0% found this document useful (0 votes)
69 views

Lesson 2:: Online Safety, Security, Ethics, and Etiquette

The document discusses online safety, security, ethics, and etiquette. It provides tips for staying safe online, such as being mindful of shared information, using strong passwords, and avoiding suspicious links and downloads. Netiquette rules are also outlined, including being respectful, knowledgeable, and forgiving of mistakes.

Uploaded by

Rham Jay Salado
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views

Lesson 2:: Online Safety, Security, Ethics, and Etiquette

The document discusses online safety, security, ethics, and etiquette. It provides tips for staying safe online, such as being mindful of shared information, using strong passwords, and avoiding suspicious links and downloads. Netiquette rules are also outlined, including being respectful, knowledgeable, and forgiving of mistakes.

Uploaded by

Rham Jay Salado
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

LESSON 2:

Online safety, security, ethics, and etiquette

Prepared by: Ms. Erica E. Reyes


OBJECTIVES:
2 CS_ICT11/12-ICTPT-Ia-b-2
apply online safety, security, ethics,,
and etiquette standards and practice
in the use of ICTs as it would relate
to their specific professional tracks
How is your digi
tal media life lik
e?

“My media life is like


INTERNET SE
CURITY
HOW SAFE ARE YOU?
Raise your RIGHT hand if you share this information online.

TYPE OF INFORMATION
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Cellphone Number
6. Name of mother and father
7. Name of your siblings
8. Adress
9. Home phone number
10. Your Birthday
Internet Safety
Your Picture Here

it refers to the online


security or safety of
people and their
information when using
internet.
Information superhighway
Your Picture Here

This means that anyone has


access to this highway, can
place information, and
grab information
TIPS TO STAY SAFE ONLINE:

Be mindful of what
you share online.
TIPS TO STAY SAFE ONLINE:

Do not just accept


terms and conditions.
TIPS TO STAY SAFE ONLINE:

Know the security


features of social
networking sites you
use.
TIPS TO STAY SAFE ONLINE:

Do not share your


password to anyone.
TIPS TO STAY SAFE ONLINE:

Avoid logging in to
public networks/
Wi-Fi.
TIPS TO STAY SAFE ONLINE:

Do not talk to
strangers whether
online or face-to-face.
TIPS TO STAY SAFE ONLINE:

Never post anything


about future vacation.
TIPS TO STAY SAFE ONLINE:

Add friends you know


in real life.
TIPS TO STAY SAFE ONLINE:

Avoid visiting
untrusted websites.
TIPS TO STAY SAFE ONLINE:

Install and update


antivirus software on
you computer.
TIPS TO STAY SAFE ONLINE:

Make you WiFi


private network by
adding password.
TIPS TO STAY SAFE ONLINE:

Avoid downloading
from untrusted
websites.
TIPS TO STAY SAFE ONLINE:

Buy the software; do


not use pirated ones.
TIPS TO STAY SAFE ONLINE:

