TVL Empowerment Technologies-Q3-M3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

g

Empowerment
Technologies
QUARTER 1
MODULE Online Safety, Security, Ethics,
3 and Etiquette: Internet Threats

TECHNICAL VOCATIONAL LIVELIHOOD


Empowerment Technologies – Grade 12
Quarter 1 – Module 3: Online Safety, Security, Ethics, and Etiquette: Internet
Threats First Edition, 2020

Republic Act 8293, Section 176 states that no copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of
such work for profit. Such agency or office may, among other things, impose as a
condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education - Schools Division of Pasig City

Development Team of the Self-Learning Module

Writer: Chirelyn P. Delavega


Editor: Name
Reviewers: Janeth M. Pineda (Content) and Cerina V. Galoy (Technical)
Illustrator: Name
Layout Artist: Name
Management Team: Ma. Evalou Concepcion A. Agustin
OIC-Schools Division Superintendent
Aurelio G. Alfonso EdD
OIC-Assistant Schools Division Superintendent
Victor M. Javeña EdD
Chief, School Governance and Operations Division and
OIC-Chief, Curriculum Implementation Division

Education Program Supervisors

Librada L. Agon EdD (EPP/TLE/TVL/TVE)


Liza A. Alvarez (Science/STEM/SSP)
Bernard R. Balitao (AP/HUMSS)
Joselito E. Calios (English/SPFL/GAS)
Norlyn D. Conde EdD (MAPEH/SPA/SPS/HOPE/A&D/Sports)
Wilma Q. Del Rosario (LRMS/ADM)
Ma. Teresita E. Herrera EdD (Filipino/GAS/Piling Larang)
Perlita M. Ignacio PhD (EsP)
Dulce O. Santos PhD (Kindergarten/MTB-MLE) Teresita
P. Tagulao EdD (Mathematics/ABM)

Printed in the Philippines by Department of Education – Schools Division of


Pasig City

Empowerment
Technologies

QUARTER 1

MODULE
Online Safety, Security,
3 Ethics, and Etiquette:
Internet Threats
Introductory Message

For the Facilitator:

Welcome to the Empowerment Technologies Self-Learning Module on Online


Safety, Security, Ethics, and Etiquette: Internet Threats!

This Self-Learning Module was collaboratively designed, developed and


reviewed by educators from the Schools Division Office of Pasig City headed by its
Officer-in-Charge Schools Division Superintendent, Ma. Evalou Concepcion A.
Agustin, in partnership with the City Government of Pasig through its mayor,
Honorable Victor Ma. Regis N. Sotto. The writers utilized the standards set by the K
to 12 Curriculum using the Most Essential Learning Competencies (MELC) in
developing this instructional resource.

This learning material hopes to engage the learners in guided and independent
learning activities at their own pace and time. Further, this also aims to help learners
acquire the needed 21st century skills especially the 5 Cs, namely: Communication,
Collaboration, Creativity, Critical Thinking, and Character while taking into
consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

Notes to the Teacher


This contains helpful tips or strategies that
will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Moreover, you are expected to encourage and assist the
learners as they do the tasks included in the module.
For the Learner:

Welcome to the Empowerment Technologies Self-Learning Module on Online


Safety, Security, Ethics, and Etiquette: Internet Threats!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an active
learner.

This module has the following parts and corresponding icons:

Expectations - This points to the set of knowledge and skills that


you will learn after completing the module.

Pretest - This measures your prior knowledge about the lesson at


hand.

Recap - This part of the module provides a review of concepts and


skills that you already know about a previous lesson.

Lesson - This section discusses the topic in the module.

Activities - This is a set of activities that you need to perform.

Wrap-Up - This section summarizes the concepts and application of


the lesson.

Valuing - This part integrates a desirable moral value in the lesson.

Posttest - This measures how much you have learned from the
entire module.
EXPECTATIONS

At the end of the learning period, the students shall have:

1. differentiate the malwares and cybercrimes in the Internet;


2. name the types of malware using the image;
3. illustrate an editorial sketch of your chosen cybercrime that happened
during this pandemic; and
4. plan their own set of rules to avoid these Internet threats.

PRETEST

Directions: Being safe and secured online depends on how we protect


ourselves. Analyze the following statement below. On the blank circle, draw
thumbs-up if you agree, and thumbs-down if not.
RECAP
Do you a have good memory? Let’s review the past lesson by filling-in the
organizer with 5 examples each category below:

Categories Answers

ICTs

Social Media
LESSON

Have you encountered the blue screen of death after your accessed or
downloaded a free product from a website? If yes, do not worry. You are not
the only one who suffer this damage on their ICTs. Some of us, even me,
experience this one. Through this lesson, you will learn how to protect yourself
and the other users in the digital world.

