0% found this document useful (0 votes)
6 views

Module-3

Uploaded by

Ngl Ng Callang
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Module-3

Uploaded by

Ngl Ng Callang
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

EMPOWERMENT

TECHNOLOGIES

Online Safety, Security,


Ethics and Netiquette
Online Safety
refers to the practices and precautions that
should be observed when using the Internet
to ensure that the users as well as their
computers and personal information are safe
from crimes associated with using the
internet.
Type of Information Shared Not Shared
1. First Name
2. Middle Name
3. Last Name
4. Current and Previous School
5. Your Cellphone Number
6. Complete name of you father
and mother
7. Your parent’s cellphone number
8. Name of Siblings
9. Your address
10. Your birthday
Tips on how to be safe online
❏ Do not share your password with anyone.
❏ Add friends you know in real life.
❏ Do not visit untrusted websites.
❏ Add password to your WIFI at home to make it
private.
❏ Install and update antivirus in your computer.
❏ Do not give your personal information to anyone.
❏ Think before you click.
❏ Never post about your future vacation
Common Online Risk
★ Cyberbullying
It happens when someone
intentionally abused,
harass, and mistreated by
other person using
electronic communication.
Common Online Risk
★ Identity Theft
It is a crime of stealing
personal information for
the purpose of assuming
that person’s name or
identity to make any form
of transactions.
Common Online Risk
★ Cyber Stalking
A criminal practice where
electronic communication
is used to stalk or harass
individual or group.
Common Online Risk
★ Sexting
The act of sending
sexually explicit text
messages, images, and
videos.
Common Internet Threats
Malware – also known as Malicious Software.

Types of Malware

1. Virus – a malicious
program that
replicate itself by
copying itself to
another program.
Common Internet Threats
Types of Malware

2. Trojan Horse – a
malicious program that
disguised as legitimate
program that user will
accept and use but take
control of your computer
Common Internet Threats
Types of Malware

3. Worm – malicious
program that copy’s itself
and spreads to other
computers.
Common Internet Threats
Types of Malware

4. Spyware – A malicious
program that gathers
information from victim’s
computer and send it
back to the hacker.
Common Internet Threats
Types of Malware
5. Adware – An
unwanted advertisement
that will pop-up several
times on victim’s
computer then behave
abnormally and tedious
to close them.
Common Internet Threats
Types of Malware
6. Keylogger – A program that
runs in the background and
steals user credentials and
confidential information and
send back to hack by recording
every keystroke that a user
makes on their computer or
device.
Common Internet Threats
Types of Malware

7. Botnet – A collection
of infected internet–
connected devices such
as PC and mobile phone
that are controlled by a
common type of
malware.
Common Internet Threats
Types of Malware

8. Rootkit – A software
tools used by hackers to
gain control over a
computer on a network
without being exposed.
Common Internet Threats
Types of Malware

9. Ransomware – A ransom
virus that block the user
from accessing the programs
or files and demands to pay
the ransom through online
method for the removal of
the virus.
Common Internet Threats

Spam
known as junk email or
unwanted email send by
advertiser or bot. It can be
used to send malware.
Common Internet Threats
Phishing
A cyberattack
method using
deceptive emails and
websites to acquiring
sensitive personal
information.
Common Internet Threats
Cybercrime
A crime in which computer
is used as object and tool in
committing a crime such
hacking, phishing,
spamming, child
pornography, libel, hate
crimes, identity thief and
others.
Common Internet Threats
Internet scam
is a type of scam that misleads the
user in many ways attempting to
take lead of them. The purpose of
this scam is to cheat the target of
their personal property directly
rather than private information
through fabricated promises,
confidence tricks and many more.
Netiquette
It is a word that came from the two words
“net” and “etiquette”. It is an etiquette
applied online that shows proper manner
and behavior. If you are a member of an
online society through social media you are
called netizen. And in interacting with other
netizen online, we need to maintain good
behavior which is acceptable to others in
online community.
The Core Rules of Netiquette
1.Remember the human.
2.Adhere to the same standards of behavior online that
you follow in real life.
3.Know where you are in cyberspace.
4.Respect other people's time and bandwidth.
5.Make yourself look good online.
6.Share expert knowledge.
7.Help keep flame wars under control.
8.Respect other people's privacy.
9.Don't abuse your power.
10. Be forgiving of other people's mistakes.
EMPOWERMENT
TECHNOLOGIES

ACTIVITY
SLOGAN MAKING

HOW TO STAY
SAFE ONLINE
CRITERIA
Clarity 20% - The slogan should convey the
message of online safety clearly and
concisely.

Relevance 15% - Ensure that the slogan


directly relates to online safety and
cybersecurity.

Positive Tone 15% - A positive and


empowering tone is preferable to inspire
action and awareness.
CRITERIA
Uniqueness 20% - the slogan should stand
out and not be too similar to existing
slogans.

Visual Imagery 10% - Assess if the slogan


can be easily paired with visual elements for
marketing and awareness materials.

Overall Impact 20% - Evaluate how well it


encourages people to take action or think
about online safety.

You might also like