Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

11

EMPOWERMENT TECHNOLOGIES
RULES OF NETIQUETTE

Quarter 1 – Module 2
11
EMPOWERMENT TECHNOLOGIES

RULES OF NETIQUETTE

Quarter 1 – Module 2
Empowerment Technologies – Grade 11
Self-Learning Module
Quarter 1 – Module 2: Rules of Netiquette
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module

Writers: Alvin T. Fuerzas, Juvelyn B. Congson, Krystian Jade G. Gregorio


Editors: Alvin T. Fuerzas, Juvelyn B. Congson, Krystian Jade G. Gregorio
Reviewers: Alpha D. Palconit
Illustrator : Alvin T. Fuerzas, Juvelyn B. Congson, Krystian Jade G. Gregorio
Layout Artist : Alvin T. Fuerzas, Juvelyn B. Congson, Krystian Jade G. Gregorio
Management Team: Mario S. Gregorio, Ed.D – TNTS Principal IV
Adelfa M. Miguel - SHS – Assistant Principal II
Belen D. Tado - Academic Head SHS Department
Raimar E. Tejero – Master Teacher I

Printed in the Philippines by Department of Education- Tagum


National Trade School Department of Education – Region XI
Department of Education – Region XI

Office Address: Apokon Road, Tagum City

Telefax: (084) 216-2763 or 218- 0711

E-mail Address: tnts_techvoc@yahoo.com


Introductory Message

For the facilitator:

Welcome to the EMPOWERMENT TECHNOLOGIES Self-Learning Module


(SLM) Module on (Rules of Netiquette)!

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic constraints
in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

Notes to the Teacher

This contains helpful tips or strategies that


will help you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use


this module. You also need to keep track of the learners' progress while
allowing them to manage their own learning. Furthermore, you are expected
to encourage and assist the learners as they do the tasks included in the
module.

ii
For the learner:

Welcome to the Empowerment Technologies Self-Learning Module


(SLM) Module on (Rules of Netiquette)!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.

This module has the following parts and corresponding icons:

Let Us Learn! In this portion, objective of the


new lesson will be introduced.
This will give you an idea of the
Let Us Try! skills or competencies you are
expected to learn in the module
through pre-test for the learners.

Let Us Study This is where new lesson is


introduced.
This comprises activities for
independent practice to solidify
Let Us Practice your understanding and skills of
the topic. You may check the
answers to the exercises using the
Answer Key at the end of the
module.
This section provides an activity
Let Us Practice More which will help you transfer your
new knowledge or skill into real life
situations or concerns.
This includes questions or blank
Let Us Remember sentence/paragraph to be filled in
to process what you learned from
the lesson.
This is a task which aims to
Let Us Assess evaluate your level of mastery in
achieving the learning competency.
In this portion, another activity
Let Us Enhance will be given to you to enrich your
knowledge or skill of the lesson
learned.
Closing note of the relevance,
Let Us Reflect meaning and application of the
concepts and skills developed in
the lesson to real life experiences.
iii
At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other
activities included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with
it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you
are not alone.

We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!

iv
Let Us Learn!

At the end of the lesson, the students should be able to:


1. Consider one’s and other’s safety when sharing information using
the internet.
2. Consider one’s and other’s reputation when using the internet.
3. Determine and avoid the dangers of the internet.
4. Be responsible in the use of social networking sites.
5. Browse the Internet efficiently and properly through proper
referencing.

Let Us Try!

Pre-Test
Write Yes if you agree the statement and No if you disagree on the blank
before each number.
_______ 1. My computer has an antivirus so it is okay to open most email
attachments like e-cards and video files.
_______ 2. Your friend told you that his college application was rejected due
to the fact that you posted a video of him doing crazy stuff at a
party. You posted the video several years ago but later took it
down to protect your friend’s reputation. Can your friendbe right
that the college found the video?
_______ 3. You and your best friend play a lot of video games. One time, she
asks you for your password so she can help you level up and get in
game money. She promises to keep your password a secret. Is it
okay to give away your password?
_______ 4. You received an email stating that your mother’s bank account is
going to be forfeited if you do not respond to the email. Is it safe to
reply?
_______ 5. You forgot that essay for English class is due tomorrow. While
doing your research, you found a website offering free essays. Is it
okay to use the essays from this free essay website?
_______ 6. A virus is a malware that multiplies and infects other computers
through flash drives.
_______ 7.Key loggers are software that shows pop-ups ads even if you are
not using your browser.
_______ 8. Search engines scan websites for search results even if you have
set your post to “private.”
_______ 9. There is a danger in posting information about a future vacation.
_______ 10.Letting people know your birthday is probably a must if you want

1
to get as many gifts as possible. But having it in your profile makes
you vulnerable to identity theft.