The threats in the Internet is real. After all, it become a public place especially
billions of people have an access and knowledge about Internet. One of the
threats that you must avoid is the malware. This term came from the blended
words “malicious” and “software”. Internet users usually acquired this threat
through online. Malware is an umbrella term covering five (5) different types:

1. Virus – It is malicious program that usually transfer from one device to


another with the aid of the Internet and local networks, but commonly
through data storage such as flash drives or hard drive.

2. Worm – Unlike the virus, this malware replicates itself and can transfer by
any type of means, but more often through computer network. Remember
the ILOVEYOU worm, known as Love Bug, that infected 45 million
machines across the globe, including the Pentagon, within 24 hours last
May 4, 2000? (Computer Weekly, 2020.) When the victim opens the
attachment, an e-mail entitled LOVE-LETTER-FOR-YOU, the malware
automatically send itself to all the victim’s Microsoft Outlook contacts.

3. Trojan – Tracing its name origin, it can be link to the mythology story about
how Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like
the Odysseus’ strategy, this malicious program disguised as a useful
program, however left your devices unprotected and became vulnerable to
other malwares once you accessed or downloaded it.

4. Spyware – a malicious program that monitors the device, and the actions
of the user without its knowledge. Another example, the keylogger steals
sensitive information using the recorded user’s keystrokes.

5. Adware – this program automatically sends pop-ups advertisements.

Usually spam or unwanted emails contains bots and advertisements, however


cyber criminals can use this to transfer malwares; or worst, do cybercrimes
like phishing. Mr. Victor Lorenzo, National Bureau of Investigation (NBI)
Cybercrime Division Chief, said that cybercrime incidents rose up to 100%
during the Covid-19 pandemic, and phishing ranked one (GMA News Online
2020). Does it sound fishy? Like in fishing, criminal steals sensitive personal
information like account passwords and banking details by sending out an
alarming e-mail as a bait. Usually, they ask you to click a link, or input your
username, password, or any personal info.

Phishing is an example of cybercrime, an illegal act done using Internet, and


there’s more:

1. Hacking – it is unauthorized accessing of data from a computer network.


Mostly, hackers attack commercial and government sites to cause an alarm
or to threat someone.

2. Sport Betting – it is an illegal act of gambling on any sports event that


happened over the Internet.

3. Non-Delivery of Merchandise – a deceiving act which the culprit posted a


product or service on the Internet. Once the victim placed its payment, the
culprit does not give the item or service.

4. Electronic Harassment – an anonymous criminal who harass, abuse,


threat, or annoy other people. One example of this is cyberbullying or the
repeated harassment that usually happens among the youth, and from the
past years, becomes the main cause of suicide cases.

5. Child Pornography – Based on Republic Act no 9775 or known as


AntiChild Pornography Act of 2009, it is an act of real or simulated explicit
sexual activities that involves any child aged 18 and below and it is
penalized depending on the offender. If it is the parent or relative of the
child, they’ll receive the maximum penalty.

6. Prostitution – it is an illegal act engage in any sexual activities.

7. Criminal Copyright Infringement – it is an unauthorized use or stealing


of intellectual property, such as movies and music, for profitable benefit.
Sometimes, students violate it through plagiarism.

Whether in the reality, or in the digital world, persons with bad intentions are
everywhere, and they are just waiting for an opening to do it. As a responsible
digital citizen (commonly called netizen (Internet citizen), we must be aware
about these Internet threats, how to avoid it, and practice our digital
citizenship.

ACTIVITIES

I. TECH. ASSISTANCE: Can you help her? Name at least five malwares you
see in the picture.

Write your answers


here:

1. __________________

2. __________________

3. __________________

4. __________________

5. __________________

II. OUTSIDE WORLD: At this stay at home season, ICTs keep us entertained
and informed. From the past months up until now, illustrate an editorial
cartoon featuring your one chosen cybercrime that happened during this
pandemic lockdown.
WRAP-UP

From the lesson, malwares have six (6) types. Can you list it? Please, write it
down in an alphabetical order.
1. _______________ 2. _______________ 3. _______________
4. _______________ 5. _______________ 6. _______________ These
malwares can be an avenue for cybercrimes. Can you enumerate the 7
cybercrimes mentioned from this module?
1. _______________ 2. _______________ 3. _______________
4. _______________ 5. _______________ 6. _______________
7. _______________

In wherever world you are, real or digital, threats are just in the corner waiting
to harm someone. Always remember, security and safety always start from
us.

VALUING
Sounds cliché, but honesty is the best policy. Share the “bad things” or any
unwarranted acts (like piracy) you have done using ICT. Ask yourself why you
did that/them. Read your answer in front of the mirror while your alone.
Assess yourself and what you feel.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

POSTTEST

Directions: Rules like “No Food nor Drinks Allowed” and “Log out your
account” are commonly posted on computer laboratory and shop. As a
responsible netizen, plan a set of rules (10) that you need to follow when your
online or in the digital world. Post it in any place where you can see this often.

You might also like