0% found this document useful (0 votes)
3 views

Lesson 2 Day 1 Final

Uploaded by

Ken Felarca
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Lesson 2 Day 1 Final

Uploaded by

Ken Felarca
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Prayer

Checking of
Attendance
Review
Refer Tim
Webas Who Berne
develop
static
1.0page thersWWW
Lee
Executabl
Keyword for
e
Web 3.0
Refer
Webas Web
Refer as
Dynamic
2.0 page 3.0
semantic
Lesson

Rules of
2

Netiquette
s
Lesson
Objectives
At the end of this lesson, the students
should be able to:

1. Apply online safety , security, ethics


and etiquette standards and practice in
the use of ICT’s as it would relate to their
specific professional tracks.
Online Safety and
Security

The Internet, truly, is a powerful


tool.
The Internet is one of the most
dangerous places
The Internet is defined as
the information
superhighway.
Tips to stay safe online

1.Be mindful of what you share online and what site you share it to.
2.Do not just accept terms and conditions; read it.
3.Check out the privacy policy page of a website to learn how the
website handles the information you share.
4.Know the security features of the social networking site you use.
5.Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private) mode,” a feature of the browser, will not
protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to
posting, “Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer. Use only one antivirus software to avoid conflicts.
12.If you have a Wi-Fi at home, make it a private network by
adding a password.
13.Avoid downloading anything from untrusted websites. You
are most vulnerable in peer-to-peer downloads (torrents)
as the download is most likely not monitored by the site
owner.
14.Buy the software; do not use pirated ones.
15.Do not reply or click links from suspicious emails.
INTERNET THREATS

1.Malware – stands for malicious software


a. Virus – a malicious program designed to
replicate itself and transfer from one computer to
another either through the Internet and local networks
or data storage like flash drives and CDs
b. Worm – a malicious program that transfer from
one computer to another by any types of means.
Often, it uses a computer network to spread itself.
c. Trojan – a malicious program that is disguised as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get
information
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.

*Keylogger – used to record the keystroke


done by the users. This is done to steal their
password or any other sensitive information. It can
record email, messages, or any information you type
using your keyboard.
e. Adware – a program designed to send your
advertisements, mostly as pop-ups

2.Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware

3. Phishing – its goal is to acquire sensitive personal


information like passwords and credit card details.
This is done by sending you an email that will direct
the user to visit a website and be asked to update
his/her username, password, credit card, or personal
information.
*Pharming – a more complicated way of
phishing where it exploits the DNS (Domain
Name Service) system.
is a scamming practice in which malicious code is
installed on a personal computer or server,
misdirecting users to fraudulent Web sites without
their knowledge or consent.
PERFORMANCE TASK
Create a tiktok
showing how to be
safe online.
Thank
You

You might also like