Let Us Study

Online Safety and Security

Introduction

Most of us use the Internet every day. Sometimes, we do not pay


attention on how much information we share online. Below is a
questionnaire about how much information you have shared so far. Put a
check (/) under Shared or Not Shared.

Type of Information Shared Not Shared


1.First Name
2.Last Name
3.Middle Name
4.Current and Previous
School
5.Your Cellphone
number
6.The name of your
mother and father
7.The name of your
siblings
8.Your address
9. Your home phone
number
10. Your birthday

How many checks did you have for Shared? You probably answered
Shared in the first two items. If that is the case, try using a search engine
like Google then type your first and last name. Did you get links to your
profile page? Try switching to image search. Did your picture appear? If you
have a unique name, chances are it did. Do not feel bad if it bad not appears
though, in fact, it is probably for your best interest not to have pictures of
yourself in a search engine.
How many hours do you spend on the Internet per day? Can you live
without the Internet for a week? Can you live without the Internet for a
week? How many aspects of your life depend on the Internet? How many
times have you complained about your Internet connection speed?
As a teenager, you are all exposed to many things powered by the
Internet. Whether it is socializing, playing games, reading sports news,
shopping, etc., the internet has given you one of the most powerful tools

2
that your parents, during their teenage years, did not have. Because of this,
do you not think that it is also important to wield this powerful tool
properly? Without proper training, a swordsman can easily injure himself
when welding a sword; the same could be said for you whenever you use the
Internet.

The internet, truly, is a powerful tool. It can be used to promote your


business, gain new friends, and stay in touch with the old ones. It is also a
source of entertainment through game, online communities, and everything
in between. But like most things in this world. There is always the “other
side of the icon. “The internet is one of the most dangerous places, especially
if you do not know you are going with it. But there is no need to worry; it is
never that late. Hopefully, by the end of this lesson, you are able to consider
how oyu go about your use of the internet.
Online Safety is one of the biggest concerns every parent has for their
children is to keep them safe, whether online or offline (At home, at school,
at play). Some new developments are making online safety easier and
improving offline safety as well.
Internet safety, or online safety, is the knowledge of maximizing the
user's personal safety and security risks to private information and property
associated with using the internet, and the self-protection from computer
crime in general. As the number of internet users continues to grow
worldwide,[1] internet safety is a growing concern for both children and
adults. Common concerns regarding safety on the internet include:
malicious users (spam, phishing, cyber bullying, cyber stalking etc.),
websites and software (malware, computer viruses, etc.) and various types of
obscene or offensive content. Several crimes can be committed on the
Internet such as stalking, identity theft and more. Most social networking
and chat sites have a page about safety. Numerous groups, governments
and organizations have expressed concerns about the safety of children
using the Internet.

Internet security is a tree branch of computer security specifically


related to the Internet, often involving browser security but also network
security on a more general level as it applies to other applications or
operating systems on a whole. Its objective is to establish rules and
measures to use against attacks over the Internet. The Internet represents
an insecure channel for exchanging information leading to a high risk of
intrusion or fraud, such as phishing. Different methods have been used to
protect the transfer of data, including encryption.

Online ethics refers to patterns of behavior used when on the


Internet, guided both by law and personal philosophy. The great capabilities
of this communication medium allow for the potential of great harm, cruelty,
and even crime. Major concerns in the field of online ethics include the
protection of private information, the limits of a presumed freedom of
expression, and issues of libel. Understanding legal ramifications and
trusting personal philosophy used in other areas of life can help a person
determine his or her online ethics.

3
Internet Etiquette is online communication that makes everyone
comfortable. The internet is a group of computers that are connected,
etiquette is a social code. That is the technical definition of the words.
Combing the words into a term enables it to become a philosophy or part of
one.

