, which are similar to spyware,


record a user's keyboard operations. The
majority of keyloggers will hunt for easily
identifiable key entries, such as bank card
numbers and passwords. Identity and
intellectual property theft are frequently tied
to keylogging.
Ransomware - or ransom software
is a type of malicious software from
cryptovirology that threatens to
publish the victim's data or
perpetually block access to it
unless a ransom is paid.
Spam

Also known as junk email or


unwanted email send by advertiser
or bot. It can be used to send
malware.
Cybercrime

A crime in which computer is used


as object and tool in committing a
crime such hacking, phishing,
spamming, child pornography, libel,
hate crimes, identity thief and
others.
Cybercrime
Law

A law that deals with all forms of


cybercrime.
Netiquette

It is a word that came from the two


words “net” and “etiquette”.

It is an etiquette applied online that


shows proper manner and behavior.
The Core Rules of Netiquette
by Seth T. Ross

1.Remember the human.


2.Adhere to the same standards of behavior online
that you follow in real life.
3.Know where you are in cyberspace.
4.Respect other people's time and bandwidth.
5.Make yourself look good online.
6.Share expert knowledge.
7.Help keep flame wars under control.
8.Respect other people's privacy.
9.Don't abuse your power.
10.Be forgiving of other people's mistakes.

You might also like