EMPOWERMENT-TECHNOLOGIES WEEK2 4-Pages

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Empowerment Technologies users to fraudulent Web sites without their

First Quarter – Week 2 knowledge or consent. This happened when the code
ONLINE SAFETY, SECURITY, ETHICS, AND sent in an e-mail modifies local host files on a personal
ETIQUETTE computer. A computer with a compromised host file will go
LEARNING ACTIVITY SHEET to the fake Web site even if a user types in the correct
Internet address or clicks on an affected bookmark entry
Background Information (Rouse, Pharming n.d.).
As our society faces the ‘new normal’, most of
our daily tasks now need the assistance of Information and Computer Viruses - are small programs or scripts that can
Communication Technologies. Thanks to the internet, negatively affect the health of your computer. These
because we can now meet and communicate with each malicious little programs can create files, move
other online. Paying bills, buying goods, growing your files, erase files, consume your computer's memory, and
network of friends and even learning can be done online. cause your computer not to function correctly. Some
Life now is almost turning to digital media. According to viruses can duplicate themselves, attach themselves to
(Preston n.d.), digital media is any form of media that uses programs, and travel across networks. In fact, opening an
electronic devices for distribution. This form of media can infected e-mail attachment is the most common way to
be created, viewed, modified and distributed via electronic get a virus (Christensson, Virus Definition 2011).
devices. And it is very important that you not only know
how to use and deal with these technologies but it is Spyware - is software that "spies" on your computer where it
necessary to know the different threats brought by the captures information like Web browsing habits, e-
internet and be equipped on how to keep your mail messages, usernames and passwords, and credit
private information safe and secure online. card information. If left unchecked, the software can
Private information is your sensitive personal information transmit this data to another person's computer over the
or your identity such as your username and passwords Internet. It can be installed when you open an e-mail
or bank accounts. Even though the government attachment containing the malicious software. It can also be
has already set a policy, the Republic Act 10173 or the installed when you install another program that has a
Data Privacy Act of 2012, that is to protect the spyware installer attached to it (Christensson, Spyware
fundamental human right of privacy, of Definition 2006).
communication while ensuring free flow of information to
promote innovation and growth (Republic Act 10173 – Pop-ads - a type of window that appears on top of (over) the
Data Privacy Act of 2012 n.d.), it is important to have the browser window of a Web site that a user has visited (Pop-
knowledge of maximizing your private information in up Ad n.d.). It is also called as pop-up ads. It can also be
order to keep it safe and secure is called online safety or used by hackers to steal your personal information (such as
web safety or internet safety. It is also necessary to apply your bank details). Clicking pop-up ads can redirect you to
ethics and etiquette online to avoid problems in facing sites that can infect your computer and system files (What
digital media. Causes Pop-up Ads and How to Remove Them 2019).

Key Concepts There are also common threats to personal safety. They
are the following:
The following are some of the internet threats you need to be
aware of: 1. Cyberstalking
Email Scam/Junk Mail/Spam Mail - Usually
unsolicited commercial email sent from an
unknown source with identical message sent to
multiple recipients. Usually not dangerous but can be
time and space consuming. Dangerous ones can carry
viruses and other malicious software or malware.
– is the same as physical stalking by giving
Email Spoofing - is the creation of emails with a unwanted obsessive attention to a specific person like
forged sender address. The goal of email spoofing is to get following, secret surveillance, persistent and
recipients to open, respond and engage with the email manipulative calling and texting, and other means
message. Email spoofing can greatly increase the of approaching the victim unexpectedly but cyber
effectiveness of phishing and other email-based cyberattacks stalkers rely on online technology to do it. Email,
by tricking the recipient into trusting the email and its sender social networks, instant messaging, personal data
(Tunggal 2019). It is usually used by spammers to hide the available online – everything on the Internet can be
origin of the spam. used by cyberstalks to make inappropriate contact
with their victims (Andrea 2020).
Phishing is a deceitful practice of getting your personal
information using email or text messages. Scammers may
try to steal your passwords, account numbers, or Social 2. Cyberbullying
Security numbers. If they get that information, they could
gain access to your email, bank, or other accounts (Federal
Tr. Comm. ’19)

