Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

“YOU ARE BRAVER

THAN YOU BELIEVE,


STRONGER THAN YOU
SEEM, AND SMARTER
THAN YOU THINK”

-Christopher Robin
WEEK 2 LESSON 2:
ONLINE SAFETY,
SECURITY ETHICS AND
ETIQUETTE
KEEPING
YOURSELF SAFE
ONLINE

ONLINE SAFETY AND ETHICS


ACCORDING TO
GOOGLE’S
SUPPORT PAGE

ONLINE SAFETY AND ETHICS


1. CHECK FOR
VIRUSES AND
MALWARE

ONLINE SAFETY AND ETHICS


What Can Malware Do?

◦ In short, malware can wreak havoc on a computer


and its network. Hackers use it to steal passwords,
delete files and render computers inoperable. A
malware infection can cause many problems that
affect daily operation and the long-term security of
your company.
What Can Malware Do?

◦ A virus can damage programs, delete files and


reformat or erase your hard drive, which results in
reduced performance or even crashing your system
entirely. Hackers can also use viruses to access your
personal information to steal or destroy your data.
Why is it important to scan for viruses?

◦Virus scans search through your system to


locate and remove any malicious threats on
your device. You'll find most antivirus software
guards against malware. This can include
threats like viruses and worms, as well as,
spyware, Trojans, ransomware, and adware.
ILOVEYOU
Example of a virus.

◦ What is the history of ILOVEYOU virus?


◦ ILOVEYOU, sometimes referred to as Love Bug or
Love Letter for you, is a computer worm that infected
over ten million Windows personal computers on
and after 5 May 2000. It started spreading as an
email message with the subject line "ILOVEYOU" and
the attachment "LOVE-LETTER-FOR-YOU.
What is the history of ILOVEYOU
virus?
◦ Onel De Guzman, of AMA Computer College
◦ ILOVEYOU, sometimes referred to as Love Bug or
Love Letter for you, is a computer worm that infected
over ten million Windows personal computers on
and after 5 May 2000. It started spreading as an
email message with the subject line "ILOVEYOU" and
the attachment "LOVE-LETTER-FOR-YOU.
2. DO AN ACCOUNT
SECURITY
CHECKUP

ONLINE SAFETY AND ETHICS


Google Security Checkup

◦Google's Security Checkup is a great way


to ensure that your account is secure and
isn't being accessed by anyone but you. It
can also help highlight security flaws on
your account that may be easily missed.
Google Security Checkup

•Manage apps with access to your account


•Review signed-in devices
•Review recent security events
• i.e. New Sign-ins, App Password creation & deletion,
etc.
•Enable Two-Step Verification
3. GOOGLE HAS A
SECURITY
CHECKUP
FEATURE, IN YOUR
ACCOUNT’S PAGE
ONLINE SAFETY AND ETHICS
3. THAT ALLOWS AN
OVERALL CHECKUP
AND FOR A POSSIBLE
UPDATE OF YOUR
DETAILS

ONLINE SAFETY AND ETHICS


4. UPDATE YOUR
ACCOUNT
RECOVERY
OPTIONS

ONLINE SAFETY AND ETHICS


Google Security Checkup

•Manage apps with access to your account


•Review signed-in devices
•Review recent security events
• i.e. New Sign-ins, App Password creation & deletion,
etc.
•Enable Two-Step Verification
5. ENROLL IN 2-
STEP
VERIFICATION

ONLINE SAFETY AND ETHICS


What happens when you turn on
2-step verification?
2-step verification adds an extra layer of
security to your Google Account. In
addition to your username and password,
you'll enter a code that Google will send you
via text or voice message upon signing in.
6. GOOGLE
ALLOWS YOU TO
ADD EXTRA LAYER
OF SECURITY

ONLINE SAFETY AND ETHICS


6. BY REQUIRING
YOU TO GRAB A
CODE SENT TO YOUR
PHONE AFTER
LOGGING IN, WITH
YOUR PASSWORD
ONLINE SAFETY AND ETHICS
7. PERFORM A
REGULAR
OPERATING SYSTEM
AND BROWSER
UPDATES.

ONLINE SAFETY AND ETHICS


Operating system updates
Operating system updates provide fixes to
possible bugs and security holes, along with
cleaning up outdated software that may slow
down your device. Ensure that your computer,
mobile phone, or tablet is using the latest version
of its OS to protect your devices and data from
cybersecurity issues
8. NEVER USE YOUR
GOOGLE ACCOUNT
PASSWORD ON
ANOTHER WEBSITE

ONLINE SAFETY AND ETHICS


9. PROTECT YOUR
PASSWORD

ONLINE SAFETY AND ETHICS


10. USE A STRONG
PASSWORD

ONLINE SAFETY AND ETHICS


How to create a unique password
and protect your accounts?
◦ In addition to making unique passwords, we also
recommend strengthening all of your existing
passwords and following best practices for any new
ones. You can make your passwords stronger by not
including personal information in them (this
includes pet names, favourite sports teams and
birthdays).
How to create a unique password
and protect your accounts?
◦You should also use a minimum of 12
characters that includes upper- and lower-
case letters, numbers and special characters.
You can be even more secure by using a
passphrase instead, which has a combination
of four or more random words and a
minimum of 15 characters.
How to create a unique password
and protect your accounts?
◦ A challenge for creating strong and unique
passwords for all your online accounts is keeping
track of them. This is why we recommend trying
a password manager. A password manager does
exactly what it promises to do. It manages your
passwords on your behalf, so you don’t have to
remember them all.
THE CORE RULES
OF NETIQUETTE
1. REMEMBER THE
HUMAN

