0% found this document useful (0 votes)
30 views

Emptech Lesson 3

The document discusses online safety, security, ethics and etiquette. It defines the internet as the information superhighway and notes that anyone has access to it, so users must be careful about what information they share. Some key risks discussed include identity theft, cyberbullying, cyberstalking and malware like viruses, trojans and spyware. The document provides tips for staying safe online, such as being mindful of information sharing, checking privacy policies, avoiding public networks and not adding strangers. Cybercrimes like phishing, spam and child pornography are also mentioned.

Uploaded by

Jolina Gabayno
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Emptech Lesson 3

The document discusses online safety, security, ethics and etiquette. It defines the internet as the information superhighway and notes that anyone has access to it, so users must be careful about what information they share. Some key risks discussed include identity theft, cyberbullying, cyberstalking and malware like viruses, trojans and spyware. The document provides tips for staying safe online, such as being mindful of information sharing, checking privacy policies, avoiding public networks and not adding strangers. Cybercrimes like phishing, spam and child pornography are also mentioned.

Uploaded by

Jolina Gabayno
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

ONLINE SAFETY,

SECURITY, ETHICS &


ETIQUETTE

Empowerment Technologies 11
ONLINE SAFETY, SECURITY,
ETHICS & ETIQUETTE

The internet is the guiding technology of the


Information Technology Age just as the
electrical engine was of the Industrial Age.
ONLINE SAFETY, SECURITY,
ETHICS & ETIQUETTE

In these times, more and more people are already


engaged in the use of technology. These people who
are raised in a digital, media-saturated world are
called digital natives.
• The internet is very powerful tool.
ONLINE • It can be used to promote business.
• It also source of entertainment through
SAFETY games, movies, online communities etc.
AND
SECURITY
• The internet is also one of the most
ONLINE dangerous place , especially if you do
SAFETY not know what are you doing with it.

AND
SECURITY
“HOW SAFETY ARE YOU?”
INFORMATION: FIRST NAME

RISKS

There is a risk in sharing your first name


chances are hacker may know plenty of
information about you!
INFORMATION: LAST NAME

RISKS

If first name is a small risk, having both first


and last name is more risky. You will be
vulnerable to search.
INFORMATION: MIDDLE NAME

RISKS

Sharing your middle name alone is probably


not the most risky of these shared
information, but sharing your full name
would be.
INFORMATION: SCHOOL HISTORY

RISKS

Most people who steal identities study their


subject. They can use this information for
verification purposes.
INFORMATION: PHONE NUMBER

RISKS

Your cellphone number should never be


posted ont the internet. The internet is public
place.
INFORMATION: NAME OF PARENTS

RISKS

Risky ? Yes not risky as posting their full


names, especially your mother’s maiden
name.
INFORMATION: NAME OF SIBLINGS

RISKS

Disclosing this is a huge risk. Strangers may


pretend or use their identity to dupe you!
INFORMATION: ADDRESS

RISKS

It would be much easier for criminals


to find you !
INFORMATION: HOME PHONE NUMBER

RISKS

This shared information is more risky than


sharing your personal phone number. Scams
usually use this information to deceive you.
INFORMATION: BIRTHDAY

RISKS
Letting people know your birthday is probably a
must if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable
to identity theft.
SUMMARY
This is why social
networking sites like
The internet is defined as facebook continue to
the information improve their security
superhighway. This features.
means that anyone has
access to this highway.
TIPS TO STAY SAFE ONLINE
SUMMARY
1.Be mindful of what
you share online.
2.Do not just accept
terms and conditions;
The threat cyber read them.
crime is very real!
please be careful.
TIPS TO STAY SAFE ONLINE

5.Do not share any of your


3.Check out he privacy password with anyone.
policy page of a website to 6.Avoid Logging in to
learn how the website public networks (wifi ,
handles the information you browsing incognito etc. )
share.
4.Know the security
features of the social
networking site you use.
TIPS TO STAY SAFE ONLINE

9.Add friends you know in


7.Do not talk to strangers
real life and refrain from
whether online or face to
adding strangers.
face.
10.Avoid visiting untrusted
8.Never post anything about
website.
a future vacation. It is
similar to posting, “rob my
house at this date”
INTERNET INTERNET RISKS
RISKS Cyberbullying
• It happens when someone intentionally
abused, harass, and mistreated by other
person using electronic communication.
Identity Theft
• It is a crime of stealing personal
INTERNET information for the purpose of assuming
THREATS that person's name or identity to make
any form of transactions.
INTERNET INTERNET RISKS
RISKS Cyberstalking
• A criminal practice where electronic
communication is used to stalk or harass
individual or group.
Sexting
• The act of sending sexually explicit text
INTERNET messages, images, and videos.
THREATS
INTERNET INTERNET THREATS
RISKS Malware
• also known as Malicious Software.
Types of Malware
• Virus - a malicious program that
replicate itself by copying itself to
another program.
INTERNET • Trojan Horse - a malicious program that
THREATS disguised as legitimate program that user
will accept and use but take control of
your computer.
INTERNET INTERNET THREATS
RISKS Types of Malware
3. Worm - malicious program that copy's
itself and spreads to other computers.
4. Spyware - A malicious program that
gathers information from victim's computer
and send it back to the hacker.
INTERNET 5. Adware - An unwanted advertisement
that will pop-up several times on victim's
THREATS computer then behave abnormally and
tedious to close them.
INTERNET INTERNET THREATS
RISKS Types of Malware
6. Keylogger - A program that runs in the
background and steals user credentials and
confidential information and send back to
hack by recording every keystroke that a user
makes on their computer or device.
INTERNET 7. Botnet - A collection of infected
internet-connected devices such as PC and
THREATS mobile phone that are controlled by a
common type of malware.
INTERNET INTERNET THREATS
RISKS Spam
• Also known as junk email or unwanted
email send by advertiser or bot. It can be
used to send malware.
Phishing
• A cyberattack method using deceptive
INTERNET emails and websites to acquiring sensitive
personal information.
THREATS
INTERNET INTERNET THREATS
RISKS Cybercrime
• A crime in which computer is used as
object and tool in committing a crime such
hacking, phishing, spamming, child
pornography, libel, hate crimes, identity
thief and others.
INTERNET Cybercrime Law
• A law that deals with all forms of
THREATS cybercrime.
THANK YOU
Presented by Ms. Jolina Gabayno

You might also like