0% found this document useful (0 votes)
5 views

Lesson2-Rules-of-Netiquete

ict specialized course
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Lesson2-Rules-of-Netiquete

ict specialized course
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Rules of Netiquette

HOW SAFE ARE YOU?


Type of Information Shared Not Shared

1. First name

2. Last name

3. Middle name

4. Current and previous school(s)

5. Your cellphone number

6. The name of your mother and father

7. The name of your siblings

8.Your address

9. Your home phone number

10. Your birthday


Lesson Objectives
• consider one’s and others safety when
sharing information using Internet.
• consider one’s and others reputation
when using Internet.
• determine and avoid the dangers of the
Internet.
• be responsible in the use of social
networking sites; and
• browse the internet efficiently and
properly through proper referencing.
Online Safety and
Security
• The internet, truly, is a powerful tool. It can
be used to promote your business, gain new
friends, and stay in touch with the old ones.
It is also a source of entertainment through
games, online communities and everything
in between. But most like things in this
world, there is always the “other side of
the coin”. The internet is one of
the most dangerous places,
especially if you do not know what
you are doing with it.
HOW SAFE ARE YOU?
Type of Information
1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cell phone number
6. The name of your mother and
father
7. The name of your siblings
8.Your address
9. Your home phone number
10. Your birthday
Tips to Stay Safe Online
1. Be mindful of what you share online
and what site you share it to.
2. Do not just accept terms and
conditions; read it.
3. Check out the privacy policy page of
a website to learn how the website
handles the information you share.
Tips to Stay Safe Online
4. Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not be able to scan your
profile.
5. Do not share your password with
anyone.
6. Avoid logging in to public
networks/Wi-Fi. Browsing in “incognito
mode” a feature of a browser, will not
protect you from hackers.
Tips to Stay Safe Online
7. Do tot talk to strangers whether
online or face to face.
8. Never post anything about a future
vacation. It is similar to posting, “Rob
my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus
software on your computer. Use only one
anti-virus to avoid conflicts.
Tips to Stay Safe Online
12. If you have a Wi-Fi at home, make it
a private network by adding a password.
13. Avoid downloading anything from
untrusted websites. You are most
vulnerable in peer-to-peer downloads
(torrents) a the download is most likely
not monitored by the site owner.
14. Buy software; do not pirated ones.
15. Do not reply or click links from
suspicious emails.
Internet Threats
1. Malware – stands for malicious
software.
a. Virus – a malicious software
program designed to replicate
itself and transfer from one
computer to another either through
Internet and local networks or data
storage like flash drives or CDs.
Internet Threats
b. Worm – a malicious
program that transfer from one
computer to another by any type of
means. Often, it uses a computer
network to spread itself. For
example, the ILOVEYOU worm
(Love Bug Worm) created by
Filipino.
Internet Threats
c. Trojan – a malicious program
that disguised as a useful program
but once downloaded or installed,
leaves your PC unprotected and
allows hackers to get your
information.
*Rogue Security Software – tricks
the user into posing that it is a
security software. It asks the user to
pay to improve security but in
reality they are not protected at all.
Internet Threats
d. Spyware – a program that
runs in the background without you
knowing it(thus called “spy”). It has
the ability to monitor what you are
currently doing and typing through
keylogging.
*Keyloggers – used to record the
keystroke done by the user. This is
done to steal their password or any
other sensitive information.
Internet Threats
e. Adware – a program
designed to send you advertisment,
mostly as pop-ups.

2. Spam – unwanted email, mostly


from bots or advertisers. It can be
used to send malware.
Internet Threats
3. Phishing – Its goal is to acquire
sensitive personal information like
passwords and credit card details.
This is done by sending you an email
that will direct the user to visit a
website and be asked to update
his/her username, password, credit
card or personal information.
*Pharming - a more complicated
way of phishing where it exploits
the DNS. (Domain Name Service)
System.
Think Before You Click
1. Before you post something on the
web, ask these questions to yourself:
Would you want your parents or
grandparents to see it? Would you
want your future boss to see it? Once
you post something on the web, you
have no control of who sees your
posts.
2. Your friends depend on you to
protect their reputation online. Talk
to your friends about this serious
responsibility.
Think Before You Click
• 3. Set your post to “private.” In this
way, search engines will not be able to
scan that post.
• 4. Avoid using names. Names are easy
for search engines to scan.
• 5. If you feel that a post can affect you
or other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
Copyright Infringement
If you create something - an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should be
used by others. This is called
Intellectual Property.
Tips to avoid Copyright
Infringement
1. Understand
2. Be Responsible
3. Be Creative
4. Know the Law

You might also like