ONLINE SAFETY AND ETHICS


2. ADHERE TO THE
SAME STANDARDS
OF BEHAVIOR
ONLINE, THAT YOU
FOLLOW IN REAL
LIFE
ONLINE SAFETY AND ETHICS
3. KNOW WHERE
YOU ARE IN
CYBERSPACE

ONLINE SAFETY AND ETHICS


4. RESPECT OTHER
PEOPLE’S TIME
AND BANDWIDTH

ONLINE SAFETY AND ETHICS


5. MAKE
YOURSELF LOOK
GOOD ONLINE

ONLINE SAFETY AND ETHICS


6. SHARE EXPERT
KNOWLEDGE

ONLINE SAFETY AND ETHICS


7. HELP KEEP
FLAMES OF WAR
UNDER CONTROL

ONLINE SAFETY AND ETHICS


8. RESPECT
OTHER’S PRIVACY

ONLINE SAFETY AND ETHICS


9. DON’T ABUSE
YOUR POWER

ONLINE SAFETY AND ETHICS


9. DON’T ABUSE
YOUR POWER

ONLINE SAFETY AND ETHICS


10. BE FORGIVING
OF OTHER
PEOPLE’S
MISTAKES

ONLINE SAFETY AND ETHICS


WEEK 2 LESSON 3:
INTERNET SEARCH /
RESEARCH
Contextualized Online Search and Research Skills
“I LOOK AT GOOGLE AND
THINK THEY HAVE A
STRONG ACADEMIC
CULTURE. ELEGANT
SOLUTIONS TO COMPLEX
PROBLEMS.”
- MARK ZUCKERBERG

Contextualized Online Search and Research


Skills
◦Internet research is the practice of
using Internet information,
especially free information on the
World Wide Web, in research. It is:
◦focused and purposeful (so not
recreational browsing),

◦uses Internet information or Internet-


based resources (like Internet
discussion forum)
◦tends towards the immediate
(drawing answers from information
you can access without delay)

◦ and tends to access information


without a purchase price.
◦Research is a broad term.
Here, it is used to mean
"looking something up (on the
Web)". It includes any activity
where a topic is identified, and
◦an effort is made to actively
gather information for the
purpose of furthering
understanding. It may include
some post collection analysis like
a concern for quality or synthesis.
THE INTERNET CAN BE A
RESEARCHER'S DREAM
COME TRUE. BY BROWSING
THE INTERNET, MUCH AS
YOU WOULD BROWSE THE
SHELVES OF A LIBRARY, YOU
CAN ACCESS INFORMATION
ON SEEMINGLY LIMITLESS
TOPICS.

Contextualized Online Search and Research


Skills
THE RESEARCH PROCESS

Contextualized Online Search and Research


Skills
◦an effort is made to actively
gather information for the
purpose of furthering
understanding. It may include
some post collection analysis like
a concern for quality or synthesis.
◦Lessons and projects
should be designed so that
research time on the Web
can be maximized in terms
of efficiency.
◦This may mean gathering
necessary information
beforehand, having students
work in groups, or focusing on
whole-class projects.
BARRON AND IVERS (1996)
OUTLINED THE FOLLOWING
CYCLE FOR ONLINE
RESEARCH PROJECTS.

Contextualized Online Search and Research


Skills
STEP 1:
QUESTIONING ---
BEFORE GOING ON
THE INTERNET,
YOU SHOULD
STRUCTURE THEIR
QUESTIONS.
Contextualized Online Search and Research
Skills
STEP 2:
PLANNING ---
DEVELOP A SEARCH
STRATEGY WITH A
LIST OF SITES TO
INVESTIGATE.
Contextualized Online Search and Research
Skills
STEP 3:
GATHERING --- USE
THE WEB TO
COLLECT AND
GATHER
INFORMATION.
Contextualized Online Search and Research
Skills
STEP 4:
SORTING & SIFTING
--- ANALYZE AND
CATEGORIZE THE
DATA THEY
GATHERED ON THE
WEB.
Contextualized Online Search and Research
Skills
STEP 5:
SYNTHESIZING ---
INTEGRATE THE
INFORMATION INTO
THE LESSON, AND
DRAW
CONCLUSIONS.
Contextualized Online Search and Research
Skills
STEP 6:
EVALUATING ---
ASSESS THE
RESULTS, AND IF
NECESSARY, BEGIN
THE PROCESS
AGAIN.
Contextualized Online Search and Research
Skills
SEARCHING THE WEB:
THERE ARE BILLIONS OF
PAGES OF INFORMATION
ON THE WORLD WIDE
WEB, AND FINDING
RELEVANT AND
RELIABLE INFORMATION
CAN BE A CHALLENGE
Contextualized Online Search and Research
Skills
TECHNIQUES FOR
USING THE
DIFFERENT SEARCH
TOOLS VARY. FOR
BEST RESULTS, READ
THE SEARCH TIPS OR
HINTS THAT ARE
PROVIDED AT EACH
SEARCH SITE.
Contextualized Online Search and Research
Skills
ALSO, NOTE THAT
SOME OF THE SEARCH
ENGINES DO NOT
ALLOW BOOLEAN
SEARCHES THAT
COMBINE WORDS
WITH THE LOGICAL
CONNECTORS OF
AND, OR, OR NOT.
Contextualized Online Search and Research
Skills
COMMON COMMANDS
FOR SEARCH
ENGINES INCLUDE:

