Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 52

Online safety, security, ethics,

and etiquette
Objective
apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it
would relate to their specific professional tracks
Most of us use the Internet every day.
Sometimes, we do not pay attention on how
much information we share online. Below is a
questionnaire about how much information
you have shared so far. Put a check (✓) under
Shared or Not Shared.
How Safe Are You?
Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Online Safety and Security
Type of Risks
Information
1. First Name There is a risk in sharing your first name.
Chances are, a hacker may already know
plenty of stuff about you even if you only give
out your first name. Likewise, you cannot just
walk in a room and start introducing yourself
to everyone. You do not know whom you can
come across with.
2. Last Name If sharing your first name is a small
risk, having both your first and last is
riskier. You will be vulnerable to being
searched for using search engines,
which include image search. Matching
a name with a face is a modus to
several cybercrimes like identity theft.
3. Middle Sharing your middle name alone is
Name probably not the riskiest of these
shared information, but sharing
your full name would be.
4. Current Most people who steal identities
and previous study their subject. They can use
school(s)
this information for verification
purposes.
5. Your Your cellphone number should
Cellphone never be posted over the Internet.
Number
The Internet is a public place. It is
the same as posting your number
on a billboard. You would not want
random strangers to text or call
you, or worse, pretend that they
are someone else.
6. The name Risky, yet not as risky as posting
of your their full names, especially your
mother and
father mother’s maiden name. In fact,
you may have already encountered
many websites that require your
mother’s maiden name as an
answer to a secret question
whenever you lose your password.
7. The name Disclosing this is a huge risk.
of your Strangers may pretend or use their
siblings
identity to dupe you.
8. Your Hopefully, you answered “no” to
address this one. Giving the Internet your
number is one thing; giving them
your address is a whole another
level. It would be much easier for
criminals to find you.
9. Your home This shared information is more
phone risky than sharing your personal
number
phone number. Scams usually use
this information to deceive you,
one of which is when a stranger
pretends to know your parents or
pretends to be you.
10. Your Letting people know your birthday
Birthday is probably a must if you want to
get as many gifts as possible. But
having it in your profile makes you
vulnerable to identity theft.
The Internet is defined as the information
superhighway. This means that anyone has access
to this highway, can place information, and can
grab that information. Any information, even
things that you have set privately, can be accessed
one way or another.
Tips to Stay Safe Online
1. Be mindful of what you share online and what site
you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to
learn how the website handles the information you
share.
4. Know the security features of the social networking
site you use. By keeping your profile private, search
engines will not be able to scan your profile.
5. Do not share your password to anyone.
6. Avoid logging in to public networks / WiFi. Browsing
in “incognito (or private) mode”, a feature of the
browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-
face.
8. Never post anything about a future vacation. It is
similar to posting, “Rob my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer. Use only one antivirus software to avoid
conflicts.
12. If you have a WiFi at home, make it a private
network by adding a password.
13. Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads (torrents) as the download is most likely
not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
What is Netiquette?
Is the correct or acceptable way of communicating on
the internet. Example:
• Respect people’s privacy
• Be mindful of your language
• Don’t be sarcastic!
• Choose your emoji’s carefully
• Respect other’s views
Internet Threats
1. Malware – stands for malicious software
a. Virus
A malicious program
designed to replicate itself
and transfer from one
computer to another
either through the
Internet and local
networks or data storage
like flash drives and CDs
b. Worm
A malicious program that
transfers from one computer
to another by any type of
means. Often, it uses a
computer network to spread
itself. For example, the
ILOVEYOU worm (Love Bug
Worm) created by a Filipino.
c. Trojan
A malicious program that is
disguised as a useful
program but once
downloaded or installed,
leaves your PC unprotected
and allows hackers to get
your information.
*Rogue security software
Tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her
security but in reality they are not protected at all.
d. Spyware
A program that runs in the
background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
*Keyloggers
Used to record the keystroke done by the users.
This is done to steal their password or any other
sensitive information. It can record email,
messages, or any information you type using your
keyboard.
e. Adware
A program designed to
send you advertisements,
mostly as popups
2. Spam
Unwanted email mostly from
bots or advertisers. It can be
used to send malware.
3. Phishing
Its goal is to acquire sensitive personal
information like password and credit
card details. This is done by sending
you an email that will direct the user
to visit a website and be asked to
update his/her username, password,
credit card, or personal information
*Pharming
A more complicated way of phishing where it
exploits the Domain Name System (DNS)
Protecting Reputations
Online
Think before you click
Here are things you might want to consider before
posting something over the Internet:
1. Before you post something on the web, ask
these questions to yourself: Would you want
your parents or grandparents to see it? Would
you want your future boss to see it? Once you
post something on the web, you have no control
of who sees your post.
2. Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way, search
engines will not be able to scan that post.
4. Avoid using names. Names are easy for search
engines to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
down or report it as appropriate.
Copyright Infringement
Copyright infringement (at times referred to as piracy) is
the use of works protected by copyright law without
permission for a usage where such permission is
required, thereby infringing certain exclusive rights
granted to the copyright holder, such as the right to
reproduce, distribute, display or perform the protected
work, or to make derivative works.
The copyright holder is typically the work's creator,
or a publisher or other business to whom copyright
has been assigned. Copyright holders routinely
invoke legal and technological measures to prevent
and penalize copyright infringement.
Here are some tips that could help you avoid
copyright infringement
Understand

Be responsible

Be creative

Know the Law


Fair Use Logo
Fair Use
Means an intellectual property may be used
without consent as long as it is used in
commentaries, criticisms, search engines,
parodies, news reports, research, library
archiving, teaching, and education.
Online Research
Search Engine
A search engine is a software system that is
designed to carry out web searches. They search the
World Wide Web in a systematic way for particular
information specified in a textual web search query.
List of Top 12 Best Search Engines in The World
1. Google / Google Scholar 7. Excite
2. Bing 8. DuckDuckGo
3. Yahoo 9. Wolfram Alpha
4. Baidu 10. Yandex
5. AOL 11. Lycos
6. Ask.com 12. Chacha.com
Here are some tips in conducting online research
1. Have a question in mind
2. Narrow it down
3. Advanced search
4. Look for a credible source
5. Give credit
Google Advanced Search
How to formally give credit

Name of the person or organization (the author of the


information). Title of the home page in Italics (the title
is shown in title bar but is sometimes missing or
unrelated). URL. Date last seen.
Lapiz, Adrian Harold L. “Oleander’s Fun Facts about
Bananas.”
http://oleander.penz.com/random/bananalove.htm.
Viewed on September 7, 2015.

“Accounting: What you should know.” Jargon Online


Network.
http://www.jargononline.com/accounting101.html.
Viewed on April 13, 2015.
References
• https://en.wikipedia.org/wiki/Copyright_infringement
• https://www.inspire.scot/blog/2016/11/11/top-12-best-search-engines-
in-the-world238
• https://www.cybersmile.org/advice-help/category/netiquette

You might also like