STRONGER THAN YOU SEEM, AND SMARTER THAN YOU THINK”
-Christopher Robin WEEK 2 LESSON 2: ONLINE SAFETY, SECURITY ETHICS AND ETIQUETTE KEEPING YOURSELF SAFE ONLINE
ONLINE SAFETY AND ETHICS
ACCORDING TO GOOGLE’S SUPPORT PAGE
ONLINE SAFETY AND ETHICS
1. CHECK FOR VIRUSES AND MALWARE
ONLINE SAFETY AND ETHICS
What Can Malware Do?
◦ In short, malware can wreak havoc on a computer
and its network. Hackers use it to steal passwords, delete files and render computers inoperable. A malware infection can cause many problems that affect daily operation and the long-term security of your company. What Can Malware Do?
◦ A virus can damage programs, delete files and
reformat or erase your hard drive, which results in reduced performance or even crashing your system entirely. Hackers can also use viruses to access your personal information to steal or destroy your data. Why is it important to scan for viruses?
◦Virus scans search through your system to
locate and remove any malicious threats on your device. You'll find most antivirus software guards against malware. This can include threats like viruses and worms, as well as, spyware, Trojans, ransomware, and adware. ILOVEYOU Example of a virus.
◦ What is the history of ILOVEYOU virus?
◦ ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you, is a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU. What is the history of ILOVEYOU virus? ◦ Onel De Guzman, of AMA Computer College ◦ ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you, is a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU. 2. DO AN ACCOUNT SECURITY CHECKUP
ONLINE SAFETY AND ETHICS
Google Security Checkup
◦Google's Security Checkup is a great way
to ensure that your account is secure and isn't being accessed by anyone but you. It can also help highlight security flaws on your account that may be easily missed. Google Security Checkup
•Manage apps with access to your account
•Review signed-in devices •Review recent security events • i.e. New Sign-ins, App Password creation & deletion, etc. •Enable Two-Step Verification 3. GOOGLE HAS A SECURITY CHECKUP FEATURE, IN YOUR ACCOUNT’S PAGE ONLINE SAFETY AND ETHICS 3. THAT ALLOWS AN OVERALL CHECKUP AND FOR A POSSIBLE UPDATE OF YOUR DETAILS
ONLINE SAFETY AND ETHICS
4. UPDATE YOUR ACCOUNT RECOVERY OPTIONS
ONLINE SAFETY AND ETHICS
Google Security Checkup
•Manage apps with access to your account
•Review signed-in devices •Review recent security events • i.e. New Sign-ins, App Password creation & deletion, etc. •Enable Two-Step Verification 5. ENROLL IN 2- STEP VERIFICATION
ONLINE SAFETY AND ETHICS
What happens when you turn on 2-step verification? 2-step verification adds an extra layer of security to your Google Account. In addition to your username and password, you'll enter a code that Google will send you via text or voice message upon signing in. 6. GOOGLE ALLOWS YOU TO ADD EXTRA LAYER OF SECURITY
ONLINE SAFETY AND ETHICS
6. BY REQUIRING YOU TO GRAB A CODE SENT TO YOUR PHONE AFTER LOGGING IN, WITH YOUR PASSWORD ONLINE SAFETY AND ETHICS 7. PERFORM A REGULAR OPERATING SYSTEM AND BROWSER UPDATES.