Online Etiquette

1. Whenever you work and communicate online, there are some basic rules
you should follow:
 Think before you send.
 If you send an email or post a message in anger, it could come back to
haunt you later. The same goes for pictures and videos you post
online. Even when something is deleted from a page, it may still be
out there waiting to be found when you least expect it.
2. Respect the time and bandwidth of others. Don’t pass along emails that
contain hoaxes, or send messages to the entire student body. The same goes
for sending large videos or attachments in an email message. It wastes
everyone's time when they have to wade through extra information to get to
the important stuff.

3. Don't send messages that could be misinterpreted as threatening or


hurtful. Be careful about the language you use as well as the information
you pass along about others. Sending messages that could be seen as
threatening may result in disciplinary action.

4. Follow the conventions of writing when sending formal emails or posting


comments online. Unless the message you're sending is informal (such as a
text message to a friend), you should use correct spelling, grammar, and
punctuation. You shouldn't WRITE IN ALL CAPS! (It's considered shouting).

5. Respect others' right to privacy. Don’t use technology to pass along


rumors or share personal information about someone without their
permission. The same goes for posting names and photos of others.

Privacy and Security on the Internet: 5 Tips to Stay Safe


As the Internet becomes an increasingly integral part of daily life,
questions about privacy and security on the Internet are on the rise.
Keeping your personal information, private data and finances safe can be
difficult, but by following a few tips, you can avoid the vast majority of
scams, spyware and privacy breaches.

4
Tip1. Be Aware

The best tool to avoid spyware and stay safe on the Internet is your
own brain. Free software with no potential upgrades or strings attached,
websites that are covered in flashy ads, and free Wi-Fi in an unexpected
place are all signs that something may be wrong, and ignoring that intuition
can get you in trouble. By staying aware of what you are doing, and thinking
about your security while you live your online life, you stand a better chance
of avoiding potentially dangerous situations.

Tip 2: Check for website safety

The Internet can be dangerous because so many websites require your


personal information to either log in to your account or to complete a
transaction. Hackers, thieves and spyware programmers realize this and
often try to intercept your information during these transactions, so make
sure you are always dealing with secure websites and companies. First, only
provide your information to reputable businesses, then ensure that the
company's website uses a Web address that starts with "https" and has a
padlock symbol either in the address bar or at the bottom of the browser.
This means that the site encrypts your information, making the data nearly
useless to any thieves or hackers who may intercept the transmission.

Tip 3: Choose strong and varied passwords

For most people, a password is the strongest protection to ward off


hackers and thieves, and yet so many choose passwords that are barely
worth the time it takes to enter them. When creating a password, always use
a mix of letters and numbers, and include a symbol if the website allows it.
While more difficult to remember, this will make your password almost
impossible to guess.
More importantly, you have to use different passwords for different
websites. Think about how often you use the same username and password
for many online accounts. Hackers specifically target low-security sites to
gain access to large lists of usernames and corresponding passwords,
knowing that many people use the same combination of credentials for
things like online banking.

Tip 4: What is spyware? How do I stop it?


Spyware probably poses the biggest threat to privacy and security on
the Internet, yet so few people really know what it is or how it works. Put
simply, spyware is any piece of software that records your actions or
information without your knowledge. Some spyware is fairly benign,
tracking browsing history and keeping the data it receives anonymous, while
other spyware is specifically designed to get your online banking credentials
so thieves can clean out your accounts.
Because it's almost impossible to avoid spyware on your own, having
anti-spyware and antivirus programs running on your computer is a must.

5
Tip 5: It's not all about spyware and scams

With all this talk about spyware, hackers and Internet security, it's
important to remember that most people with privacy issues on the Internet
put themselves in that position. Think about social networking sites and
just how much personal information you have posted there. If someone were
trying to steal your identity and needed your father's middle name or where
you went to elementary school — two commonly used security questions —
you need to think about how a thief could locate those facts. If you're
concerned about Internet privacy, you have to consider staying away from
social networking sites, minimizing the information you put out there, or
maximizing privacy settings on these sites.

