Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

LESSON 2: 

ONLINE
SAFETY, SECURITY AND
RULES OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their
information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online

communication.

TEN RULES OF NETIQUETTE


Rule No. 1: Remember the human

          You need to remember that you are talking to a real person when you
are online.
          The internet brings people together who would otherwise never meet.
          Remember this saying when sending an email: Would I say this to the
person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.

       You need to behave the same way online that you do in real life.
       You need to remember that you can get caught doing things you should
not be doing       online just like you can in real life.
         You are still talking to a real person with feelings even though you
can’t see them.
Rule no. 3: Know where you are in cyberspace.

          Always take a look around when you enter a new domain when
surfing the web.
          Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.

          Remember people have other things to do besides read your email.


You are not the center of their world.
          Keep your post and emails to minimum by saying what you want to
say.
          Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.

          Be polite and pleasant to everyone.


          Always check your spelling and grammar before posting.
 ·        Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge

         Ask questions online


         Share what you know online.
         Post the answers to your questions online because someone may have
the same question         you do.
Rule no. 7: Help keep flame wars under control
         Netiquette does not forgive flaming.
         Netiquette does however forbid people who are flaming to hurt
discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.

          Do not read other people’s mail without their permission.


          Going through other people’s things could cost you, your job or you
could even go to jail.
          Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.

          Do not take advantage of other people just because you have more
knowledge or power than them.
          Treat others as you would want them to treat you if the roles were
reversed.
Rule no. 10: Be forgiving of other people’s mistake.

          Do not point out mistakes to people online.


          Remember that you were once the new kid on the block.
          You still need to have a good manners even though you are online and
cannot see the          person face to face.
  Internet security
  Security Requirement Triad
                  

ConfidentIality                         
          Data confidentiality
Privacy
                Integrity
         Data integerity                                                        System integrity
                Availability
Threat Consequence Threat Action ( Attack)
Exposure: Sensitive data are directly released
to an unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses
sensitive data by reasoning from
characteristics or byproducts of
Unauthorized Disclosure communications.
A circumstance or event whereby Intrusion: an unauthorized entity gains
an entity gains access to data for access to sensitive data by circumventing a
which the entity is not authorized. system’s security protections.
Incapacitation: prevents or interrupts system
operation by disabling a system component.
Corruption: Undesirably alters system
operation by adversely modifying system
Disruption functions or data.
A circumstances or even that Obstruction: A threat action that interrupts
interrupts or prevents the correct delivery of system services by hindering
operation of system services and system operation.
functions. Masquerade: An unauthorized entity gains
access to a system or performs a malicious act
Deception by posing as an authorized entity.
A circumstance or event that may Falsification: False data deceive an
result in an authorized entity authorized entity.
receiving false data and believing Repudiation: An entity deceives another by
it to be true. falsely denying responsibility for an act.
Usurpation
A circumstances or event that
results in control of system Misappropriation: An entity assumes
services or functions by an unauthorized logical or physical control of a
unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is
detrimental to system security.
Types of System Intruders
          Masquerader
          Hackers
          Clandestine user

 Parts of Virus 
  Infection mechanism
  Trigger
   PayloaD
Virus stages
    Dormant phase                                                                                                                    
Virus is idle.
       Propagation  phase                                                                                                          
Virus places an identical copy of itself into other programs or into certain
system areas on t        the disk.
    Triggering phase                                                                                                                
Virus is activated to perform the function for which it was intended.                                  
Caused by a variety of system events
        Execution phase                                                                                                              
Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will
handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in
any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file
folder to another and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and allows hacker to
get your information.
Spyware– a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card
details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it
w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as
it is used in commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal
passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their computer, and manipulates
them into paying money for a fake malware removal tool.
Four search strategies
     Keyword searching
Enter terms to search

Use quotation marks to search as a phrase and keep the words linked together

Common words are ignored (That, to, which, a, the …)

+ and – can be used to include or exclude a word

     Boolean
AND – enter words connect with AND- it will include sites where both words and
found
   Uses: joining different topics (i.e. global warming AND California)

OR   –  requires at least one of the terms is found.


   Uses: join similar or synonymous topics (i.e. global warming OR greenhouse
effect)
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)

Question                                                                                                                                

 a question may be entered in the search field of search engine    
         Advanced                                                                                                                     
Features are offered on many engines by going to an “Advanced search”
page and  making selections. Effective in narrowing search returns to a
specific topic or phrase.

You might also like