Lesson 2 Online Safety and Security
Lesson 2 Online Safety and Security
2
O N L I N E
SAFETY AND
SECURITY
EMPOWERMENT TECHNOLOGIES
LEARNING
COMPETENCIES
The learners must be able to
•Apply online safety, security, ethics, and
etiquette standards and practice in the use
of ICTs as it would relate to their specific
professional track.
Share
or
Not to Share ?
MOTIVATION
Answer the following
:•On the list of information on the next
slides, what information have you shared so
far ?
•First Name
Share
•Last Name
•Middle Name or
•Current and previous Not to
schools
•Your cellphone number Share ?
MOTIVATION
•The name of your parents
•The name of your siblings
•Your address
•Your birthday
•Your home phone number
What is NETIQUETTE ?
NETIQUETTE
•Network etiquette
•Refers to the do’s and
don’ts of online
communication.
•Covers both common
courtesy online and the
informal “rules of the road”
of cyberspace.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
1.
NO YELLING,
PLEASE !
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
2
Sarcasm can
.
( and will )
backfire
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
3.
Attempt to find
your own answer.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
4.
Stop…
Grammar time
!
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
5.
Don’t get cute
with text colors.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
6
. Brevity
rules.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
7.
Read
first.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
8.
Don’t
overshare.
9 NETIQUETTE GUIDELINES ONLINE
STUDENTS NEED TO KNOW BY WILLIAM
ERSTAD
9
. Be kind.
GOLDEN RULE OF
NETIQUETTE
Do unto others as you would have them do
unto you.
ONLINE SAFETY AND
SECURITY
The Internet is truly a POWERFUL….
But like most things in this world, there is
always the “other side of the coin.”
HOW SAFE ARE
YOU ?
HOW SAFE ARE
YOU ?
HOW SAFE ARE
YOU ?
HOW SAFE ARE
YOU ?
HOW SAFE ARE
YOU ?
T I P S T O S TAY S A F E O N L I N E
• Be mindful of what you share online and what site
you share it to.
• Do not just accept terms and conditions; read it.
• Check out the privacy policy page of a website to
learn how the website handles the information that
you share.
• Know the security features of the social networking
site you use. By keeping your profile private,
search engines will not be able to scan your profile.
• Do not share your password to anyone.
T I P S T O S TAY S A F E O N L I N E
•Avoid logging in to public networks/wifi. Browsing in
incognito mode will not protect you from hackers.
•Do not talk to strangers whether online or face-to-
face.
•Never post anything about a future vacation. It is
similar to posting, ”Rob my house at this date”.
•Add friends you know in real life.
•Avoid visiting untrusted websites.
•Install and update an antivirus software on your
T I P S T O S TAY S A F E O N L I N E
•If you have a Wi-Fi at home, make it private by
adding a password.
•Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-
peer downloads as the download is most likely
not monitored by the site owner.
•Buy the software; do not use the pirated ones.
•Do not rely or click links from suspicious emails.
T I P S T O S TAY S A F E O N L I N E
Online Crimes
Cyberbullying
•Cyber Bullying - bullying that
takes place online, or using
electronic technology such as
cell phones, computers, and
tablets over communication
tools including social media
sites, text messages, chat, and
websites.
Types of Cyberbullying
• FLAMING-is an online fight using electronic messages with angry and vulgar
languages.
• HARASSMENT – repeatedly posting or sending offensive, rude, and insulting
messages.
• DENIGRATION- is sending or posting gossip or rumors about a person to damage
his or her reputation or friendship.
• IMPERSONATION- one person impersonates another person online.
• OUTING AND TRICKERY – tricking someone into revealing secrets or
embarrassing information, which is then shared online.
• CYBERSTALKING – posting or sending unwanted or intimidating messages, which
may include threats.
SURFACE WEB
The Surface Web is the portion
of the World Wide Web that is
readily available to the general
public and searchable with
standard web search engines. It
is the opposite of the deep web,
the part of the web not indexed
by a web search engine.
INTERNET
THREATS
Any threat that uses the
World Wide Web to
facilitate cybercrime.
• Malware
• Spam
• Phishing
MALWARE
• Malicious software
• Any software that
brings harm to a
computer system
• It can steal protected
data, delete
documents or add
software not approved
MALWAR
E
• Virus
• Worm
• Trojan
• Spyware
• Adware
VIRU
S
A malicious program designed
to replicate itself and transfer
from one computer to another
either through the Internet and
local networks or data storage
like flash drives and CDs. Keep
in mind that a virus relies on
human action to spread.
