Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

LESSON 2 Online Safety, Security and Netiquette

The internet is the guiding technology of the Information Technology Age


just as the electrical engine was of the Industrial Age. In these times, more and
more people are already engaged in the use of technology. These people who are
raised in a digital, media-saturated world are called digital natives. No doubt, the
Internet has been very useful to us but with the rise of instant messaging, chat
rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual
predators. Thus, internet safety is always our primary concern
3 2

1. Identify what constitutes appropriate and inappropriate online behavior.

2. Apply internet online safety, security ethics and etiquette standards and
practice in the use of ICTs.

3. Discern possible deceptive information and wrongly evaluated data.

Direction: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or on your notebook.

1 2
1. What is Netiquette? 8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
A. The proper use of manners and etiquette on the Internet. 9. What is the golden rule of netiquette?
B. Using a net to catch fish. A. Remember the human. C. Use correct grammar.
C. Being mean to other people on Facebook. B. Put a smiley in every message. D. Respect people’s time.
D. Using proper manners at the dinner table. 10.You get an email telling you that you won a hundred thousand without joining
in a competition. You should ____________.
2. What is considered shouting over the Internet? A. Claim the prize. C. Return the email with response.
A. Screaming at your computer. B. Ignore the email. D. Send rude message as revenge
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
3. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post
it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
4. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
5. Knowledge and understanding of netiquette is useful because ___________
A. it will help you create a positive impression on those you meet in
cyberspace. B. it explains some of the technical limitations of online
communications.
C. it explains the conventions already being used by millions of
cybercasts.
D. All of the above.
6. What type of online threat happens when an attacker uses electronic devices
to do unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information? Read the headlines found below and try to reflect on the questions
A. Cyberstalking B. Spoofing C. Scamming D. Pharming that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-
theft.

3 4
Reflect on the following questions: Current and Previous
School/s
✓ What is common among the headlines above?
Your cellphone number
✓ Are your social media accounts secured enough that you
Complete name of mother
may not be a victim of these things? and father
✓ What type of information do you share in your social Your parents’ cellphone
media accounts? numbers
Name of Siblings

There's almost no limit to what you can do online. The Internet Your Address
makes it possible to access information quickly, communicate around Your Birthday
the world, and much more. Unfortunately, the Internet is also home to
certain risks, such as malware, spam, and phishing. If you want to stay
safe online, you'll need to understand these risks and learn how to 1. How many of these information have you SHARED?
avoid them.
_________________________________________________

WHAT’S NEW 2. How many of these information have you NOT SHARED?
_________________________________________________
ACTIVITY 2.1: Shared or Not Shared? That is the
Question
3. Based from your answers above, do you think you are safe
DIRECTIONS: Read and reflect each item carefully. Copy the table when using the Internet? Why?
below on your notebook and check the space whether you have
_________________________________________________
shared or not shared these pieces of information in all your social
media accounts. _________________________________________________
TYPE OF INFORMATION SHARED NOT SHARED _________________________________________________
First Name _______________________________________

Middle Name

Last Name

5 6
when using the internet to ensure that the users as well as their
WHAT IS IT computers and personal information are safe from crimes associated
with using the internet. Below is personal information that must be kept
confidential.
Lesson 2.1: Online Safety, Security and Netiquette There are numerous delinquencies that can be committed on
the internet such as stalking, identity theft, privacy violations, and
Online safety refers to the practices and precautions that should be observed
harassment.
To avoid these online crimes, follow the following online safety
measures:

Never give any personal information out about yourself over the
internet.

Do not give any banking or sensitive information unless you are


sure that it is a reputable business having a secure service. To
make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”.
Never access your accounts by following an email link, instead
type your URL by yourself.

Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate

Never open messages or attachments from someone you do


not know.
7
8
Regularly review your privacy settings in your online accounts
to make sure you are not sharing important personal
information.
When using a public computer terminal, be sure to delete your
browsing data before leaving. Flame war is a series of flame posts
or messages in a thread that are
Keep your software updated to avoid security holes.
considered derogatory in nature or are
Do not download or install software or anything on your completely off-topic. Often these flames
computer or cell phone that is unknown to you. are posted for the sole purpose of
offending or upsetting other users. The
Netiquette is a combination of the words network and etiquette. It flame becomes a flame war when other
is a set of rules for behaving properly online. Below are the 10 rules users respond to the thread with their
of netiquette: own flame message.

Image from:

https://twitter.com/Parkster00/status/1246347088625045504

WHAT CAN I DO

ACTIVITY 2.2: Can You Keep It Private?


DIRECTIONS: Choose the most appropriate thing to do in the
following situation. Write the letter of the correct answer in your
notebook.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels
or places.
D. Tell no one. Vacations are23for getting away.
9 10
2. Do you have the same passwords for all your accounts? WHAT IS IT
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my Lesson 2.2: Kinds of Online Threats
accounts. There is no doubt that you need to be vigilant online. As the
World Wide Web evolved over the years, many internet predators
3. Choose which image below describes how you feel about have been playing on vulnerabilities to attack computers and retrieve
sharing your password with your boyfriend/ girlfriend? sensitive data from individuals. Half the time, we aren’t even aware it
Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.
is happening until it is too late.