Pharming - is a scamming practice in which malicious code


is installed on a personal computer or server, misdirecting
- is bullying that takes place over digital devices like 4. Don’t Exclude Others
cell phones, computers, and tablets. It can occur Don’t let others feel that they are the one you
through SMS, Text, and apps, or online in social are talking to in your obscure comment to your
media, forums, or gaming where people can view, Facebook status, forum or Instagram story. And if you
participate in, or share content. It includes sending, have an in-joke to share with one other person, or a
posting, or sharing negative, harmful, false, or mean small number of people in a larger online group, send
content about someone else like sharing personal or them a private message.
private information causing embarrassment or 5. Choose Friends Wisely
humiliation. Some cyberbullying crosses the line into It is insulting to be dropped from
unlawful or criminal behavior (What Is someone’s friend list on a social media site. So,
Cyberbullying 2020). think about it before sending a friend request or
accepting an invitation. If you don’t want to be in
3. Online Predation - is the act of engaging an touch with someone, don’t add them in the first
underage minor into inappropriate sexual place. This must be observed by kids or teens so
relationships through the internet. Online predators they will not be a victim of online predation.
may attempt to initiate and seduce minors People sometimes are good in pretending just to
into relationships through the use of chat rooms or get your attention or use fake accounts.
internet forums. Online predators may try to lure 6. Respect People’s Privacy
kids and teens into sexual conversations or One example is when you send email to
even face-to-face meetings. Predators will multiple recipients, don’t send it at once, you can
sometimes send obscene material or request send it privately individually or use BCC (blind
that kids send pictures of themselves (Internet carbon copy) rather than CC (carbon copy). The
Safety for Kids-Staying safe from online predators same goes for uploading photos or videos that
n.d.). include other people because others who are in this
photo don’t want to be viewed by unknown friends.
4. Flaming - is the act of saying mean things online, This also applies for tagging people on Facebook
usually in ALL CAPS, and often in a public because others don’t want to be tagged. Another
forum with the intention to humiliate. example is don’t sign up for newsletters and other
communications using someone’s email address. If
Online Ethics and Etiquette you apply this rule, hackers might not have chance
In order for you to be safe and you can protect to enter and ruin your digital life.
your private information while you are working online, you 7. Fact Check Before Reposting
need to know and apply online ethics and etiquette. If you aren't sure of the facts that
you’re going to repost, email it to someone
Online ethics focuses on the acceptable use of who does know or can find out. Or do a search on
online resources in an online social environment. Google or snopes.com. Because once you’ve
Netiquette is a combination of the words network and reposted a fake news or false facts, many can
etiquette and is defined as a set of rules for acceptable possibly believe it and spread once again.
online behavior (What is Netiquette? A Guide to Online Don't forget also that many viruses are
Ethics and Etiquette n.d.). circulated via chain letters and invitations. So,
forwarding or reposting this kind of messages will
10 Basic Rules of Netiquette not bring good luck but rather bad luck. Don’t
The rules of etiquette are just as important in cyberspace forget to cite the owner of the post or where it
as they are in the real world (Harney 2020) came from. And before posting, check whether it is
1. Make Real People a Priority appropriate or inappropriate to others.
If you are talking personally and face to face with 8. Respond to Emails Promptly
someone, stop browsing or chatting with anybody else In doing this, you can easily check
in your cellphone. whether the emails you received are spams,
2. Use Respectful Language unsolicited messages or crafty stuffs and delete
Avoid name-calling, cursing, expressing these rights away. But if you send your email to
deliberately offensive opinions. In typing, don’t use your friends or set it as public, then you need to
caps lock. Text in all caps is generally perceived as respond immediately. But doublecheck where it
yelling or flaming which cause misunderstanding and really came because there are people who are fond
trouble. Please don’t forget to say please and thank of playing or making fake emails just to get in
you as appropriate. touch with you.
3. Share with Discretion 9. Update Online Information
Avoid sending naked sexy pictures, drunk Don't leave inaccurate information online
pictures, drug use pictures or unedited home video. that will mislead your friends or your customers if
If you would have a problem with your boss, your you have an online business. If you have a
parents, or your kids seeing it now, or at any point business website, update it regularly. Like your
in the future, don’t post it online. Children should operating hours, if you are not available for that
not post private information online. Do not also time, change it right away.
share your location or picture where you are 10. Think before Click
currently at. Keep your personal information Don’t hesitate to think before clicking
private. because you might click an unknown links or files
that are likely to contain malware which will 8. Daine is fond of downloading pirated movies. Then
infect your devices or a link to hacker’s website. suddenly, there are pop-ups about upcoming movies
Think before clicking Like in social media showing on his screen every now and then. And his
posts because it might be a suicide post that will computer becomes slow. His computer is already infected
end to death because you liked his suicidal post. with ____________.
9. Precy has received an email from the bank asking
Hacker - a clever or expert programmer who her to update her personal information for security purposes.
can gain unauthorized access to other computers. He can She clicked the link and signed in. Unknowingly, Precy is
“hack” his way through the security levels of a already a victim of ____________.
computer system or network (Christensson, Hacker
Lily knows that the website of BPI Bank is
Definition 2006). And can vandalizes the victims’
website, steals personal information, obtains intellectual www.bpibank.com so she typed it in the address bar and log
property, and performs credit card fraud. in to the system. Unknowingly upon signing in, Lily’s
username and password has already been compromised and
Most Essential Learning Competencies is now a victim of ___________.
• Apply online safety, security, ethics, and etiquette ACTIVITY B. In the table below, mark with a check (
standards and practice in the use of ICTs as it ) the internet threats that can be avoided in doing each
would relate to your specific professional track netiquette. Internet threats are represented by letter in the
(CS_ICT11/12-ICTPTIa-b2). table under Internet Threats column.
A. Computer Virus F. Online Predation
ACTIVITY A. Match the items described with the internet
B. Cyberbullying G. Pharming
treat indicated inside the box.
C. Cyberstalking H. Phishing
A. Computer Virus F. Online Predation
D. Flaming I. Spam
B. Cyberbullying G. Pharming
E. Hacker J. Spyware
C. Cyberstalking H. Phishing
D. Flaming I. Pop-ads
E. Hacker J. Spyware

