Professional Documents
Culture Documents
EMPOWERMENT-TECHNOLOGIES WEEK2 4-Pages
EMPOWERMENT-TECHNOLOGIES WEEK2 4-Pages
EMPOWERMENT-TECHNOLOGIES WEEK2 4-Pages
First Quarter – Week 2 knowledge or consent. This happened when the code
ONLINE SAFETY, SECURITY, ETHICS, AND sent in an e-mail modifies local host files on a personal
ETIQUETTE computer. A computer with a compromised host file will go
LEARNING ACTIVITY SHEET to the fake Web site even if a user types in the correct
Internet address or clicks on an affected bookmark entry
Background Information (Rouse, Pharming n.d.).
As our society faces the ‘new normal’, most of
our daily tasks now need the assistance of Information and Computer Viruses - are small programs or scripts that can
Communication Technologies. Thanks to the internet, negatively affect the health of your computer. These
because we can now meet and communicate with each malicious little programs can create files, move
other online. Paying bills, buying goods, growing your files, erase files, consume your computer's memory, and
network of friends and even learning can be done online. cause your computer not to function correctly. Some
Life now is almost turning to digital media. According to viruses can duplicate themselves, attach themselves to
(Preston n.d.), digital media is any form of media that uses programs, and travel across networks. In fact, opening an
electronic devices for distribution. This form of media can infected e-mail attachment is the most common way to
be created, viewed, modified and distributed via electronic get a virus (Christensson, Virus Definition 2011).
devices. And it is very important that you not only know
how to use and deal with these technologies but it is Spyware - is software that "spies" on your computer where it
necessary to know the different threats brought by the captures information like Web browsing habits, e-
internet and be equipped on how to keep your mail messages, usernames and passwords, and credit
private information safe and secure online. card information. If left unchecked, the software can
Private information is your sensitive personal information transmit this data to another person's computer over the
or your identity such as your username and passwords Internet. It can be installed when you open an e-mail
or bank accounts. Even though the government attachment containing the malicious software. It can also be
has already set a policy, the Republic Act 10173 or the installed when you install another program that has a
Data Privacy Act of 2012, that is to protect the spyware installer attached to it (Christensson, Spyware
fundamental human right of privacy, of Definition 2006).
communication while ensuring free flow of information to
promote innovation and growth (Republic Act 10173 – Pop-ads - a type of window that appears on top of (over) the
Data Privacy Act of 2012 n.d.), it is important to have the browser window of a Web site that a user has visited (Pop-
knowledge of maximizing your private information in up Ad n.d.). It is also called as pop-up ads. It can also be
order to keep it safe and secure is called online safety or used by hackers to steal your personal information (such as
web safety or internet safety. It is also necessary to apply your bank details). Clicking pop-up ads can redirect you to
ethics and etiquette online to avoid problems in facing sites that can infect your computer and system files (What
digital media. Causes Pop-up Ads and How to Remove Them 2019).
Key Concepts There are also common threats to personal safety. They
are the following:
The following are some of the internet threats you need to be
aware of: 1. Cyberstalking
Email Scam/Junk Mail/Spam Mail - Usually
unsolicited commercial email sent from an
unknown source with identical message sent to
multiple recipients. Usually not dangerous but can be
time and space consuming. Dangerous ones can carry
viruses and other malicious software or malware.
– is the same as physical stalking by giving
Email Spoofing - is the creation of emails with a unwanted obsessive attention to a specific person like
forged sender address. The goal of email spoofing is to get following, secret surveillance, persistent and
recipients to open, respond and engage with the email manipulative calling and texting, and other means
message. Email spoofing can greatly increase the of approaching the victim unexpectedly but cyber
effectiveness of phishing and other email-based cyberattacks stalkers rely on online technology to do it. Email,
by tricking the recipient into trusting the email and its sender social networks, instant messaging, personal data
(Tunggal 2019). It is usually used by spammers to hide the available online – everything on the Internet can be
origin of the spam. used by cyberstalks to make inappropriate contact
with their victims (Andrea 2020).
Phishing is a deceitful practice of getting your personal
information using email or text messages. Scammers may
try to steal your passwords, account numbers, or Social 2. Cyberbullying
Security numbers. If they get that information, they could
gain access to your email, bank, or other accounts (Federal
Tr. Comm. ’19)