Let Us Practice

Self-check 1

I. True or False. Write T if the statement is True and F if False. Write your answer
on the space provided.

______1.Choose strong and varied passwords.


_____2. Spyware is any piece of software that records your actions or
information without your knowledge.
_____3.With all this talk about spyware, hackers and Internet security, it's
not important to remember that most people with privacy issues on
the Internet put themselves in that position.
_____4.The Internet can be dangerous because so many websites require
your personal information to either log in to your account or to
complete a transaction.
_____5.The best tool to avoid spyware and stay safe on the Internet is your
own brain.
_____6.You shouldn't WRITE IN ALL CAPS! (It's considered shouting).
_____7.Respect others' right to privacy.
_____8.Don't pass along emails that contain hoaxes, or send messages to the
entire student body.
_____9. Send messages that could be misinterpreted as threatening or
hurtful.
_____10.Think before you send.

6
Let Us Study

Internet Threats

Introduction

Web-based threats – or online threats – are malware programs that


can target you when you’re using the Internet. These browser-based threats
include a range of malicious software programs that are designed to infect
victims’ computers.
The main tool behind such browser-based infections is the exploit
pack – which gives cybercriminals a route to infecting computers that either:
 Do not have a security product installed
 Contain a commonly used operating system or application that is
vulnerable – because the user hasn’t applied the latest updates, or a
new patch has yet to be issued by the software vendor.

Applications and OSs that are targeted by online threats

Cybercriminals will use almost any vulnerability – within an operating


system (OS) or an application – in order to conduct an exploit-based attack.
However, most cybercriminals will develop web threats that deliberately
target some of the most common OSs and applications, including:

 Java
Because Java is installed on over 3 billion devices – that are running
under various operating systems – exploits can be created to target
specific Java vulnerabilities on several different platforms / OSs.
 Adobe Reader
Although Adobe Reader has been targeted by many attacks, Adobe
has implemented tools to protect the program against exploit activity –
so that it’s getting harder to create effective exploits for the
application. However, Adobe Reader was still a common target over
the past 18 months.
 Windows and Internet Explorer
Active exploits still target vulnerabilities that were detected as far back
as 2010 – including MS10-042 in Windows Help and Support Center,
and MS04-028 which is associated with incorrect handling of JPEG
files.
 Android
Cybercriminals use exploits to gain root privileges. Then, they can
achieve almost complete control over the targeted device.

7
Here are some of the threats you should be aware of when using
internet:

 Botnets
If you've never heard of a botnet, it's likely because they go largely
undetected.

What they are:

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

A collection of software robots, or 'bots', that creates an army of


infected computers (known as ‘zombies') that are remotely controlled by the
originator. Yours may be one of them and you may not even know it.

What they can do:

 Send spam emails with viruses attached.


 Spread all types of malware.
 Can use your computer as part of a denial of service attack against
other systems.

 Distributed denial-of-service (DDoS) attack

What it is:

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

A distributed denial-of-service (DDoS) attack — or DDoS attack — is


when a malicious user gets a network of zombie computers to sabotage a
specific website or server. The attack happens when the malicious user tells
all the zombie computers to contact a specific website or server over and
over again. That increase in the volume of traffic overloads the website or
server causing it to be slow for legitimate users, sometimes to the point that
the website or server shuts down completely.
It could be possible for malicious users to use your computer in one of
these attacks. By taking advantage of security vulnerabilities or weaknesses,
an attacker could take control of your computer. He or she could then force
your computer to send huge amounts of data to a website or send spam to
particular email addresses. The attacks are "distributed" because the
attacker is using multiple computers, including yours, to launch the denial-
of-service attacks.

8
What it can do:

The most common and obvious type of DDoS attack occurs when an
attacker “floods” a network with useless information. When you type a URL
into your browser, you are sending a request to that site's computer server
to view the page. The server can only process a certain number of requests
at once. If an attacker overloads the server with requests, it can't process
yours. The flood of incoming messages to the target system essentially forces
it to shut down, thereby denying access to legitimate users.

What you can do:

There are steps you can take to reduce the likelihood that an attacker
will use your computer to attack other computers:
 Install and maintain anti-virus software.
 Install a firewall, and configure it to restrict traffic coming into and
leaving your computer.
 Follow good security practices when it comes to maintaining your
contact or email lists. Applying email filters may help you manage
unwanted emails, by automatically processing incoming messages
based on certain criteria that you set.
 Be cautious if you notice that your Internet connection is unusually
slow or you can't access certain sites (and that your Internet
connection is not down).
 Avoid opening email attachments, especially if they are from people
you don't know.
If you believe you are a victim of a DDoS attack, contact your Internet
Service Provider, as they will be able to help mitigate.

