Lesson 2
Lesson 2
Online Security
Internet Threats
Protecting reputations online
Copyright
Contextualized online search and research
Online Safety and Security
The internet, truly, is a powerful tool. It can used
to promote your business, gain new friends, and
stay in touch with the old ones. It is also a source
of entertainment through games, online
communities, and everything in between.
How to Stay Safe
Online?
Tips to Stay Safe Online
O Be mindful of what you share online and what site you share it
to.
O Do not just accept terms and conditions; read it.
O Check out the privacy policy page of a website to learn how the
website handles the information you share.
O Know the security features of the social networking site you
use. By keeping your profile private, search engines will not be
able to scan your profile.
Tips to Stay Safe Online
Do not share your password with anyone.
Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private) mode”, a feature of the browser, will not
protect you from hackers.
Do not talk to strangers whether online or face to face
Never post about anything about a future vacation. It is similar
to posting, “rob my house at this date”.
Tips to Stay Safe Online
Add friends you know in real life.
Avoid visiting untrusted websites.
Install and update an antivirus software on your
computer. Use only one anti – virus software to avoid
conflicts.
If you share a Wi-Fi at home, make it a private network
by adding a password.
Tips to Stay Safe Online
O Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads(torrent) as the download is most likely
not monitored by the site owner.
O Buy the software; do not use pirated ones.
O Do not reply or click links from suspicious emails.
Internet Threats
OMalware
OSpam
OPhishing
1. Malware
O stands for malicious
software
Types of Malware
O Virus
O Worm
O Trojan
O Spyware
O Adware
Virus
O a malicious program designed
to replicate itself and transfer
from one computer to another
either through the internet and
local networks or data storage
like flash drives and CDs.
Worm
O a malicious program that
transfers from one computer
to another by any type of
means. Often, it uses a
computer network to spread
itself. For example, the
ILOVEYOU worm (Love
Bug Worm) created by a
Filipino.
Trojan
O a malicious program that is disguised
as a useful program but once
downloaded or installed, leaves your
PC unprotected and allows hackers to
get your information.
O *Rogue security software – tricks the
user into posing that it is a security
software. It asks the user to pay
improve his/her security but in reality,
they are not protected at all.
Spyware
O a program that runs in the
background without you
knowing it (thus called
“spy”).
O It has the ability to monitor
what you are currently doing
and typing through keylogging.
O *Keyloggers – used to record
the keystroke done by the users.
Adware
O a program designed to
send you
advertisements,
mostly as pop-ups.
2. Spam
O unwanted email mostly
from bots or advertisers. It
can be used to send
malware.
3. Phishing
O Its goals is to acquire sensitive
personal information like passwords
and credit card details.
O This is done by sending you an email
that will direct the user to visit a
website and be asked to update
his/her username, password, credit
card, or personal information.
Three Types of Phishing
OSpear Phishing
OClone Phishing
OWhaling
Spear phishing
Phishing attempts directed at specific
individuals or companies have been termed
spear phishing.
O Understand
O Be responsible
O Be creative
O Know the law
Online Search and Research
Tip on Conducting Online Search and
Research