Do not reply or click


links from suspicious
mails.
Netiquette
Your Picture Here

It is the network etiquette,


the do’s and don’ts of online
communication.
TEN RULES OF
NETIQUETTE
1 Remember the human
- You need to remember that you are talking to a
real person when you are online.
- The internet brings people together who would
otherwise never meet.
- Remember this saying when sending an email:
Would I say this to the person’s face.
TEN RULES OF
NETIQUETTE
2 Adhere to the same standards online that
you follow in real life.
- You need to behave the same way online that
you do in real life.
- You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
-You are still talking to a real person with
feelings even though you can’t see them.
TEN RULES OF
NETIQUETTE
3 Know where you are in cyberspace.
-Always take a look around when you
enter a new domain when surfing the
web.
- Get a sense of what the discussion
group is about before you join it.
TEN RULES OF
NETIQUETTE
4 Respect other people’s time and bandwidth.
- Remember people have other things to
do besides read your email. You are not
the center of their world.
- Keep your post and emails to minimum
by saying what you want to say.
-Remember everyone won’t answer
your questions.
TEN RULES OF
NETIQUETTE
5 Make yourself look good online.
- Be polite and pleasant to everyone.
- Always check your spelling and
grammar before posting.
- Know what you are talking about and
make sense saying it.
TEN RULES OF
NETIQUETTE
6 Share expert knowledge
- Ask questions online
- Share what you know online.
-Post the answers to your questions
online because someone may have the
same question you do.
TEN RULES OF
NETIQUETTE
7 Help keep flame wars under control
- Netiquette does not forgive flaming.
-Netiquette does however forbid people
who are flaming to hurt discussion
groups by putting the group down.
TEN RULES OF
NETIQUETTE
8 Respect other people’s privacy.
-Do not read other people’s mail
without their permission.
-Going through other people’s things
could cost you, your job or you could
even go to jail.
-Not respecting other people’s privacy is
a bad netiquette.
TEN RULES OF
NETIQUETTE
9 Don’t abuse your power.
- Do not take advantage of other people
just because you have more knowledge
or power than them.
-Treat others as you would want them
to treat you if the roles were reversed.
TEN RULES OF
NETIQUETTE
10 Be forgiving of other people’s mistake.
-Do not point out mistakes to people
online.
-Remember that you were once the
new kid on the block.
- You still need to have a good manners
even though you are online and cannot
see the person face to face.
INTERNET SE
CURITY
Unauthorized Disclosure
A circumstance or event whereby an entity gains access to data for
which the entity is not authorized.

Exposure: Sensitive data are directly released to an


unauthorized entity.
Interception: An unauthorized entity directly accesses sensitive
data travelling between authorized sources and destinations.
Inference: A threat action whereby an unauthorized
entity indirectly accesses sensitive data by reasoning from
characteristics or by products of communications.
Intrusion: an unauthorized entity gains access to sensitive
data by circumventing a system’s security protections.
Disruption
A circumstances or even that interrupts or prevents the correct operation
of system services and functions.

Incapacitation: prevents or interrupts system


operation by disabling a system component.
Corruption: Undesirably alters system operation
by adversely modifying system functions or data.
Obstruction: A threat action that interrupts
delivery of system services by hindering
system operation.
Deception
A circumstance or event that may result in an authorized entity
receiving false data and believing it to be true.

Masquerade: An unauthorized entity gains access


to a system or performs a malicious act by posing
as an authorized entity.
Falsification: False data deceive an authorized
entity.
Repudiation: An entity deceives another by falsely
denying responsibility for an act.
Usurpation
A circumstances or event that results in control of system services or
functions by an unauthorized entity.

Misappropriation: An entity assumes


unauthorized logical or physical control of a
system resource.
QUESTION:
Do you agree or disagree
with the provisions of the
copyright law? Defend your
answer.
REFLECTION:
How would you feel of someone
posted something embarrassing
about you? What would you do?
GENERALIZATION:
It is vital to consider what information you
share because the Internet is a public place.
There are several ways to stay safe online
and it is essential that we know and apply them.

We are responsible of what we post online.


It is also our responsibility to protect other’s
reputation. We should be mindful of what we
post when others are involved.
ENDURING UNDE
RSTANDING
 YES. If you write a book, or a song, or a poem,
you should have a chance to be rewarded for it.
If people like your work and want to buy it,
it should be the author who profits. 
NO. Currently copyright lasts far too long and
is written specifically to favor large
corporations rather than individual content
creators. It is
being used as a means to give corporations
ever-increasing control over society.
ACTIVITY 2:
A business process outsourcing company based in Taguig City
has fired a Thai national who drew heavy criticism on social
media for his racially-offensive comments against Filipinos.

State your possible


comment on his
facebook post/
Comment.
ACTIVITY 2:
Using your Genyo Account, Add your
insights regarding whether such
stories/posts should be regulated, and
answer
the Guide Questions posted in the forum.
Thank you

You might also like