Policing The Internet
Policing The Internet
SURVEILLANCE
Reported by:
Jamero, Kathleen May D.
DATA BREACH
• Section 3, 4, 5
SECURITY APPLICATION
• Application security refers to security precautions used at the
application level to prevent the theft or hijacking of data or code
within the application. It includes security concerns made during
application development and design, as well as methods and
procedures for protecting applications once they’ve been
deployed.
TYPES OF SECURITY
APPLICATION
1. Authorization- A user may be authorized to access and use the application
after being authenticated.
2. Authentication- When developers include protocols in an application to
ensure that only authorized users have access to it.
3. Auditing- The purpose of web application audit is to review an application’s
codebase to determine whether the code is doing something it shouldn’t.
4. Cryptography is the study of secure communications techniques that allow
only the sender and intended recipient of a message to view its contents.
ONLINE ETHICS
ETHICS, ETIQUETTE,
NETIQUETTES
• Online ethics refers to patterns of behavior used when on
the Internet, guided both by law and personal philosophy.
• Etiquette is a set of rules indicating the proper and polite
way to behave.
1. Be respectful
2. Be aware of strong language, all caps, and exclamation points.
3. Be careful with humor and sarcasm
4. Yes, grammar and spelling matter.
5. Cite your sources.
6. Don’t post or share (even privately) inappropriate material.
7. Be forgiving.
• Netiquette is a set of unofficial rules for
good behavior and politeness followed by
users of online and digital technologies
such as the Internet, email, and chat
rooms.
ETHICAL DILLEMAS
ON THE WEB
• An ethical dilemma is a conflict between alternatives where, no
matter what a person does, some ethical principle will be
compromised. Analyzing the options and their consequences
provides the basic elements for decision-making.
• Spam is any kind of unwanted, unsolicited digital communication
that gets sent out in bulk. Often spam is sent via email, but it can
also be distributed via text messages, phone calls, or social
media.
• Social spam is unwanted spam content appearing on social
networking services, social bookmarking sites, and any website
with user-generated content (comments, chat, etc.)
• Lucky winner spam
ONLINE SECURITY AND SAFETY
• Set up alerts.
• Keep devices and apps up to date.
• Don't use public Wi-Fi.
• Consider using a VPN.
• Create unique passwords.