 Hacking

Hacking is a term used to describe actions taken by someone to


gain unauthorized access to a computer. The availability of
information online on the tools, techniques, and malware makes it easier for
even non-technical people to undertake malicious activities.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

The process by which cyber criminals gain access to your computer.

What it can do:

 Find weaknesses (or pre-existing bugs) in your security settings and


exploit them in order to access your information.
 Install a Trojan horse, providing a back door for hackers to enter and
search for your information.

9
 Malware

Malware is one of the more common ways to infiltrate or


damage your computer.

What it is:

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

Malicious software that infects your computer, such as computer


viruses, worms, Trojan horses, spyware, and adware.

What it can do:

 Intimidate you with scare ware, which is usually a pop-up message


that tells you your computer has a security problem or other false
information.
 Reformat the hard drive of your computer causing you to lose all your
information.
 Alter or delete files.
 Steal sensitive information.
 Send emails on your behalf.
 Take control of your computer and all the software running on it.

 Pharming

Pharming is a common type of online fraud.

What it is:

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

A means to point you to a malicious and illegitimate website by


redirecting the legitimate URL. Even if the URL is entered correctly, it can
still be redirected to a fake website.

What it can do:

 Convince you that the site is real and legitimate by spoofing or looking
almost identical to the actual site down to the smallest details. You
may enter your personal information and unknowingly give it to
someone with malicious intent.

10
 Phishing

Phishing is used most often by cyber criminals because


it's easy to execute and can produce the results they're looking
for with very little effort.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal personal and
financial information from you. This is also known as “spoofing”.

What it does:

 Trick you into giving them information by asking you to update,


validate or confirm your account. It is often presented in a manner
than seems official and intimidating, to encourage you to take action.
 Provides cyber criminals with your username and passwords so that
they can access your accounts (your online bank account, shopping
accounts, etc.) and steal your credit card numbers.

 Ransomware

What it is:

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

Ransomware is a type of malware that restricts access to your


computer or your files and displays a message that demands payment in
order for the restriction to be removed. The two most common means of
infection appear to be phishing emails that contain malicious attachments
and website pop-up advertisements.

What it can do:

There are two common types of ransomware:


 Lockscreenransomware: displays an image that prevents you from
accessing your computer
 Encryption ransomware: encrypts files on your system's hard drive
and sometimes on shared network drives, USB drives, external hard
drives, and even some cloud storage drives, preventing you from
opening them

11
Ransom ware will display a notification stating that your computer or
data have been locked and demanding a payment be made for you to regain
access. Sometimes the notification states that authorities have detected
illegal activity on your computer, and that the payment is a fine to avoid
prosecution.

What you can do:

Do not pay the ransom. These threats are meant to scare and
intimidate you, and they do not come from a law enforcement agency. Even
if you submit payment, there is no guarantee that you will regain access to
your system.
If your computer has been infected (i.e. you are unable to access your
computer or your files have been encrypted), contact a reputable computer
technician or specialist to find out whether your computer can be repaired
and your data retrieved.
In order to lessen the impact of a ransomware infection, be sure to
regularly back-up your data with a removable external storage drive. It's
possible that your files might be irretrievable; having an up-to-date backup
could be invaluable.

 Spam

Spam is one of the more common methods of both sending information


out and collecting it from unsuspecting people. Canada has a new anti-
spam legislation that you can learn more about at www.fightspam.gc.ca .

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

 The mass distribution of unsolicited messages, advertising or


pornography to addresses which can be easily found on the Internet
through things like social networking sites, company websites and
personal blogs.
 Canada's anti-spam legislation applies to all commercial electronic
messages. A commercial electronic message is any electronic message
that encourages participation in a commercial activity, regardless of
whether there is an expectation of profit.

12
What it can do:

 Annoy you with unwanted junk mail.


 Create a burden for communications service providers and businesses
to filter electronic messages.
 Phish for your information by tricking you into following links or
entering details with too-good-to-be-true offers and promotions.
 Provide a vehicle for malware, scams, fraud and threats to your
privacy.
Find out more about email spam.

