Professional Documents
Culture Documents
Rules of Netiquette
Rules of Netiquette
Rules of
Netiquett
By: ML Baloro
SHS Teacher
Reference: EMPOWERMENT Technologies
e
Innovative Training Work, Inc. First Edition
Objective
:
1. Consider one’s and others’ safety
when sharing information using the
internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determined how to avoid
the dangers of the internet
4. Be responsible in the use of
social networking sites
Protecting
reputation
s online
Interne
Copyright
t
Threats
Contextualize
Online
Security, safety
Rules of d online
Netiquett search and
and ethics
e research skills
Pre-
test
Write YES if you agree with the statement and NO
if you disagree.
1. My computer has an antivirus so it is okay to
open most e-mail attachments like e-cards and
video files.
2. Your friend told you that this college application
was rejected due to the fact that you posted a
video of him doing crazy stuff at a party. You
posted the video several years ago but later took
it down to protect your friend’s reputation. Can
your friend be right that the college found the
video?
3. You and your best friend play a lot of
video games. One time, she asks you for
your password so she can help you level
up and get in-game money. She promises
to keep your password a secret. Is it okay
to give away your password?
4. You received an email stating that your
mother’s bank account is going to be
forfeited if you do not respond to the
email. Is it safe to reply?
5. You forgot that your essay for English class
is due tomorrow. While doing your
research, you found a website offering free
essays. Is it okay to use the essay from this
free essay website?
6. A virus is a malware that multiplies and
infects other computers through flash
drives.
7. Keyloggers are software that show pop-
up ads even if you are not using your
browser.
8. Search engines scan websites for
search results even if you have set
your post to “private”.
9.There is a danger in posting
information about a future vacation.
10.Letting people know your birthday is
probably a must if you want to get as many
gifts as possible. But having it in your
profile makes you vulnerable to identify
the theft.
10 best rules of
netiquette
The Golden Rule No FLAMING
Don’t type in ALL CAPS Don’t SPAM (it is any
( Treat others as you (Flame is a personal ( people may unsolicited e-mail from
would like to be insult communicated misinterpret) unknown sources)
treated) through the internet
5 Types of Malware:
e. Adware – a program
designed to send you
advertisements, mostly as
pop-ups.
Internet
Threats:
2. Spam – an unwanted email
mostly from bots or
advertisers. It can be used to
send malware.
Internet Threats:
3. Phishing – an
unwanted
acquisition of
sensitive personal
information like
passwords and
credit card details.
Internet
Threats:
4. Botnet – group
of compromised
computer
connected to a
network
("zombie")
Internet
Threats:
5. Denial of Service Attack -
disrupts computer access to internet services
online
Think
before
you click!
HTTPS - "Hyper-Text Transfer
Protocol Secure"
TYPE OF INFORMATION RISKS
1. First Name There is a risk in sharing your first name, Chances are ,
a hacker may already know plenty of stuff about you
even if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both
your first and last is more risky. Matching a name with
a face is a modus to several cybercrimes' like identity
theft
3. Middle Name Sharing your middle name is probably not the most
risky of these shared information, but sharing your full
name would be.
4. Current and Most people who steal identities study their subject.
previous school/s They can use this information for verification purposes.
5. Your cell You cell phone number should never be posted over
phone number the internet.
Internet
Threats
Rogue
security
software
Viru
s
- A computer virus is a piece of malicious
computer code that attaches itself to a
software program, email or computer
file without your permission.
- It can transfers through the internet and
local networks or data storage like flash
drives and CD’s
Rogue security software- tricks
the user into posting that is a
security software. It asks the user
to pay to improve hi/her security
but in reality that are not
protected at all.
Wor
Trojan m program
A malicious
A malicious program Spread to that transfers from one
that is disguised as other computer to another
a useful program compute
by any type of means.
but once rs
It uses computer
downloaded or network to spread
installed, leaves itself.
your PC
Ex. ILOVEYOU worm
unprotected and
allows hackers to Love Bug Worm
get your created
information. by Filipino
Spyware
Phishing – is a software or a
program used by an attacker
to obtain personal
information.
- It targets the
passwords to hack and
take control of a user
account..
How to avoid these
threats?
A very effective way of avoiding these threats
is verifying the authenticity and credibility of
the WEB source
Think before You
Click !
1. Ask yourself? Would you want your parents
or grandparents to see it?