0% found this document useful (0 votes)
5 views

Etechh

Uploaded by

louieflourine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Etechh

Uploaded by

louieflourine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

ONLINE SAFETY,

SECURITY,
ETHICS, AND ETIQUETTE
OBJECTIVES
Apply online safety, security,
ethics, and etiquette standards and
practice in the use of ICT.
Makes the students discern
possible deceptive information
and wrongly evaluated data

Makes the students undetstand


the importance of making
judgement calls on possibe
implications and consequences
of making certain information
public
ONLINE SAFETY
Numerouse delinquencies that can be
committed on the internet:

• Stalking
• Identity Theft
• Privacy Violations
• Harassment
ONLINE SAFETY MEASURES
• Never give any ersonal information about yourself
ove the Internet.
• Do not give any banking or sensitive information
unless you are sure that it is a reputable business
having a secure service.
• Never open messages or attachment from
someone you don’t know.
• Regularly review your privacy settings in your
online accounts to make sure you are not sharing
important personal information.
• When using public computer terminal, be sure to
delete your browsing data before leaving.
• Keep your software updated to avoid security
holes.
• Do not download or install software or anything
on your computer or cellphone that is unknown to
you.
SECURITY
Online security is the practice of defending data, networks,
servers, computers, and electronic systems from malicious
attacks. This practice, also known as IT security or
cybersecurity, involves using various processes and
technologies to protect IT components from unauthorized
access. When these security protocols are followed,
cybercriminals find it hard to attack or compromise data.
SECURITY
THREATS

PHISHING
L • An email sent from an internet
criminal disquised as an email
from a legitimate, trustworthy
Lorem ipsum dolor sit amet, consectetuer
adipiscing elit. Aenean commodo ligula eget source.The messgae is meant to
dolor. Cum sociis natoque penatibus et
magnis dis parturient montes, nascetur
lure you into revealing sensitive or
ridiculus mus.
confidential information
PHARMING
• A malicious websites that
resembles a legitimate
website, used to gather
usernames and password.
INTERNET SCAM
• A type of scam that
misleads the user in
many ways attempting to
take lead of them.
INTERNET BOTS
• A network of zombie
computers that have
been taken over by a
robots or bot that erforms
large scale malicius acts
for the creator of the
botnet
MALWARE
• A generic term for
spyware and adware.
• It is a malicious software
disguised as real
software often secretly
installed,intended to
transfer and gather
private information like
password, without the
user’s permission.
VIRUS AND WORM
• Virus is a program designed to
replicate by attaching itself into
othe computer programs , data
filer , or the boot sector of the hard
drive.
• Worm can be injected into a
network by any types of means,
like the USB stick or email
attachment.
COMPUTER BUG
• A malfunction on a computer
system through its runtime.
• The term “bug” originated to the
moth found on the Mark II by
Grace Hopper that cause a
system malfunction.
CYBER STALKING
• The use of the internet or
other electronic device to
harass or stalk individual,
group or organization.
CYBER BULLYING
• The act of tormenting ,
threatening, harassing, or
embarrassing another
person using the internet
or other technologies.
SPAM
• An unsolicited email,
instant messages , or
social media messages.
• These messages are
fairly easy to spot and can
be damaging you if you
open or respond .
SPOOFING
• Describes a criminal who
impersonates another
individual or
organization, with the
internet to gather
personal or business
information.
ONLINE ETHICS AND
ETIQUETTE
ETHICS
• Simply refers to a person’s behaviour
when interacting with other netizens or
while online.
ETIQUETTE
• There are unspoken rules when
communicating and working through the
internet.
ETHICAL PROBLEMS
COMPUTER ETHICS
ETIQUETTE
OVERVIEW OF WORK

DO NOT WASTE DO NOT SEND


THINK BEFORE RESPECT OTHER’S
THE TIME OF MESSAGESS THAT
YOU CLICK CAN BE HURFUL RIGHT TO RIVACY
OTHERS

• To prevent or avoid • Refrain from posting or


• Sarcasm is an art • Do not use technology to
arguing with other people, sending chain
but not all time. make fun of others by
think before you send your messages, hoaxes,
spreading rumours and
message; avoid bulky emails, and other
posting their pictures
CYBERBULLYING useless information.
without their consent.

You might also like