This document provides an overview of online safety, security, and ethics. It discusses netiquette rules for polite online communication and outlines 10 core rules including remembering the human on the other side, behaving online as you would in person, respecting others' privacy and bandwidth, and being forgiving of mistakes. The document also outlines common internet dangers like malware, spam, phishing and hackers. It concludes with tips for thinking before posting online and protecting yourself and others.
Download as PPTX, PDF, TXT or read online on Scribd
100%(1)100% found this document useful (1 vote)
841 views
Empowerment Technologies Lesson 2
This document provides an overview of online safety, security, and ethics. It discusses netiquette rules for polite online communication and outlines 10 core rules including remembering the human on the other side, behaving online as you would in person, respecting others' privacy and bandwidth, and being forgiving of mistakes. The document also outlines common internet dangers like malware, spam, phishing and hackers. It concludes with tips for thinking before posting online and protecting yourself and others.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40
Empowerment Technologies
Lesson 2: Safety, Security and Ethics
Instructor: Mr. Em Gongora Jr. Online safety and security Internet safety The Internet is a powerful tool for learning and communicating with people. However, there are many dangers that you must watch out for. What is Netiquette? Netiquette Is a network etiquette, the do’s and don’t of online communication. Ten Rules of Netiquette Rule no. 1: Remember the human. You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Rule no. 2: Adhere to the same standards online that you follow in real life. You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. Rule no. 3: Know where you are In Cyberspace. Always take a look around when you enter a new domain when surfing the web. Rule no. 4: Respect other people’s time and bandwidth. Remember people have other things to do besides read your email. You are not the center of their world. Rule no. 5: Make yourself look good online. Be polite and pleasant to everyone. Always check your spelling and grammar before posting. Rule no. 6: Share expert knowledge Ask questions online Share what you know online Post the answers to your questions online because someone may have the same question you do. Rule no. 7: Help keep flame wars under control. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. Rule no. 8: Respect other people’s privacy. Do not read other people’s mail without their permission. Rule no. 9: Don’t abuse your power. Do not take advantage of other people just because you have more knowledge or power than them. Rule no. 10: Be forgiving of other people’s mistake. You still need to have a good manners even though you are online and cannot see the person face to face. Dangers on the Internet 1. Malware Stands for malicious software. 1.1. Virus A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs. 1.2. Worm A malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino. 1.3. Trojan A malicious program that is disguised as a useful program but once downloaded or installed, it leaves your PC unprotected and allows hackers to get your information. 1.4. Spyware A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. A. Keyloggers Used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. 1.5. Adware A program designed to send you advertisements, mostly as pop-ups. 2. Spam Unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing It’s goal is to acquire sensitive personal information like passwords and credit card details. 3.1. Pharming A more complicated way of phishing where it exploits the Domain Name Service system or DNS. 4. Hacker This is a person who is able to enter and control other people’s computer without authorization. Windows Security It is sometimes necessary to protect important work and personal information stored in the computer. Security Center The Security Center of Windows is the place where you can set additional protection from treat to your computer, especially when using the Internet. There are three important security setting available. 1. Firewall It helps in protecting your computer from unauthorized entries, viruses, or worms from the Internet or network. 2. Automatic Updates It is another feature of Windows which then turned on will automatically download updates from Microsoft Windows website. 3. Virus Protection It is the current antivirus software installed in your computer; this software is meant to locate, find, and remove virus threats that are already in your computer. Think before you Click Tip #1 Before you post something on the web, ask some questions to yourself. Tip #2 Your friends depend on the you to protect their reputation online. Tip #3 Set your post “private”. In this way, search engines will not be able to scan that post. Tip #4 Avoid using names. Names are easy for search engines to scan. Tip #5 If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull if down or report it as inappropriate.