EMTECH-REV
EMTECH-REV
Technologies that makes life more comfortable and web, which involves several online platforms where
- Allows the users to post and exchange short without restrictions immediately on publication
contents that may include texts, graphics, audios, Different Open Access Journals
and videos using limited characters. ABM - Journal of Small Business Management
Ex: Twitter and Tumblr. HUMSS - Social Sciences and Humanities Open
property and information which are connected to individual or group or gender-based bullying that
it is uncommon, unpredictable, and is hard to be > Flaming- Online fight using electronic messages
Unfriend or block them. This will require you to input your personal data.
4) Always be aware The collected data will later be used to steal other
Be aware of how people treat you online. It will give information or to hack your online accounts.
you a hint of how your perpetrators are starting to Tips to be protected from identity theft
“Plagiarism is presenting someone else’s work or Instances where works enters the PD
incorporating it in your work without full -Creator who had not registered the copyright of
material whether in manuscript, printed, or -It is a freeware. (Ex: Adobe Reader, Skype)
Copyright Infringement
Occurs when a copyrighted work is reproduced,
distributed, performed, publicly displayed, or made
into a derivative work without the permission of the
copyright owner.” – US Office of Copyright
Common Internet Security Threats Ex: Logging in to an online account that requires
Internet Security Threats password before performing a bank transfer. Then,
-Dangers that are associated with using the internet. an OTP (one-time password) is sent to the
Common Internet Security Threats registered cellphone number of the account owner.
1) Malwares 4) Firewalls
Shortened form of “malicious software”. These are the first line of defense among networks.
Ex: Computer virus and dishonest spyware. It prevents unauthorized access to a network.
2) Worms It allows or denies access to the system
Programs that can replicate themselves from one Ex: Windows Firewall
computer to another in great volume and can Online Ethics
spread themselves rapidly without human Deals with what is good and bad.
intervention. Set of moral principles that can be taken as a
3) Spam guiding philosophy in life.
Unwanted messages, junk emails Issues Related to Internet Ethics
Contains links that will put you at risk. 1) Privacy- Internet users are required to provide
May be connected to malwares that intend to steal data for online transactions.
data. 2) Big Data- Because of the great number of
internet users, big amounts of data are being
4) Phishing
collected.
Created by cybercriminals who intend to elicit
private information from their victims. 3) Net Neutrality- Internet providers should give
Internet Security Strategies equal treatment to all contents that flow in their
1) Browser Selection network!
Browser uses security architecture that protects it 4) Access to the Internet- The Commission on
and its user from varied cyber attacks. Human Rights of the Philippines has acknowledged
Ex: Mozilla Firefox, Microsoft Edge, Apple Safari, that access to internet is a right.
Google Chrome Online Etiquette
2) Email Security Acceptable conduct that adheres to polite behaviors
Use message encryption feature through and respectful manners
cryptography.
Cryptography - practice and study of techniques for
secure communication in the presence of
adversarial (malicious) behavior.
3) Multifactor Authentication
Process by which device access is controlled by
requiring several authentication mechanisms.