WOR
M
A worm is considered
as type of virus. Like a
virus, it can make
copies of itself in
computers that it
comes in contact with.
Worms don’t rely on
human action to
propagate.
TROJAN
A malicious program that
is disguised as a useful
program but once
downloaded or installed,
leaves the PC unprotected
and allows hackers to get
user information.
RANSOMWARE
Or ransom software is a
type of malicious
software from crypto
that threatens to
publish the victim's
data or perpetually
block access to it unless
a ransom is paid
ROGUE SECURITY
SOFTWARE
• Tricks the user into
posing that it is a
security software
• Asks the user to pay
to improve his/her
security but in reality
they are not
protected at all
SPYWARE
• A program that runs in the
background without you
knowing it.
• Has the ability to monitor
what the user is currently
doing and typing through
keylogging.
KEYLOGGERS
• Used to record the
keystroke done by the
users. This is done to
steal their password or
any other sensitive
information.
• Can record email,
messages, or any
information you type
ADWAR
E
• A program designed to
send advertisements,
mostly as popups.
• Adwares are usually
included in the
installers of other
programs or browser
add-ons.
SPAM
• Unwanted email mostly
from bots or advertisers.
• Can be used to send
malware
• People who spread spam
or Spammers collect
emails using several
PHISHING
• Aims to acquire sensitive
personal information like
passwords and credit card
details.
• Done by sending you an email
that will direct the user to visit
a website and be asked to
update his/her username,
password, credit card or
personal information.
COUNTERPARTS OF PHISHING
• VISHING • SMISHING
⚬ Voice phishing ⚬ Text phishing
⚬ Instead of being directed
⚬ Uses a cell phone
by email to a website, an
text messages to
email message asks the
user to make a deliver the bait to
telephone call. The call induce people to
triggers a voice response divulge their
system that asks for personal
user’s information information
PHARMING
• A more complicated way
of phishing where it
exploits the DNS
(Domain Name Service)
system.
• Pharming happens when
a user is fooled into
thinking a website is
legitimate based on how
How to Avoid Malware
• Install an anti-virus program
• Do not submit your email
address to suspicious looking
websites
• Don’t fall for obvious tricks
• Don’t open spam emails
• Do not click suspicious looking
links
• Read before you install
• Do not download pirated
PROTECTING REPUTATIONS
ONLINE
Before hiring, companies do a background
check on the applicant, and the easiest way
to check your background is to visit pages
that are related to you. Thus, if they find
disreputable information about you, it may
harm your reputation even if this information
has been discarded.
Data Privacy
Information privacy law or data
Law protection laws prohibit the
disclosure or misuse of
information about private
individuals. ... Records kept on
an individual should be accurate
and up to date. There should be
mechanisms for individuals to
review data about them, to
ensure accuracy. This may
Republic Act 10173 – Data Privacy Act
of 2012
an act protecting individual
personal information in
information and
communications systems in
the government and the
private sector, creating for this
purpose a national privacy
commission, and for other
purposes.
Republic Act 10173 – Data Privacy Act
of 2012
Section 2. Declaration of Policy. –
It is the policy of the State to protect the fundamental
human right of privacy, of communication while ensuring
free flow of information to promote innovation and growth.
The State recognizes the vital role of information and
communications technology in nation-building and its
inherent obligation to ensure that personal information in
information and communications systems in the government
and in the private sector are secured and protected.
Republic Act 10173 – Data Privacy Act
of 2012
In summary, the law identifies important points regarding the
handling of personal information as follows:
1.Personal information must be collected for reasons that are
specified, legitimate, and reasonable.
2. Personal information must be handled properly. Information
must be kept accurate and relevant, used only for the stated
purposes, and retained only for as long as reasonably needed.
The law required entities to be active in ensuring that
unauthorized parties do not have access to their customers’
information.
Data
Subject
refers to any individual person
who can be identified, directly
or indirectly, via an identifier
such as a name, an ID number,
location data, or via factors
specific to the person's
physical, physiological, genetic,
mental, economic, cultural or
social identity.
Rights of Data
•Right ofSubjects
access (Art. 15)
• Right to rectification (Art. 16)
• Right to erasure (also known
as: right to be forgotten)
(Art. 17)
• Right to restrict processing
(Art. 18)
• Right to data portability (Art.
20)
Rights of Data
• Right ofSubjects
access (Art. 15)- the right of data subjects to
request and obtain a copy of whatever personal
information.