We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20
Rules of Netiquette
HOW SAFE ARE YOU?
Type of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8.Your address
9. Your home phone number
10. Your birthday
Lesson Objectives • consider one’s and others safety when sharing information using Internet. • consider one’s and others reputation when using Internet. • determine and avoid the dangers of the Internet. • be responsible in the use of social networking sites; and • browse the internet efficiently and properly through proper referencing. Online Safety and Security • The internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities and everything in between. But most like things in this world, there is always the “other side of the coin”. The internet is one of the most dangerous places, especially if you do not know what you are doing with it. HOW SAFE ARE YOU? Type of Information 1. First name 2. Last name 3. Middle name 4. Current and previous school(s) 5. Your cell phone number 6. The name of your mother and father 7. The name of your siblings 8.Your address 9. Your home phone number 10. Your birthday Tips to Stay Safe Online 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. Tips to Stay Safe Online 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. 5. Do not share your password with anyone. 6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito mode” a feature of a browser, will not protect you from hackers. Tips to Stay Safe Online 7. Do tot talk to strangers whether online or face to face. 8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your computer. Use only one anti-virus to avoid conflicts. Tips to Stay Safe Online 12. If you have a Wi-Fi at home, make it a private network by adding a password. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) a the download is most likely not monitored by the site owner. 14. Buy software; do not pirated ones. 15. Do not reply or click links from suspicious emails. Internet Threats 1. Malware – stands for malicious software. a. Virus – a malicious software program designed to replicate itself and transfer from one computer to another either through Internet and local networks or data storage like flash drives or CDs. Internet Threats b. Worm – a malicious program that transfer from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by Filipino. Internet Threats c. Trojan – a malicious program that disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. *Rogue Security Software – tricks the user into posing that it is a security software. It asks the user to pay to improve security but in reality they are not protected at all. Internet Threats d. Spyware – a program that runs in the background without you knowing it(thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. *Keyloggers – used to record the keystroke done by the user. This is done to steal their password or any other sensitive information. Internet Threats e. Adware – a program designed to send you advertisment, mostly as pop-ups.
2. Spam – unwanted email, mostly
from bots or advertisers. It can be used to send malware. Internet Threats 3. Phishing – Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card or personal information. *Pharming - a more complicated way of phishing where it exploits the DNS. (Domain Name Service) System. Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. Think Before You Click • 3. Set your post to “private.” In this way, search engines will not be able to scan that post. • 4. Avoid using names. Names are easy for search engines to scan. • 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate. Copyright Infringement If you create something - an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called Intellectual Property. Tips to avoid Copyright Infringement 1. Understand 2. Be Responsible 3. Be Creative 4. Know the Law