Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 54

Albert A .

Bersamin
Objectives
At the end of this lesson, the students should be able to:

1. 1. Consider one’s and others’ safety when sharing information

2. u2s. iCnog ntshiedeinr toenrnee’ st; and others’ reputation

when using the internet;


3. 3. Determine and avoid the dangers of the Internet;
4. 4. be responsible in the use of social networking sites;
and
5. 5. Browse the Internet efficiently and properly through proper
referencing.
Formative Assessment

1. Name 5 Important details or


Information of your self that you
share online.

2S .mHaor wt p hofotneens? ouy used


your
Picture Analysis
Picture Analysis
Picture Analysis
Picture Analysis
Picture Analysis
Are you S A F E
and
SECURED
How S A F E
and
S E C U R E D are
Online
Safety,
Securi
ty,
Ethics, and
Netiquette
Online Safety & Security

Internet is defi ned a s the information


superhighway. This means that
anyone has a c c e s s to this highway,
can place info, and can grab that
information.
Online Safety & Security

1. It is powerful tool . It can be used to

p&ros tma yotien ytoouucrhbwusitihnelosvse,

goaniens .new friends,


Online Safety & Security

 “other side of the coin”

1. - The internet is one of the


most dangerous places, especially if
you do

not know what you are doing with it.


I N F O R M AT
I O N AT
RISK
Your Name(First Name,
Middle Name & Last Name)

Current &
Previous School
Cellphone

Informatio Number

n At Risk Email Address


Birthday

Age
Home

Address
Some Tips to Stay Safe Online
Be mindful on what you share online
Do not just accept terms and conditi ons, read it.

Do not share your password with anyone.


 Know the security features of the social

nDeotwnortktianlgk
s ittrea nygoeursusweh. ether
online or face to face.
Some Tips to Stay Safe Online
 D o not reply or click suspicious emails.
 Install and update antivirus software on your
computer or devices.
Some Tips to Stay Safe Online
 Never post anything about your future vacati on.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.

 IAf vyooiud hv iasviteinWg uiFni tarut shtoemdwe e,ibt


ps irtievsa.te by adding a password
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.

 IAf vyooiud hviasviteinWg uiFni tarut


shtoemdwee,ibt psirtievsa.te by adding a
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.

 IAf vyooiud hviasviteinWg uiFni tarut


shtoemdwee,ibt psirtievsa.te by adding a
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.

 IAf vyooiud hviasviteinWg uiFni tarut


shtoemdwee,ibt psirtievsa.te by adding a
Antiviru
s
Bitdefender
E S E T Nod32
F-Secure
Kaspersky
Avast
Interne t
Threa ts
Internet Threats
Malware
 stands for Malicious
Software .
➢ This is that is specifically
software
designed to gain access or damage
computer without the knowledge a of the
owner. There are various types of malware
including spyware, keyloggers, true viruses,
worms, or any type of malicious code that
infiltrates a computer.
Spyware

Virus Adware

Trojan

Worm
a malicious
VIR program designed
US to replicate itself
and transfer from
one computer to
another.
VIR
US
a malicious
program that
WOR transfers from
one computer to
M another by any
type of means.
a malicious program that
is disguised as a useful
TARN program but once
OJ downloaded or installed,
leaves your PC
unprotected and allows
hacker to get you
a program designed
to send you
advertisements,
mostly as pop- ADWA
ups. RE
CERTIFIE
D
SPRYE
a program that WA
runs in the
background
without you
knowing it.

AnSuPnwAaMnted email mostly


from bot or advertisement. It
can be used to send
malware.
the
PtoH I SoHbtaI
sensitive information such
attempt N
i n
G
as usernames,passwords,
and credit card details,
often
for malicious reasons, by
disguising as a trustworthy
communication.

CERTIFIE
D
NETIQUETTE
Netiquette is short for "Internet
etiquette." J ust like etiquette is a code
of polite behavior in society, netiquette
is
a code of good behavior on the
Internet.
“ THINK
before
CLICK
You G R O U P A CT IV IT Y


Create a campaign both in social media
and school
before you
promoting
click”
“Think
(Advantages & Disadvantages of
In social media, it could be in a form of
Internet).
video and in school, it could be in a form
small
of poster posted along the hallway or
bulletin boards. This campaign an
is
awareness
batches of theprogram for the
school. 10 pts younger
CRITERIA 7 pts 5 pts 2 pts
Texts and visuals 1- 2 texts and 3 or more texts
Texts and visuals are
are very clear and visuals are vague and visuals are
CONTENT strongly related clear and not related vague
to the topic. to the topic. and not related
tahnedtorepliaac.te to the topic.
DESIGN d to
4 or more None of the
PRINCIPLES 3-4 design 1 -2 design
design design
principles and principle and
principles and principles and
AND elements are element is
ELEMENTS eleemveidnet eleemveidnet
evident. evident.
nsexceptionally
It is ta. re It is attractive in ns ta. re
More attention to the It is unattractive
attractive in terms of color
OVERALL selection of color due to poor
the terms of color scheme, design and
color
EFFECT scheme, layout.
design, and layout sclahyeomuet ,isdnee schemela,ydoeusti.g
n and
siegdneadn. d Members are not
3 members or Only 2 members are Only 1 person is working on the
WORK
more are doing the doing all the tasks doing all the project. No evidence
ETHICS tasks for tasks of cooperation in
group.

You might also like