 Spoofing

This technique is often used in conjunction with phishing in an


attempt to steal your information.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

A website or email address that is created to look like it comes from a


legitimate source. An email address may even include your own name, or
the name of someone you know, making it difficult to discern whether or not
the sender is real

What it does:

 Spends spam using your email address, or a variation of your email


address, to your contact list.
 Recreates websites that closely resemble the authentic site. This could
be a financial institution or other site that requires login or other
personal information.

 Spyware

Spyware & Adware


Spyware and adware are often used by third parties to infiltrate your
computer.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

13
What it is:

Software that collects personal information about you without you


knowing. They often come in the form of a ‘free' download and are installed
automatically with or without your consent. These are difficult to remove
and can infect your computer with viruses.

What it can do:

 Collect information about you without you knowing about it and give
it to third parties.
 Send your usernames, passwords, surfing habits, list of applications
you've downloaded, settings, and even the version of your operating
system to third parties.
 Change the way your computer runs without your knowledge.
 Take you to unwanted sites or inundate you with uncontrollable pop-
up ads.

 Trojan Horses

A Trojan horse may not be a term you're familiar with, but


there's a good chance you or someone you know has been
affected by one.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

A malicious program that is disguised as, or embedded within,


legitimate software. It is an executable file that will install itself and run
automatically once it's downloaded.

What it can do:

 Delete your files.


 Use your computer to hack other computers.
 Watch you through your web cam.
 Log your keystrokes (such as a credit card number you entered in an
online purchase).
 Record usernames, passwords and other personal information.

14
 Viruses

Most people have heard of computer viruses, but not many


know exactly what they are or what they do.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What they are:

Malicious computer programs that are often sent as an email


attachment or a download with the intent of infecting your computer, as well
as the computers of everyone in your contact list. Just visiting a site can
start an automatic download of a virus.

What they can do:

 Send spam.
 Provide criminals with access to your computer and contact lists.
 Scan and find personal information like passwords on your computer.
 Hijack your web browser.
 Disable your security settings.
 Display unwanted ads.
When a program is running, the virus attached to it could infiltrate your
hard drive and also spread to USB keys and external hard drives. Any
attachment you create using this program and send to someone else could
also infect them with the virus.

How will you know if your computer is infected?

Here are a few things to check for:


 It takes longer than usual for your computer to start up, it restarts on
its own or doesn't start up at all.
 It takes a long time to launch a program.
 Files and data have disappeared.
 Your system and programs crash constantly.
 The homepage you set on your web browser is different (note that this
could be caused by Adware that has been installed on your computer).
 Web pages are slow to load.
 Your computer screen looks distorted.
 Programs are running without your control.
If you suspect a problem, make sure your security software is up to date
and run it to check for infection. If nothing is found, or if you are unsure of
what to do, seek technical help.

15
 Wi-Fi Eavesdropping

WiFi eavesdropping is another method used by cyber criminals to


capture personal information.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it is:

Virtual “listening in” on information that's shared over an unsecure


(not encrypted) WiFi network.

What it can do:

 Potentially access your computer with the right equipment.


 Steal your personal information including logins and passwords.
Find out more about Wi-Fi networks.

 Worms

Worms are a common threat to computers and the Internet as


a whole.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What they are:

A worm, unlike a virus, goes to work on its own without attaching


itself to files or programs. It lives in your computer memory, doesn't damage
or alter the hard drive and propagates by sending itself to other computers
in a network – whether within a company or the Internet itself.

What they can do:

 Spread to everyone in your contact list.


 Cause a tremendous amount of damage by shutting down parts of the
Internet, wreaking havoc on an internal network and costing
companies enormous amounts of lost revenue.

16
 WPA2 Handshake Vulnerabilities

The Key reinstallation attack (or Krack) vulnerability allows a


malicious actor to read encrypted network traffic on a Wi-Fi
Protected Access II (WPA2) router and send traffic back to the network.

https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

What it can do:

Krack can affect both personal (home users, and small businesses)
and enterprise networks. Any devices that are connected to the network,
such as laptops, smartphones, smart devices, even an installed USB key,
can be read by the attacker. A malicious actor could use this vulnerability
to steal sensitive information, and also insert malware or ransomware that
would make a website unsafe to visit.
Krack does not divulge Wi-Fi passwords to attackers, nor does it
permit a malicious device to be connected to the network. Krack is unable to
compromise Virtual Private Networks (VPN) or HTTPS protocols used by
online shopping and banking sites.