1. This is one form of internet advertising


used by advertisers to get the attention of web
users but sometimes has an obscene or an offensive
content.
2. A 12-year old girl reported to her mother that an
old man appeared in her chat room asking and seducing her
ACTIVITY D: Essay
to chat with him. The old man is doing an act of
Examine the message below and answer the
__________.
questions that follows. Write your answers in your
3. Devon is fund of taking photos. While notebook.
they are practicing their play, he takes an embarrassing “Hello, STUPID! If you weren’t such an
photo of Lori who is a very shy girl. He then posts the IDIOT, you’d understand why you’re wrong about
photo on social media and spread it to his friends. Lori is a everything. But apparently, you’re so RETARDED
victim of __________. that you CAN’T EVEN SPELL RIGHT. And also,
4. Because of what Devon did to Lori, Lori fought you’re FAT.” (Burnside 2019)
back by sending this message “YOU IDIOT! BASTARD!! 1. What kind of an internet threat do you think is this?
GO TO HELL!!!” to Devon. He received a __________ 2. Why is this a threat to you?
word. 3. What can you do to avoid this?
5. Mona is the most beautiful girl and very
4. How will you reconstruct the message so it will not be
famous in town. She has a suitor who is always following
hurtful?
her. One day, she wants to be free and wants to go to
somewhere else alone. Nobody knows where she will go.
When she reached the place, she takes photo and post it in
social media. A few hours later, her avid suitor is already in References:
her place. So, the avid suitor is __________ Mona. Andrea, Sybil. 2020. "Cyberstalking: definition and laws."
NordVPN. February 11. Accessed June 30, 2020.
6. Lydia has learned how to transact online
https://nordvpn.com/blog/cyberstalking/.
using her credit card as a mode of payment. She is using Boyd, Ashley. 2020. Which Video Call Apps Can You
her laptop and since she is new, she browses the internet and Trust? April 28. Accessed June 24, 2020.
click something out of curiosity. She got a problem when https://blog.mozilla.org/blog/2020/04/28/which-video-call-
she received her credit card statement because of the big apps- can-you-trust/. Burnside, Keith. 2019. "Top 10
amount she needs to pay. Lydia was attacked by Internet Flame Wars." TopTenz. April 30. Accessed
__________. July 2, 2020. https://www.toptenz.net/top-10-internet-
7. Dan has finished all the written reports. He saved flame-wars.php.
it in a flash drive and he submitted it to his manager. The Christensson, Per. 2006. "Hacker Definition." TechTerms.
manager called him and said that his flash drive is empty. Accessed June 30, 2020.
Dan’s flash drive was infected with __________. https://techterms.com/definition/hacker.
—. 2010. "ICT Definition." TechTerms. January 4. Tunggal, Abi Tyas. 2019. "What is Email Spoofing?"
Accessed June 24, 2020. Upguard. December 9.Accessed June 30, 2020.
https://techterms.com/definition/ict. https://www.upguard.com/blog/email-spoofing.
—. 2006. "Spyware Definition." TechTerms. Accessed "What Causes Pop-up Ads and How to Remove Them." July
June 30, 2020. 17. AccessedJuly 1, 2020
https://techterms.com/definition/spyware. https://www.hellotech.com/blog/what-causes-pop-up-
—. 2011. "Virus Definition." TechTerms. August 16. ads-how-to- remove.
Accessed June 30, 2020. "What Is Cyberbullying." stopbullying.gov. May 7.
https://techterms.com/definition/virus. Accessed June 30,
Department of Education. 2016. Empowerment 2020.https://www.stopbullying.gov/cyberbullying/what-