Online threat is deemed any malicious act that attempts to


gain access to a computer network without authorization or permission
from the owners. These are usually done by computer hackers who
uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or
HTTPS protocols, but may also employ other protocols and
components, such as links in email or Instant Messaging apps, or any
malware attachments on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help
absorb infected PCs into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss of confidential
4. Your parents bought you your first cellphone. How will you information/data, theft of network resources, damaged brand/personal
share your cellphone number? reputation, and erosion of consumer confidence in e-commerce and
A. Do not share your cellphone number to anyone. online banking.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person. The following are the top kinds of online threats that you should
D. Post your cellphone number in your group chat. be aware of:

5. Your social media friends list should only be composed of  Phishing happens when an email is sent from an internet
______________. criminal disguised as an email from a legitimate, trustworthy
A. Your favorite brands. C. Anyone who sends you source. The message is meant to lure you into revealing
a friend request sensitive or confidential information.
B. Family and friends D. Foreigners

11 12
Internet Scam generally refers to someone using internet services
or software to defraud or take advantage of victims, typically for
financial gain. Cybercriminals may contact potential

Image source: https://searchsecurity.techtarget.com/definition/phishing

 Pharming happens when a hacker (or “pharmer”) directs an


internet user to a fake website instead of a legitimate one.  victims through personal or work email accounts, social
These “spoofed” sites can capture a victim’s confidential networking sites, dating apps, or other methods in attempts to
information, including usernames, passwords, and credit card obtain financial or other valuable personal information. Online
data, or install malware on their computer. Pharmers usually scams may come in various forms such as lottery scam, charity
focus on websites in the financial sector, including banks, fraud scams, job offer scams, and online dating scams to name
online payment platforms, or other e-commerce destinations. a few.
 Internet robots are also known as spiders, crawlers, and web
bots. It is a software application that is programmed to do
certain tasks. Bots are automated, which means they run
according to their instructions without a human user. Some bots
are useful, such as search engine bots that index content for
search or customer service bots that help users. Other bots are
"bad" and are programmed to break into user accounts, scan
the web for contact information for sending spam, or perform
other malicious activities. If it's connected to the Internet, a bot
will have an associated IP address.

 Malware or malicious software, is any program or file that is


harmful to a computer user. Here are the most common
offenders in the rogues’ gallery of malware:
Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

13 14
Adware (advertising supported software) is unwanted Ransomware is a form of malware that locks you out of
software designed to throw advertisements up on your your device and/or encrypts your files, then forces you
screen. Example, pop-up ads and banner ads. to pay a ransom to get them back.
Spyware is malware that secretly observes the Spams are unsolicited emails, instant messages coming from
computer user’s activities
27 without permission and
recipients that are not granted verifiable permission for the
reports it to the software’s author. Example is a
keylogger.  message to be sent. Spam messages can be damaging if you
Virus and Worms are malwares that attach to another open or respond to it.
program and, when executed—unintentionally by the  Cyberstalking refers to the use of the internet or other
user—replicates itself by modifying other computer
programs and infecting them with its own bits of code. electronic device to harass or stalk individuals or organizations.
Trojan, or Trojan horse, is one of the most dangerous
malware types. It usually represents itself as something
useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to
the affected computer. From there, Trojans can be used
to steal financial information or install threats like viruses
and ransomware.

 Cyberbullying refers to the act of tormenting, harassing, or


embarrassing another person using the internet.

15 16
 Spoofing happens when someone or something pretends to
be something else to gain our confidence, get access to our
systems, steal data, steal money, or spread malware.

WHAT CAN I DO

ACTIVITY 2.3: Show Me How You Hashtag


Direction: Look at the following images and create a hashtag based
on the type of online threat represented by each image. Write your
answers in your activity notebook.

17 18
A. Sending someone an email that contains a malicious
link that is disguised to look like an email from someone
reliable.
B. Creating a fake website that looks nearly identical to a
real website in order to trick users into entering their
login information.
C. Sending someone a text message looks like a
Directions: Read each item carefully and choose the letter of the notification that the person has won a contest.
correct answer. Write your answers on a separate sheet of paper or D. Sending someone an email that records their keystroke
in your notebook. activities while using their computers.
6. Which of the following must NOT be done if you received an
1. What type of malicious program is designed to replicate itself
embarrassing picture from your friend?
and transfer from one computer to another either through the
internet or local networks or data storage like flash drives and A. Tell your parents or teachers
CDs? B. Send the picture on to other friends
A. Adware 31 C. Worms and Virus C. Talk to your friend about its negative outcomes.
B. Spyware D. Ransomeware D. Discourage your friend from sending pictures like that.
2. What harmful online programs are designed to send you
advertisements, mostly pop-up ads? 7. What is a flame in cyberspace?32
A. Adware C. Worms and Virus A. A person who follows the rules of Netiquette.
B. Spyware D. Ransomeware B. An expert programmer.
3. What harmful online program is used to record keystrokes done C. An online chain letter.
by users to steal passwords? D. A post or email message that expresses a strong
A. Adware C. Worms and Virus opinion or criticism.
B. Spyware D. Ransomeware
8. What is considered shouting over the Internet?
4. What is ransomware based on? A. Screaming at your computer.
A. Fear of hackers C. Fear of spyware B. Writing in all CAPS.
B. Fear of the Internet D. Fear of losing C. Putting a lot of exclamation marks at the end of a
important files sentence.
D. Not answering a friend request on Facebook.
5. Which of the following is an example of a “phishing” attack? 9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.

19 20
B. Strike first - post mean things about other people on
your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend
online.

10. How are you judged in cyberspace?


A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and
how it looks - by your spelling, grammar, and
netiquette.
C. You are judged by your intent - if you didn't mean to
hurt someone's feelings, then it's okay.
D. You

You are finally done with Lesson 2!

21
22

You might also like