Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Empowerment Technologies

Lesson 2 RULES OF NETIQUETTE


ABOUT

 Online Security , safety and ethics


 Internet threats
 Protecting reputations online
 Copyright
 Contextualized online search and research skills

OBJECTIVES
OBJECTIVES

 Consider one’s and others’ safety when sharing information using the Internet
 Consider one’s and others’ reputation when using the Internet
 Determine and avoid the dangers of the Internet
 Be responsible in the use of social networking sites, and
 Browse the Internet efficiently and properly through proper referencing

REFLECTION
REFLECTION
Answer YES if you agree with the statement and NO if you disagree.
1_
My computer has an antivirus so it is okay to open most email attachments like e-cards and video files
2_
Your friend told you that his college application was rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video several years ago but later took it dowwn to protect
your friend's reputation. Can your friend be right that the college found the video
3_
You and your friend play a lot of video games. One time she asks you for your password so she can help
you level up and get in-game money. She promises to keep your password a secret. Is it okay to give
away your password?
4_
You receive an email stating that your mother's bank account is going to be forfeited if you do not respond
to the email. Is it safe to reply?
5_
You forgot that your essay for English class is due tomorrow. While doing your research, you found a
website offering free essays. Is it okay to use the essays from this free essay website?
ONLINE SAFETY AND SECURITY
The Internet is a powerful tool.
-use to promote businesses
-gain friends and stay in touch
-source of entertainment (games, streaming)
The internet is defined as the information superhighway
-anyone can access, grab and place information
Stay Safe Online
Stay Safe Online
The Internet is a public place and it is up to you to protect yourself.
TIPS
TIPS

 Be mindful of what you share online and what site you share it to
 Do not just accept terms and conditions; read it
 Check out the privacy policy page of a website to learn how the website handles the information
you share.
 Know the security features of the social networking site you use. By keeping your profile private,
search engines will not be able to scan your profile.
 Do not share your password with anyone

 Avoid logging in to public networks/WIFI. Browsing in “incognito (or private) mode” will not protect
you from hacker.
 Do not talk to strangers whether online or face-to-face.
 Never post anything about a future vacation. It is similar to posting, “rob my house at this date”
 Add friends you know in real life
 Avoid visiting untrusted websites

 Install and update an antivirus software on your computer. Use only one antivirus software to
avoid conflicts
 If you have a WIFI at home, make it a private network by adding password
 Avoid downloading from untrusted websites
 Buy software and not use pirated ones
 Do not reply or click links from suspicious emails

INTERNET THREATS

INTERNET THREATS
malicious software
Malware
VIRUS
a malicious program that replicate itself and transfer from one computer to another either through the
Internet and local networks or data storage like flash drives and CDs
VIRUS
WORM
a malicious program that transfers form one computer to another by any type of means. Often it uses a
computer network to spread itself. (LOVE BUG WORM)
WORM
TROJAN
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your
PC unprotected and allows hackers to get your information
Rogue security software – tricks the user into posing that it is a security software. It asks the user to pay
to improve his/her security but in reality they are not protected at all.
TROJAN
SPYW ARE
a program that runs in the background without your knowledge. Has the ability to monitor what you are
currently doing and typing through keylogging
Keylogger – used to record the keystroke done by users
SPYW ARE
ADWARE
a program designed to send you advertisements, mostly as pop-ups
ADWARE
unwanted email mostly from bots or advertisers. It can be used to send malware
Spam
its goal is to acquire sensitive personal information like password and credit card details. This is done by
sending you an email that will direct the user to visit a website and be asked ti update his/her username,
password, credit card or personal information.
Pharming a more complicated way of phishing that exploits DNS system
Phishing
Protecting Reputations and Thinking Before Clicking

ONLINE REPUTATION
Embarrassing moments are captured using any device and can be posted on the internet
CONSIDERATIONS
Ask yourself first
Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once
you post something on the web, you have no control of who sees your posts.
CONSIDERATIONS
Talk about responsibility
Your friends depend on you to protect their reputation online. Talk your friends about this serious
responsibility
Set your post to "private"
Search engines will not be able to scan the post.
Avoid using names
Names are easy for search engines to scan
Ask then Report
if you feel that the post can affect you or other's reputation, ask the one who posted it to pull it down or
report it as inappropriate
Not everything out there is free to use.
COPYRIGHT INFRINGEMENT
copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures but does not generally does NOT protect underlying ideas and facts.
UNDERSTAND
– even if a material does not say that it is copyrighted, it is not a valid defense against copyright.
BE RESPONSIBLE
ask yourself whether what you are making is something that came from you or something made from
somebody else’s creativity.
BE CREATIVE
there are some limitations to copyright laws.
In Philippines, lifetime (of the creator) + 50 years and Fair Use provisions
KNOW THE LAW
Information that we need is more likely already in the Internet. It is just a matter of how to look.
ONLINE RESEARCH
Focus on a question you want answered. if it is a series of questions, start with one. Never search
everything on one go.
Have a question in mind
Use filters to determine the most appropriate result
Narrow it down
the best way to filter information is by using advance search
Advance Search
Advance Search
Look for a credible source

You might also like