This document discusses standards for online safety, security, ethics, and etiquette. It provides tips for staying safe online such as using strong passwords, keeping personal information private, and updating software. Common internet threats are also described like phishing, viruses, and data breaches. The document also covers internet ethics such as being honest, respecting others' property and rights, and avoiding harming people. Basic etiquette tips are given for maintaining good online and offline relationships.
This document discusses standards for online safety, security, ethics, and etiquette. It provides tips for staying safe online such as using strong passwords, keeping personal information private, and updating software. Common internet threats are also described like phishing, viruses, and data breaches. The document also covers internet ethics such as being honest, respecting others' property and rights, and avoiding harming people. Basic etiquette tips are given for maintaining good online and offline relationships.
This document discusses standards for online safety, security, ethics, and etiquette. It provides tips for staying safe online such as using strong passwords, keeping personal information private, and updating software. Common internet threats are also described like phishing, viruses, and data breaches. The document also covers internet ethics such as being honest, respecting others' property and rights, and avoiding harming people. Basic etiquette tips are given for maintaining good online and offline relationships.
STANDARDS ONLINE SAFETY • ONLINE SAFETY IS BEING AWARE OF THE NATURE OF THE POSSIBLE THREATHS THAT COULD ENCOUNTER WHILE ENGAGING IN ACTIVITY THROUGH THE INTERNET. • IN SIMPLE TERMS, ONLINE SAFETY REFERS TO THE ACT OF STAYING SAFE ONLINE. IT ALSO COMMONLY KNOWN AS INTERNET SAFETY, E- SAFETY AND CYBER SAFETY. WHY IT IS IMPORTANT TO GET SAFETY ONLINE AND HAVE A SECURITY
• BEING SAFE ONLINE MEANS INDIVIDUALS ARE
PROTECTING THEMSELVES AND OTHERS FROM ONLINE HARMS AND RISK WHICH MAY JEOPARDIES THEIR PERSONAL INFORMATION LEAD TO UNSAFE COMMUNICATIONS OR EVEN EFFECT THEIR MENTAL HEALTH AND BEING CYBERSECURITY 101: BASIC INTERNET SAFETY TIPS FOR EVERYONE • PROTECT YOUR PERSONAL INFORMATION WITH STRONG PASSWORD • KEEP PERSONAL INFORMATION PRIVATE • MAKE SURE YOUR DEVICES ARE SECURE • PAY ATTENTION TO SOFTWARE UPDATES • BE CAREFUL WHAT YOU DOWNLOADS • SET UP TWO- FACTOR AUTHENTICATION • BACK UP YOUR PERSONAL DATA INTERNET THREATS • INTERNET-BASED THREATHS EXPOSE PEOPLE AND COMPUTER SYSTEM TO HARM ONLINE. A BROAD SCOPE OF DANGER FITS INTO THIS CATEGORY, INCLUDING WELL-KNOWN THREATHS LIKE PLISHING AND COMPUTER VIRUSES. HOWEVER, OTHER THREATHS, LIKE OFFLINE DATA THEFT, CAN ALSO BE CONSIDERED PART OF THIS GROUP. WHAT ARE MODERN INTERNET TREATHS? A CYBER OR CYBER SECURITY THREATHS IS A MALICIOUS ACT THAT SEEKS TO DAMAGE, STEAL DATA, OR DISRUPT DIGITAL LIFE IN GENEREAL. CYBER-ATTACKS INCLUDE THREATS LIKE COMPUTER VIRUSES,DATA BREACH,PASSWORD CRACKING ATTACKS AND SOCIAL MEDIA ATTACKS . ONLINE ETHICS • INTERNET ETHICS MEANS ACCEPTED BEHAVIOR FOR USING INTERNET. WE SHOULD BE HONEST, RESPECT THE RIGTHS AND PROPERTY OF OTHERS ON THE INTERNET. EXAMPLES ARE; • YOU SHALL NOT USE THE INTERNET TO HARM OTHER PEOPLE. • YOU SHALL NOT SNOOP AROUND IN OTHER PEOPLE’S INTERNET FILES. • YOU SHALL NOT USE INTERNET TO STEAL. • YOU SHALL NOT USE THE INTERNET TO BEAR FALSE WITNESS. • YOU SHALL NOT COPY OR USE OTHER PEOPLE’S INTERNET RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. THESE ARE THE BASIC RULES OF ETIQUTTE TO AVOID DAMAGING YOUR OFFLINE AND ONLINE RELATIONSHIPS THEN PROTECTING YOUR REPUTATION
• MAKE REAL PEOPLE A PRIORITY..
• USE RESPECTFUL LANGUAGE .. • DON’T EXCLUDE OTHERS .. • CHOOSE FRIENDS WISELY.. • RESPECT OTHER PEOPLE’S PRIVACY.. • FAST CHECK BEFORE REORTING .. • DON’T SPAM.. GROUP 6 • JHON MARK LLANTADA • JUIGI AMOR • XANDER MIRASOL • KYRAN CORPUZ • KATHLEEN PEMEDO
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering