Professional Documents
Culture Documents
Online Security and Nettiquette
Online Security and Nettiquette
I. OBJECTIVES
A. Content The learners demonstrate and understanding of ICT in the context of global
Standards communication for specific professional track.
B. Performance The learners shall be able to independently compose an insightful reflection paper on the
Standards nature of ICT in the context of their lives, society, and professional tracks (Arts, Tech-
Voc, Sports, Academic)
C. Learning TOPIC: Online Safety, Security and Netiquette
Competencies/ Specific Learning Objectives: At the end of an hour, 80% of the learners will be able
Objectives to:
1. define digital natives;
2. identify what constitutes appropriate and inappropriate online behavior;
3. apply internet online safety, security ethics and etiquette standards and
practice in the use of ICTs; and
4. discern possible deceptive information and wrongly evaluated data;
II. CONTENT GAD Core Message: Equalized opportunity among male and female students in doing
classroom activities individually or in a group.
A. References
1. Teacher’s Guide
Pages
2. Learner’s
Materials Pages
3. Textbook pages
4. Additional
Materials from
Learning
Resource (LR)
portal
B. Other Learning https://www.studocu.com/ph/document/eastern-visayas-state-university/secodary-
Resources education/module-1-lesson-2-online-safety-security-and-netiquette/23643299
IV. PROCEDURES
TEACHER’S ACTIVITY
Say: Good morning, Grade 11-GAS! How’s everybody? Very good. So I guess everyone is ready on our discussion
today.
(Pre-Developmental) Before we start, let me ask you the following questions on your understanding about our
A. Reviewing subject.
previous lesson
Ask: What is Information and Communication Technology or ICT?
Answer: Very good! It deals with the use of different communication technologies such
as mobile phones, Internet and etc. to locate, save, send, and edit information.
(Developmental) Say: Before we start our discussion, let us a short video clip.
C. Presenting the
new lesson https://www.youtube.com/watch?v=HxySrSbSY7o
/Presenting (Being safe on the internet)
examples/insta
nces of the new Ask: What can you say about the video? What are the few things to consider to stay safe
lesson online?
Answer: Very Good! The internet can be an amazing place to explore, but it's also good
to practice online safety.
D. Discussing new Say: Let us read the headlines found below and try to reflect on the questions that
concepts and follow.
practicing new
skills #1
Say: There’s almost no limit to what you can do online. The Internet makes it possible to
access information quickly, communicate around the world, and much more.
Unfortunately, the Internet is also home to certain risks, such as malware, spam,
and phishing. If you want to stay safe online, you’ll need to understand these risks and
learn how to avoid them.
Online safety refers to the practices and precautions that should be observed when
using the internet to ensure that the users as well as their computers and personal
information are safe from crimes associated with using the internet. Below are personal
information that must be kept confidential. There are numerous delinquencies that can be
committed on the internet such as stalking, identity theft, privacy violations, and
harassment.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service. To make sure that you are in
a secured network, the website address should begin with “https://’ as opposed
to “http://”. Never access your accounts by following an email link, instead type
your URL by yourself.
Say: There is no doubt that you need to be vigilant online. As the World Wide
Web evolved over the years, many internet predators have been playing on vulnerabilities
to attack computers and retrieve sensitive data from individuals. Half the time, we
aren’t even aware it is happening until it is too late.
Kinds of Online
Online threat is deemed any malicious act that attempts to gain access to a
computer network without authorization or permission from the owners. These are
usually done by computer hackers who uses the World Wide Web to facilitate
cybercrime. Web threats use multiple types of malware and fraud, all of which
utilize HTTP or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments on servers
that access the Web. They benefit cybercriminals by stealing information for subsequent
sale and help absorb infected PCs into botnets. Web threats pose a broad range
of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation,
and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Internet robots are also known as spiders, crawlers, and web bots. It
is a software application that is programmed to do certain tasks. Bots are
automated, which means they run according to their instructions without a
human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots
are "bad" and are programmed to break into user accounts, scan the web
for contact information for sending spam, or perform other malicious
activities. If it's connected to the Internet, a bot will have an associated IP
address.
Spams are unsolicited emails, instant messages coming from recipients that are
not granted verifiable permission for the message to be sent. Spam
messages can be damaging if you open or respond to it.
H. Making Say: To wrap-up everything that we discussed in this lesson, complete the statement:
generalizations I have learned that _______________________________________
and I have realized that ______________________________________
abstractions I will apply ______________________________________________
about the lesson
(Make sure that male and female members of the class are given enough opportunity.)
(INTEGRATION OF GAD CORE MESSAGE)
I. Evaluating Reflect on this and write your answers in 1 whole sheet of paper.
learning
J. Additional
activities for
application or
remediation
V. REMARKS
IV. REFLECTION
A. No. of learners
who earned 80%
in the evaluation
B. No. of learners
who require
additional
activities for
remediation who
scored 80% below
C. Did the remedial
lessons work? No.
of learners who
have caught up
with the lesson
D. No. of learners
who continue to
require
remediation
E. Which of my
teaching strategies
worked well? Why
did these works?
F. What difficulties
did I encounter
which my principal
or supervisor can
help me solve?
G. What innovation
or localized
materials did I
use/discover
which I wish to
share with other
teachers?
Prepared by:
Checked by:
Noted by: