Etechh
Etechh
SECURITY,
ETHICS, AND ETIQUETTE
OBJECTIVES
Apply online safety, security,
ethics, and etiquette standards and
practice in the use of ICT.
Makes the students discern
possible deceptive information
and wrongly evaluated data
• Stalking
• Identity Theft
• Privacy Violations
• Harassment
ONLINE SAFETY MEASURES
• Never give any ersonal information about yourself
ove the Internet.
• Do not give any banking or sensitive information
unless you are sure that it is a reputable business
having a secure service.
• Never open messages or attachment from
someone you don’t know.
• Regularly review your privacy settings in your
online accounts to make sure you are not sharing
important personal information.
• When using public computer terminal, be sure to
delete your browsing data before leaving.
• Keep your software updated to avoid security
holes.
• Do not download or install software or anything
on your computer or cellphone that is unknown to
you.
SECURITY
Online security is the practice of defending data, networks,
servers, computers, and electronic systems from malicious
attacks. This practice, also known as IT security or
cybersecurity, involves using various processes and
technologies to protect IT components from unauthorized
access. When these security protocols are followed,
cybercriminals find it hard to attack or compromise data.
SECURITY
THREATS
PHISHING
L • An email sent from an internet
criminal disquised as an email
from a legitimate, trustworthy
Lorem ipsum dolor sit amet, consectetuer
adipiscing elit. Aenean commodo ligula eget source.The messgae is meant to
dolor. Cum sociis natoque penatibus et
magnis dis parturient montes, nascetur
lure you into revealing sensitive or
ridiculus mus.
confidential information
PHARMING
• A malicious websites that
resembles a legitimate
website, used to gather
usernames and password.
INTERNET SCAM
• A type of scam that
misleads the user in
many ways attempting to
take lead of them.
INTERNET BOTS
• A network of zombie
computers that have
been taken over by a
robots or bot that erforms
large scale malicius acts
for the creator of the
botnet
MALWARE
• A generic term for
spyware and adware.
• It is a malicious software
disguised as real
software often secretly
installed,intended to
transfer and gather
private information like
password, without the
user’s permission.
VIRUS AND WORM
• Virus is a program designed to
replicate by attaching itself into
othe computer programs , data
filer , or the boot sector of the hard
drive.
• Worm can be injected into a
network by any types of means,
like the USB stick or email
attachment.
COMPUTER BUG
• A malfunction on a computer
system through its runtime.
• The term “bug” originated to the
moth found on the Mark II by
Grace Hopper that cause a
system malfunction.
CYBER STALKING
• The use of the internet or
other electronic device to
harass or stalk individual,
group or organization.
CYBER BULLYING
• The act of tormenting ,
threatening, harassing, or
embarrassing another
person using the internet
or other technologies.
SPAM
• An unsolicited email,
instant messages , or
social media messages.
• These messages are
fairly easy to spot and can
be damaging you if you
open or respond .
SPOOFING
• Describes a criminal who
impersonates another
individual or
organization, with the
internet to gather
personal or business
information.
ONLINE ETHICS AND
ETIQUETTE
ETHICS
• Simply refers to a person’s behaviour
when interacting with other netizens or
while online.
ETIQUETTE
• There are unspoken rules when
communicating and working through the
internet.
ETHICAL PROBLEMS
COMPUTER ETHICS
ETIQUETTE
OVERVIEW OF WORK