ONLINE SAFETY AND ETHICS
Operating system updates Operating system updates provide fixes to possible bugs and security holes, along with cleaning up outdated software that may slow down your device. Ensure that your computer, mobile phone, or tablet is using the latest version of its OS to protect your devices and data from cybersecurity issues 8. NEVER USE YOUR GOOGLE ACCOUNT PASSWORD ON ANOTHER WEBSITE
ONLINE SAFETY AND ETHICS
9. PROTECT YOUR PASSWORD
ONLINE SAFETY AND ETHICS
10. USE A STRONG PASSWORD
ONLINE SAFETY AND ETHICS
How to create a unique password and protect your accounts? ◦ In addition to making unique passwords, we also recommend strengthening all of your existing passwords and following best practices for any new ones. You can make your passwords stronger by not including personal information in them (this includes pet names, favourite sports teams and birthdays). How to create a unique password and protect your accounts? ◦You should also use a minimum of 12 characters that includes upper- and lower- case letters, numbers and special characters. You can be even more secure by using a passphrase instead, which has a combination of four or more random words and a minimum of 15 characters. How to create a unique password and protect your accounts? ◦ A challenge for creating strong and unique passwords for all your online accounts is keeping track of them. This is why we recommend trying a password manager. A password manager does exactly what it promises to do. It manages your passwords on your behalf, so you don’t have to remember them all. THE CORE RULES OF NETIQUETTE 1. REMEMBER THE HUMAN
ONLINE SAFETY AND ETHICS
2. ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE, THAT YOU FOLLOW IN REAL LIFE ONLINE SAFETY AND ETHICS 3. KNOW WHERE YOU ARE IN CYBERSPACE
ONLINE SAFETY AND ETHICS
4. RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
ONLINE SAFETY AND ETHICS
5. MAKE YOURSELF LOOK GOOD ONLINE
ONLINE SAFETY AND ETHICS
6. SHARE EXPERT KNOWLEDGE
ONLINE SAFETY AND ETHICS
7. HELP KEEP FLAMES OF WAR UNDER CONTROL
ONLINE SAFETY AND ETHICS
8. RESPECT OTHER’S PRIVACY
ONLINE SAFETY AND ETHICS
9. DON’T ABUSE YOUR POWER
ONLINE SAFETY AND ETHICS
9. DON’T ABUSE YOUR POWER
ONLINE SAFETY AND ETHICS
10. BE FORGIVING OF OTHER PEOPLE’S MISTAKES
ONLINE SAFETY AND ETHICS
WEEK 2 LESSON 3: INTERNET SEARCH / RESEARCH Contextualized Online Search and Research Skills “I LOOK AT GOOGLE AND THINK THEY HAVE A STRONG ACADEMIC CULTURE. ELEGANT SOLUTIONS TO COMPLEX PROBLEMS.” - MARK ZUCKERBERG
Contextualized Online Search and Research
Skills ◦Internet research is the practice of using Internet information, especially free information on the World Wide Web, in research. It is: ◦focused and purposeful (so not recreational browsing),
◦uses Internet information or Internet-
based resources (like Internet discussion forum) ◦tends towards the immediate (drawing answers from information you can access without delay)
◦ and tends to access information
without a purchase price. ◦Research is a broad term. Here, it is used to mean "looking something up (on the Web)". It includes any activity where a topic is identified, and ◦an effort is made to actively gather information for the purpose of furthering understanding. It may include some post collection analysis like a concern for quality or synthesis. THE INTERNET CAN BE A RESEARCHER'S DREAM COME TRUE. BY BROWSING THE INTERNET, MUCH AS YOU WOULD BROWSE THE SHELVES OF A LIBRARY, YOU CAN ACCESS INFORMATION ON SEEMINGLY LIMITLESS TOPICS.
Contextualized Online Search and Research
Skills THE RESEARCH PROCESS
Contextualized Online Search and Research
Skills ◦an effort is made to actively gather information for the purpose of furthering understanding. It may include some post collection analysis like a concern for quality or synthesis. ◦Lessons and projects should be designed so that research time on the Web can be maximized in terms of efficiency. ◦This may mean gathering necessary information beforehand, having students work in groups, or focusing on whole-class projects. BARRON AND IVERS (1996) OUTLINED THE FOLLOWING CYCLE FOR ONLINE RESEARCH PROJECTS.
