Download as pdf or txt
Download as pdf or txt
You are on page 1of 40

Rules of

Netiquette
Objectives
At the end of this lesson, the students should be able
to:

1. Determine the dangers and effects of the different


Internet Threats;

2. Become more responsible digital natives, who are


able to practice caution in using any digital device and
accessing information online (A); and
4. Browse the Internet efficiently and properly
through proper referencing; and

3. Practice different safety measures in accessing


information online; and
Online Safety
and Security
Are we still safe online?
ONLINE SAFETY AND SECURITY
The Internet, truly, is a powerful tool. It can
be used to promote your business, gain
new friends, and stay in touch with the old
ones. It is also a source of entertainment.
But like most things in this world, there is
always “another side of the coin.” The
Internet is one of the most dangerous places,
especially if you do not know what you are
doing.
Disclosing Information Online
TYPE OF
INFORMATION RISKS

There is still in sharing your first name. Chances are, hacker already
knows plenty of stuff about you even if you only give yout fiirst
1. First Name name. You cannot jut walk in a room and start introducing yourself
to everyone. Youdo not know whom you can come across with.

If sharing your first name is small risk, having both your first and
last is a more risky. You will be vulnerable to being searched for
2. Last Name using search engines, which invlude image search. Matching a
name with a face can lead to several cybercrimes like identity theft.
Disclosing Information Online
Sharing just your middle name is probably not the most risky of
3. Middle
these shared information, but sharing your entire name would be.
Name

4. Current Most people who steal identities study their subject. They can use
this information for verification purposes.
and Previous
School(s)

5. Your Your cellphone number should never be posted over the internet.
The internet is a public place. It is the same as posting your number
Cellphone on a billboard.
Number
Disclosing Information Online
Risky, yet not as risky as posting their full names, especially your
6. Who your
mother’s maiden name. in fact, if you have already encountered
Mother and many websites that required your mother’s maiden name as an
Father are answer to a secret question whenever you lose your password.

7. Who your This is a huge risk, especially of you have younger siblings.
Strangers may pretend or use their identity to dupe you.
Sbiling are
Giving the Internet your number is one thing, giving them your
8. Your address is whole other level. It would be much easier for criminals
Address to find you.
Disclosing Information Online
This shared information is more risky that sharing your personal
9. Your phone number. Scams usually use this information to deceive you,
Home Phone one of which is when a stranger pretends to know your parents or
Number pretends to be you.

10. Your Letting people know your birthday is probably a must if you want
to get as many gifts as possible. But having it in your profile makes
Birthday
you vulnerable to identity theft.
INTERNET THREATS

Malware Spam Phishing


Stands for malicious Unwanted email Its goal is to acquire
software. mostly from bots or sensitive personal
Types: Virus, Worm, advertisers. It can be information like
Trojan, Spyware, used to send passwords and
Adware malware. credit card details.
MALWARE
a. Virus – a malicious program designed to replicate itself
and transfer from one computer to another either through
Internet and local networks or data storage like flash
drives and CDs.
b. Worm – a malicious program that transfers from one
computer to another by any type of means.
c. Trojan – a malicious program that disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get your information.
d. Spyware – a program the runs in the background
without you knowing it. It has the ability to monitor
what you are currently doing and typing through
keylogging.
• Keyloggers – used to record the keystroke done
by users. This is done to steal their password o
any other sensitive information.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.
PHISHING
• Pharming – a more complicated way
of phishing where it exploits the DNS
(Domain Name Service) System.
“Think Before
You Click”
1. Before you post something on the web, ask these
questions to yourself: Would you want your parents
or grandparents to see it? Would you want your
future boss to see it? Once you post something on
the web, you have no control of who sees your
posts.

2. Your friends depend on you to protect their


reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search
engines will not be able to scan that post.

4. Avoid using names. Names are easy for


search engines to scan.

5. If you feel that a post can affect you or other’s


reputation, ask the one who posted it to pull it
down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
If you create something—an idea, an
invention, a form of literary work, or a
research, you have the right of how it
should be used by others. This is called
intellectual property.
Contextualize
Online Search and
Research Skills
Yourself
Challenge
Have you Googled
yourself lately?
1. Are you happy with the results?
2. Would you want to be searchable on
Google?
3. Are you a smarter user of search
engines?
4. Do you always rely on the first search
result online?
“GOOGLING”
TIPS ON EFFECTIVE
GOOGLE SEARCH
Tips on Effective Google Search
A. Find the Hidden Calculator
If number crunching just isn't your thing -- and you
need a fast answer -- Google's hidden calculator is a
lifesaver. Head straight to the search bar and type in
the problem or equation you're looking to solve.
You'll know you've gotten to the right place when a
gray, calculator-like tool pops up as the search result.
Tips on Effective Google Search
A. Find the Hidden Calculator
Let’s try! Google the following:
• 65536+1024
• 500 - 25.50
• cos 78 degrees
• sqrt 4096
Tips on Effective Google Search
A. Find the Hidden Calculator
• Bonus tip: How many teaspoons equal a
tablespoon?

3 teaspoons = 1 tablespoon
Tips on Effective Google Search
B. Definition and More

• Browsing the Merriam-Webster


dictionary for hours might be a
lost art, but broadening kids‘
vocabulary doesn't have to be.
Tips on Effective Google Search
B. Definition and More

• Simply add the word "define" before a


search term (for example, “define
onomatopoeia”) to bring up the proper
spelling, definition, origin, and even fun
tools like voice and translation options.
Tips on Effective Google Search
C. Age-Appropriate Results
• If you are looking for credible information -- or your
first taste of scholarly research –you can check out
Google's academic offshoot, Google Scholar .
Tips on Effective Google Search
C. Age-Appropriate Results
• Bonus tip: Explore with confidence by
viewing content critically. Just because you
see it online doesn't mean it's true.

https://www.google.com/safetycente
r/families/explore/content-credibility/
Tips on Effective Google Search
D. Time-Zone Challenged
• If you have far-flung family and don’t
want to wake them up in the middle of
the night, you can find the local time
anywhere in the world by typing
"time" and a city's name into the
search bar.
D. Time-Zone Challenged
Tips on Effective Google Search
E. The Perfect Search
• Let’s say the homework assignment
requires you to use only one source of
information.
• Enter your query, followed by the url
for the website (i.e., weaving
site:ncca.gov.ph/ ) and hit enter. You'll
see only results from that website.
Tips on Effective Google Search
F. Photo Magic
• Learning how to attribute photos is a critical
research skill. With Google Reverse Image
Search you can upload any photo to Google
Images and hit "search" to find the name of
it, and a whole lot more.
https://support.google.com/websearch/answer/1325808?hl=en
Tips on Effective Google Search
F. Photo Magic

Go to images.google.com and click Search by Image.


Tips on Effective Google Search
G. Just for Fun
• If all you really need is a little distraction, go
to Google and type in "tilt," browse the
Google Doodle archives, or just tell Google
to do a barrel roll . You won't be
disappointed.”

You might also like