Professional Documents
Culture Documents
TVL Empowerment Technologies-Q3-M3
TVL Empowerment Technologies-Q3-M3
TVL Empowerment Technologies-Q3-M3
Empowerment
Technologies
QUARTER 1
MODULE Online Safety, Security, Ethics,
3 and Etiquette: Internet Threats
Republic Act 8293, Section 176 states that no copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of
such work for profit. Such agency or office may, among other things, impose as a
condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
Empowerment
Technologies
QUARTER 1
MODULE
Online Safety, Security,
3 Ethics, and Etiquette:
Internet Threats
Introductory Message
This learning material hopes to engage the learners in guided and independent
learning activities at their own pace and time. Further, this also aims to help learners
acquire the needed 21st century skills especially the 5 Cs, namely: Communication,
Collaboration, Creativity, Critical Thinking, and Character while taking into
consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Moreover, you are expected to encourage and assist the
learners as they do the tasks included in the module.
For the Learner:
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an active
learner.
Posttest - This measures how much you have learned from the
entire module.
EXPECTATIONS
PRETEST
Categories Answers
ICTs
Social Media
LESSON
Have you encountered the blue screen of death after your accessed or
downloaded a free product from a website? If yes, do not worry. You are not
the only one who suffer this damage on their ICTs. Some of us, even me,
experience this one. Through this lesson, you will learn how to protect yourself
and the other users in the digital world.
The threats in the Internet is real. After all, it become a public place especially
billions of people have an access and knowledge about Internet. One of the
threats that you must avoid is the malware. This term came from the blended
words “malicious” and “software”. Internet users usually acquired this threat
through online. Malware is an umbrella term covering five (5) different types:
2. Worm – Unlike the virus, this malware replicates itself and can transfer by
any type of means, but more often through computer network. Remember
the ILOVEYOU worm, known as Love Bug, that infected 45 million
machines across the globe, including the Pentagon, within 24 hours last
May 4, 2000? (Computer Weekly, 2020.) When the victim opens the
attachment, an e-mail entitled LOVE-LETTER-FOR-YOU, the malware
automatically send itself to all the victim’s Microsoft Outlook contacts.
3. Trojan – Tracing its name origin, it can be link to the mythology story about
how Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like
the Odysseus’ strategy, this malicious program disguised as a useful
program, however left your devices unprotected and became vulnerable to
other malwares once you accessed or downloaded it.
4. Spyware – a malicious program that monitors the device, and the actions
of the user without its knowledge. Another example, the keylogger steals
sensitive information using the recorded user’s keystrokes.
Whether in the reality, or in the digital world, persons with bad intentions are
everywhere, and they are just waiting for an opening to do it. As a responsible
digital citizen (commonly called netizen (Internet citizen), we must be aware
about these Internet threats, how to avoid it, and practice our digital
citizenship.
ACTIVITIES
I. TECH. ASSISTANCE: Can you help her? Name at least five malwares you
see in the picture.
1. __________________
2. __________________
3. __________________
4. __________________
5. __________________
II. OUTSIDE WORLD: At this stay at home season, ICTs keep us entertained
and informed. From the past months up until now, illustrate an editorial
cartoon featuring your one chosen cybercrime that happened during this
pandemic lockdown.
WRAP-UP
From the lesson, malwares have six (6) types. Can you list it? Please, write it
down in an alphabetical order.
1. _______________ 2. _______________ 3. _______________
4. _______________ 5. _______________ 6. _______________ These
malwares can be an avenue for cybercrimes. Can you enumerate the 7
cybercrimes mentioned from this module?
1. _______________ 2. _______________ 3. _______________
4. _______________ 5. _______________ 6. _______________
7. _______________
In wherever world you are, real or digital, threats are just in the corner waiting
to harm someone. Always remember, security and safety always start from
us.
VALUING
Sounds cliché, but honesty is the best policy. Share the “bad things” or any
unwarranted acts (like piracy) you have done using ICT. Ask yourself why you
did that/them. Read your answer in front of the mirror while your alone.
Assess yourself and what you feel.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
POSTTEST
Directions: Rules like “No Food nor Drinks Allowed” and “Log out your
account” are commonly posted on computer laboratory and shop. As a
responsible netizen, plan a set of rules (10) that you need to follow when your
online or in the digital world. Post it in any place where you can see this often.