Contextualized Online Search and Research


Skills
QUOTATION MARKS ( " )
USING QUOTATION
MARKS WILL HELP TO
FIND SPECIFIC PHRASES
INVOLVING MORE THAN
ONE WORD.
FOR EXAMPLE:
"MARTIN LUTHER KING"
Contextualized Online Search and Research
Skills
ADDITION SIGN ( + )
ADDING A + SIGN
BEFORE A WORD
MEANS THAT IT MUST
BE INCLUDED IN
EACH SITE LISTED.
FOR EXAMPLE:
+ FLORIDA + TAXES
Contextualized Online Search and Research
Skills
SUBTRACTION SIGN
( - ) ADDING A - SIGN
BEFORE A WORD
MEANS THAT IT WILL
NOT APPEAR IN THE
SITES LISTED.
FOR EXAMPLE:
+ WASHINGTON -DC
Contextualized Online Search and Research
Skills
ASTERISKS ( * )
ASTERISKS CAN BE USED
FOR WILD-CARDS IN
SOME SEARCH ENGINES.
FOR EXAMPLE: MEXIC*
WILL LOOK FOR MEXICO,
MEXICAN, MEXICALI,
ETC.
Contextualized Online Search and Research
Skills
ANALYZING WEB RESOURCES
ANSWER THE FOLLOWING
QUESTIONS TO EVALUATE WEB
RESOURCES.
Contextualized Online Search and Research Skills
ACCURACY
ARE SOURCES LISTED
FOR THE FACTS?
CAN INFORMATION BE
VERIFIED THROUGH
ANOTHER SOURCE?
HAS THE SITE BEEN
EDITED FOR GRAMMAR,
SPELLING, ETC.?
AUTHORITY
IS THE PUBLISHER
REPUTABLE?
IS THE SPONSORSHIP
CLEAR?
IS A PHONE NUMBER OR
POSTAL ADDRESS
AVAILABLE?
AUTHORITY
IS THERE A LINK TO THE
SPONSORING
ORGANIZATION?
IS THE AUTHOR
QUALIFIED TO WRITE ON
THIS TOPIC?
OBJECTIVITY
DOES THE SPONSOR
HAVE COMMERCIAL
INTERESTS?
IS ADVERTISING
INCLUDED ON THE
PAGE?
ARE THERE OBVIOUS
BIASES?
CURRENCY
IS A PUBLICATION
DATE INDICATED?
IS THERE A DATE FOR
THE LAST UPDATE?
IS THE TOPIC ONE
THAT DOES NOT
CHANGE
FREQUENTLY?
COVERAGE
ARE THE TOPICS
COVERED IN
DEPTH?
DOES THE
CONTENT APPEAR
TO BE COMPLETE?
COPYRIGHT ISSUES
EVERYONE HAS A SOMEWHAT
FLEXIBLE, BUT NOT UNLIMITED,
COPYRIGHT PRIVILEGE UNDER THE
"FAIR USE CLAUSE" OF THE U.S.
COPYRIGHT ACT.
Contextualized Online Search and Research Skills
"FAIR USE" IS THE
MEANS BY WHICH
EDUCATORS OF NON-
PROFIT
EDUCATIONAL
INSTITUTIONS MAY
USE COPYRIGHTED
WORKS WITHOUT
SEEKING PERMISSION
OR MAKING PAYMENT
TO THE AUTHOR OR
PUBLISHER.
TEACHERS AND
STUDENTS ARE ALSO
PROTECTED TO SOME
EXTENT BY THE
DIGITAL MILLENNIUM
COPYRIGHT ACT,
WHICH WENT INTO
EFFECT IN OCTOBER
1998.
UNDER CURRENT
GUIDELINES,
TEACHERS AND
STUDENTS ARE ABLE
TO MAKE LIMITED
USE OF
COPYRIGHTED
MATERIALS FOR
INSTRUCTIONAL
PURPOSES.
ACTIVITY 2:
SEARCH FOR:
BALIUAG, BULACAN
USING THE
FOLLOWING:
BING
GOOGLE
YAHOO
1. WHICH ONE IS THE
EASIEST TO USE?
WHY?

2. WHICH ONE IS THE


HARDEST TO USE?
WHY?

You might also like