Technologies: Student Reader. Manila: DepEd Central is-it.
Office. n.d. "What is Netiquette? A Guide to Online Ethics and
Federal Trade Commission. Etiquette." Webroot.Accessed July 1, 2020.
2019. "How to Recognize and Avoid Phishing https://www.webroot.com/us/en/resources/tips-
Scams." Federal Trade Commission Consumer articles/netiquette- and-online-ethics-what-are-they.
Information. May. Accessed June 30, 2020. Ezez. 2020. Image.
https://www.consumer.ftc.gov/articles/how-recognize- https://img.favpng.com/
and-avoid- phishing-scams. 12/2/20/spam-scalable-vector-
Hartney, Elizabeth. 2020. "10 Basic Rules of Netiquette or graphics-email- icon-png-
Internet Etiquette." favpngcgZ3qpb3sSM9Td3zKs
Verywellmind. January 13. Accessed July 1, 2020. AA5JKxn.jpg
https://www.verywellmind.com/ten-rules-of- Ezez. 2020. Image.
netiquette22285. https://www.lifewire.com/thmb/i3UqlWLTVSUKcR-
n.d. "Internet Safety for Kids-Staying safe from online JNmf_FJgt0qw=/768x0/
predators." GFCGlobal. Accessed June 30, 2020. filters:no_upscale():max_bytes(150000):strip_icc()/
https://edu.gcfglobal.org/en/internetsafetyforkids/stayin what-is- email-spoofing-
g-safe-from- online-predators/1/. 248350141bb3e27626f40c88e227ec6545120a8.jpg
OECD. 2019. "What is an “online platform”? in An Ezez. 2020.
Introduction to Online Platforms and Their Role in the Image.https://cdn1.vectorstock.com/i/1000x1000/69/20/
Digital Transformation." OECDiLibrary. May 13. mail-phishing-icon- simple-style-vector22606920.jpg
Accessed June 25, 2020. Ezez. 2020.Image.https://www.cloudbric.com/wp-
https://doi.org/10.1787/19e6a0f0-en. content/uploads/234.png
n.d. "Pop-up Ad." Webopedia. Accessed July 1, 2020. Ezez. 2020.
https://www.webopedia.com/TERM/P/ Image.https://cdn.iconscout.com/icon/premium/png-
popup_ad.html. Preston, Lauryn. n.d. "What is 256-thumb/computer- virus-9-1105291.png
Digital Media?" Digital Logic. Accessed June 30, Ezez. 2020.
2020. Image.https://encrypted-tbn0.gstatic.com/images?q=tbn
https://www.digitallogic.co/blog/what- %3AANd9GcSZlQa-
isdigitalmedia/#:~:text=Digital%20media%20is%20any NZyLPaQHa7poPqI3c4mePpvW2Ri76w&usqp=CAU
%20form,social%20media%2 C%20and%20online Ezez.2020.Image.
%20advertising. https://lh3.googleusercontent.com/proxy/
Ramoran, Noel. 2011. "Internet Etiquette and Examples." FLzWcZesygYSNI3mr1O2aCVbb_l
Blogspot. September 6. Accessed July 1, aTwmTLPYpvUH3ROZdsBNxjiY6z-
2020.http://noel-ramoran.blogspot.com/2011/09/internet _sz9DASOuKsMiCDgqqO9eG9eUA9hj95Kstn5_8uS1
-etiquette-and- examples_2805.html. B22gwfGc_4AZo8NsI1PThF3ax
n.d. "Republic Act 10173 – Data Privacy Act of 2012." 5zwX9rNtQabwDw
National Privacy Commission. Accessed July 22, 2020.
https://www.privacy.gov.ph/data-privacy-act/.
Rouse, Margaret. n.d. "Pharming." TechTarget. Accessed
June 30, 2020.
https://searchsecurity.techtarget.com/definition/pharmin
g.
EDITED BY:
n.d. "Video Conferencing." TechTarget. Accessed June 25,
2020.https://
searchunifiedcommunications.techtarget.com/ RUFUS CORIN EIFFEL C. TANHUECO
definition/video-conference. SPST-I
Seltzer, Diane. n.d. "Comparison Chart for Choosing FRANCISCO G. NEPOMUCENO MEMORIAL HIGH
Between Top Social Media Sites for Marketing." Small SCHOOL
Business Marketing Tools. Accessed June 27,
2020.https://www.sbmarketingtools.com/comparison-
chart-for-choosing- between-top-social-media-sites-
formarketing/.
Tino, Jessamen. 2016. "Online Ethics and Etiquette."
SlideShare. August 23. Accessed July 1, 2020.
https://www.slideshare.net/JessamenTino21/online-
ethics-and-etiquette.

You might also like