What you can do:

To help protect yourself, keep all software, operating systems and


routers up-to-date with the latest patches (updates).

Let Us Practice

Self-check 2

I.Multiple Choice: Encircle the letter that corresponds to the correct


answer.
1. A crime committed or assisted through the use of internet.
a. Cybercrime c. malwares
b. Identity theft d. copyright
infringement
2. Stands for malicious software
a. Malware c. malisoft
b. Maliware d.malicioft ware
3. A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
a. Virus c. Trojan
b. Worm d. Spyware
4. A program designed to send you advertisements, mostly pop-ups.
17
a. Spyware c. malware
b. Adware d. popware
5. A malicious program designed to replicate itself and transfer from
one computer to another
a. Virus c. Trojan
b. Worm d. spyware
6. A malicious program that transfer from one computer to another
by any type of means.
a. Virus c. Trojan
b. Worm d. spyware
7. A program that runs in the background without you knowing it. It
has the ability to monitor what you are currently doing and typing
through key logging.
a. Virus c. Trojan
b. Worm d. spyware
8. Its goal is to acquire sensitive information like passwords and
credit card details. It usually gives a fake website that asks you to
update your username, password, credit card, or any personal
information.
a. Spam c. phishing
b. Infringement d.keylogger

9. A part of the law, wherein you have the rights to your work, and
anyone who uses it without consent is punishable by law.
a. Copyright c. cybercrime
b. Fair use d. accessibility

10. This means that anyone has access to this highway, can place
information, and can grab that information.
a. Internet c. netiquette
b. Fair use d. spyware

18
Let Us Practice More

I. Match Column A with Column B. Write the letter of the correct


answer on the space before each number.

A B

______ 1. Virus a. designed to send you advertisements

______ 2.rogue b. sends an official-looking email and is


designed tosteal sensitive personal
information.
_______3.key logger c. a provision that allows you to use
copyrighted work without consent with
certain limitations.
_______4.adware d. a browser feature that is synonymous to
“private” browsing.
______ 5.spam e. replicates and can transfer from one
computer to another.
______ 6.phishing f. exploits the DNS system
______7 .fair use g. states that anyone who uses your work
without your consent is punishable by law.
______ 8 . spyware h. runs in the background and monitors
_______ 9.private i. unwanted email mostly from bots
_______ 10.malware j. disguised as a useful program but is not
_______ 11.incognito k. the information superhighway

_______12.internet l. tricks the user into posing that it is a


securitySoftware.
_______ 13.trojan m. a malicious software
_______ 14.copyright n.an option to hide a post so that search
engines could not scan it.
_______ 15.pharming o. used to record the keystrokes done by

19
Let Us Remember

Most teenagers spend their time online. It is a vital to consider what


information you share because the Internet is a public place. There are several
ways to stay safe online and it is essential that we know and apply them.

Several Internet threats include malwares, spams, and phishing.


Malwares could be in the form of a virus, worm, Trojan, spyware or adware.
We are responsible of what we post online. It is also our responsibility to
protect other’s reputation. We should be mindful of what we post when others
are involved.

Copyright laws protect the authors or producers of literary works


,photographs, paintings, drawings, films, music, choreography , and
sculptures from having their work used without their permission. It is
important for everyone to understand the laws to avoid being sanctioned.

When searching online, remember to narrow down the topic. Use


advanced search features. Look for a credible source and cite your references.

Let Us Assess

Instruction: Describe the image as shown below.

1.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette

________________________________________________________________________
________________________________________________________________________
______________________________________________________

20
2.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
________________________________________________________________________
________________________________________________________________________
______________________________________________________

3.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette

4.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
_____________________________________________________________________
_____________________________________________________________________
___________________________________________________

21
5.
https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette

Let Us Enhance

Create campaign materials promoting “Think before you click.” It


could be in a form of poster. Materials to prepare: ¼ size illustration board,
crayons, pencil and eraser.

Rubric
Criteria Excellent Good Fair Incomplete
5 pts 4 pts 3 pts 0 pts
Use of class Use time Use time Use time Did not
time well on well and poorly and work at all
getting usually got or was not
poster done. focused on distracted able to
getting by others. finish in
poster done. class.
Visual Poster is Poster is The poster Poster is not
Impact exceptionally attractive, is poorly attractive at
attractive in though it designed all.
terms of might be a and lacks
color and little messy. neatness.
neatness.
Labels All words Almost all Words are No labels or
are clearly items in are very hard to unclear

22
written. clear. read. ones.
Spelling There are no There are There are It is full of
spelling very few many spelling
mistakes in spelling spelling errors.
the poster. errors. errors.

Let Us Reflect

There are 3 ways of online safety you’ll need to:

 Exposed to inappropriate material consists of information or images


that upset your child, material that's directed at adults, inaccurate
information or information that might lead your child into unlawful or
dangerous behavior.
 Cyber bullying in the use of technology to harass, threaten,
embarrass, or target another person.
 Online predators focusing issues related to child exploitation.

Why do you need to be safe?

You need to be safe online because if you put too much information
then people can figure out your login or password, that is why you never use
your school gmail for anything.
The more you know the safer you can be whether you’re using the
internet for a job , school or entertainment , its important to keep you, your
family and your personal information safe. Here, you’ll find useful lesson,
tips and tutorials all geared towards helping to navigate the internet safety.

23
Self-Assessment Guide
Subjects Empowerment Technologies
Introduction to Information and Communication Technologies
Instruction: Read each question and check the appropriate box to indicate
your answer.
Subjects Empowerment
Technologies
Introduction to Information and Communication Technologies
Instruction: Read each question and check the appropriate box to indicate
your answer.
Can I? Yes No
1. Learner’s ability to select an appropriate source and
assess the value of information.
2. Developing ideas and making things happen for
example using ICT to measure , record , to respond to
3. Exchanging and sharing information using ICT for
such purpose
4. Organizing and structuring using systematic
approaches to find things out
5. Developing ideas students ability to measure and
record
6. Exchanging information
7. Defining tasks ability to characterize that are being
asked to complete
8. Using technology to make things happen
9. Use ICT Information and communication technology as
a tool
10. Using forms of technology for the purpose of
presentation
11. Define information need
12. Access resources and information
13. Manage information
14. Integrate information through interpretation and
synthesis
15. Evaluate resources and information
16. Create new information or adapt existing
information
17. Communicate information to particular
audiences/learners
I agree to undertake assessment in the knowledge that
information gathered will used only for professional
development purposes and can only be accessed by
concerned assessment personnel and to my teacher
Student’s Signature : Date :

24
Answer key to Activities

10. no A 10. 10. M


9.yes B 9. 9. N
8. No C 8. 8. L
7. yes D 7. 7. C
6.yes B 6. 6. B
5.yes A 5. 15. F 5. I
4. No B 4. 14. G 4. A
3. No C 3. 13. J 3. O
2.No A. 2. 12. K 2. H
1. yes A. 1. 11. D 1. E
Pre-test Self-check 2 Let us practice more

Reference

Empowerment Technologies Innovative Training Works, Inc.Kto12


First Edition.

https://www.slideshare.net/TeodoroLlanesII/2-online-safety-security-ethics-and-etiquette
https://prezi.com/lujxgo4qdw6w/online-safety-security-ethics-etiquette/
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx
https://www.entrepreneur.com/article/287581

25
DISCLAIMER

This Self-learning Module (SLM) was developed by the Empowerment Technology


(E-tech) Teacher of Tagum National Trade School with the primary objective of preparing for
and addressing the new normal. Contents of this module were based on DepEd’s Most
Essential Learning Competencies (MELC). This is a supplementary material to be used by
all learners of Tagum National Trade School beginning SY 2020-2021.

We highly encourage feedback, comments, and recommendations.

For inquiries or feedback, please write or call:


Department of Education – Region XI

Tagum City Division


Tagum National Trade School
Apokon, Tagum City, Davao del Norte
Landline:

Philippines

(84) 218 -0711

(84) 216 2763

Email Address: tnts_techvoc@yahoo.com

26
27

You might also like