Contextualized Online Search and Research
Skills STEP 1: QUESTIONING --- BEFORE GOING ON THE INTERNET, YOU SHOULD STRUCTURE THEIR QUESTIONS. Contextualized Online Search and Research Skills STEP 2: PLANNING --- DEVELOP A SEARCH STRATEGY WITH A LIST OF SITES TO INVESTIGATE. Contextualized Online Search and Research Skills STEP 3: GATHERING --- USE THE WEB TO COLLECT AND GATHER INFORMATION. Contextualized Online Search and Research Skills STEP 4: SORTING & SIFTING --- ANALYZE AND CATEGORIZE THE DATA THEY GATHERED ON THE WEB. Contextualized Online Search and Research Skills STEP 5: SYNTHESIZING --- INTEGRATE THE INFORMATION INTO THE LESSON, AND DRAW CONCLUSIONS. Contextualized Online Search and Research Skills STEP 6: EVALUATING --- ASSESS THE RESULTS, AND IF NECESSARY, BEGIN THE PROCESS AGAIN. Contextualized Online Search and Research Skills SEARCHING THE WEB: THERE ARE BILLIONS OF PAGES OF INFORMATION ON THE WORLD WIDE WEB, AND FINDING RELEVANT AND RELIABLE INFORMATION CAN BE A CHALLENGE Contextualized Online Search and Research Skills TECHNIQUES FOR USING THE DIFFERENT SEARCH TOOLS VARY. FOR BEST RESULTS, READ THE SEARCH TIPS OR HINTS THAT ARE PROVIDED AT EACH SEARCH SITE. Contextualized Online Search and Research Skills ALSO, NOTE THAT SOME OF THE SEARCH ENGINES DO NOT ALLOW BOOLEAN SEARCHES THAT COMBINE WORDS WITH THE LOGICAL CONNECTORS OF AND, OR, OR NOT. Contextualized Online Search and Research Skills COMMON COMMANDS FOR SEARCH ENGINES INCLUDE:
Contextualized Online Search and Research
Skills QUOTATION MARKS ( " ) USING QUOTATION MARKS WILL HELP TO FIND SPECIFIC PHRASES INVOLVING MORE THAN ONE WORD. FOR EXAMPLE: "MARTIN LUTHER KING" Contextualized Online Search and Research Skills ADDITION SIGN ( + ) ADDING A + SIGN BEFORE A WORD MEANS THAT IT MUST BE INCLUDED IN EACH SITE LISTED. FOR EXAMPLE: + FLORIDA + TAXES Contextualized Online Search and Research Skills SUBTRACTION SIGN ( - ) ADDING A - SIGN BEFORE A WORD MEANS THAT IT WILL NOT APPEAR IN THE SITES LISTED. FOR EXAMPLE: + WASHINGTON -DC Contextualized Online Search and Research Skills ASTERISKS ( * ) ASTERISKS CAN BE USED FOR WILD-CARDS IN SOME SEARCH ENGINES. FOR EXAMPLE: MEXIC* WILL LOOK FOR MEXICO, MEXICAN, MEXICALI, ETC. Contextualized Online Search and Research Skills ANALYZING WEB RESOURCES ANSWER THE FOLLOWING QUESTIONS TO EVALUATE WEB RESOURCES. Contextualized Online Search and Research Skills ACCURACY ARE SOURCES LISTED FOR THE FACTS? CAN INFORMATION BE VERIFIED THROUGH ANOTHER SOURCE? HAS THE SITE BEEN EDITED FOR GRAMMAR, SPELLING, ETC.? AUTHORITY IS THE PUBLISHER REPUTABLE? IS THE SPONSORSHIP CLEAR? IS A PHONE NUMBER OR POSTAL ADDRESS AVAILABLE? AUTHORITY IS THERE A LINK TO THE SPONSORING ORGANIZATION? IS THE AUTHOR QUALIFIED TO WRITE ON THIS TOPIC? OBJECTIVITY DOES THE SPONSOR HAVE COMMERCIAL INTERESTS? IS ADVERTISING INCLUDED ON THE PAGE? ARE THERE OBVIOUS BIASES? CURRENCY IS A PUBLICATION DATE INDICATED? IS THERE A DATE FOR THE LAST UPDATE? IS THE TOPIC ONE THAT DOES NOT CHANGE FREQUENTLY? COVERAGE ARE THE TOPICS COVERED IN DEPTH? DOES THE CONTENT APPEAR TO BE COMPLETE? COPYRIGHT ISSUES EVERYONE HAS A SOMEWHAT FLEXIBLE, BUT NOT UNLIMITED, COPYRIGHT PRIVILEGE UNDER THE "FAIR USE CLAUSE" OF THE U.S. COPYRIGHT ACT. Contextualized Online Search and Research Skills "FAIR USE" IS THE MEANS BY WHICH EDUCATORS OF NON- PROFIT EDUCATIONAL INSTITUTIONS MAY USE COPYRIGHTED WORKS WITHOUT SEEKING PERMISSION OR MAKING PAYMENT TO THE AUTHOR OR PUBLISHER. TEACHERS AND STUDENTS ARE ALSO PROTECTED TO SOME EXTENT BY THE DIGITAL MILLENNIUM COPYRIGHT ACT, WHICH WENT INTO EFFECT IN OCTOBER 1998. UNDER CURRENT GUIDELINES, TEACHERS AND STUDENTS ARE ABLE TO MAKE LIMITED USE OF COPYRIGHTED MATERIALS FOR INSTRUCTIONAL PURPOSES. ACTIVITY 2: SEARCH FOR: BALIUAG, BULACAN USING THE FOLLOWING: BING GOOGLE YAHOO 1. WHICH ONE IS THE EASIEST TO USE? WHY?