Emtech - Lesson 2 Online Safety and Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

DEMONSTRATION LECTURE IN

EMPOWERMENT TECHNOLOGY
DEMONSTRATOR:
GRETCHEN D. NUNEZ
SST 1
HEALTH AND SAFETY PROTOCOLS

https://www.sec.gov.ph/notice-2021/guidelines-on-the-health-and-safety
CLASSROOM
R espect each other

U nlock your doubts and questions

L isten attentively

E ngage to class activities

S
peak up as needed
Review of the previous lesson

What was our topic yesterday?


LEARNING COMPETENCY

 Apply online safety, security, ethics, etiquette


standards and practice in the use of ICTs
Code: CS_ICT11/12-ICTPT-Ia-b-2
LEARNING OBJECTIVES

 Apply online safety, security, and ethics in the use of ICTs

 Formulate online safety, security, and ethics in the use of ICTs


LEARNING OBJECTIVES

 Share the importance of online safety, security and ethics in


the use of ICTs

Practice the value of social responsibility in terms of online


safety, security and ethics in the use of ICTs
Online Safety and
Security

https://www.bing.com/images/security/search?view
Let us determine how much you already know about identifying online safety, ethics and etiquette. Take this test.
Directions: Mark [√] if you agree with the statement and [X] if you disagree on the space provided before each
number.

___1. Letting people know your birthday is probably a must but having it in your profile it makes you vulnerable to
identity theft.
___2. My laptop has an antivirus so it is okay to open most email attachments like videos and e-cards.
___3. There is a danger in posting information about your future plans like vacation.
___4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to
the email, Is it safe to reply?
___5. A virus is a malware that multiples and infects other computers through flash drives.
___6. Key bloggers are software that show pop-up ads even if you are not using your browser.
___7. You friend would like to ask your security password to open account in a certain online game, will you give her
your password?
___8. You forgot to answer your assignment in English which is an essay, for you to have an answer you do research
and you found out a website offering free essays. Is it okay to use the essays from a free essay website?
___9. Search engines scan websites for search results even if you have set your post to “private”.
___10. Is it necessary to protect important work and personal information stored in a computer through creating
secure password?
ACTIVITY 1: How safe I am?

Instruction: The learner will say Post if you they are


willing to share the information online or say Only me
if not willing to share.
POST or ONLY ME ?

FB Account password
POST or ONLY ME ?

Current Location
POST or ONLY ME ?

Relationship Status
POST or ONLY ME ?

Cellphone number
POST or ONLY ME ?

Your Birthday
POST or ONLY ME ?

Fake news
Activity 2: What’s on your mind?
Instructions: Learning Objective 2 & 4
 The students will formulate online safety, security, and ethics from the
situations given when using ICTs.
 The class will be grouped into four(4). Each group will do roleplaying
through the scenario given.
• Each group will be given ten (10) minutes to formulate online safety,
security and ethical practices of the scenario given.
Activity 2: What’s on your mind?
Scenario #1:
Atasha forgot to make her assignment in English which is to make an
essay. So, she did research and found out a website offering free essay. As a
friend of Atasha, what advice will you give to her? Explain your answer.

Scenario #2:
Your co-worker asks for the template of Immersion activities that were
saved in your flash drive. Knowing that your flash drive has a virus, will you let
her borrow it? Why or why not.
Activity 2: What’s on your mind?
Scenario #3:

You received an email stating that your mother’s bank account is going to
be forfeited if you don’t respond to the email, is it safe to reply? Why or why
not?
Scenario #4:
Your friend would like to ask your security password to open account in
a certain online game, will you give her your password? What will be your
response?

 Presentation of each group (5 minutes)


Activity 3: Status Update !
Learning Objective 3
1. Based on the activity presented, online safety, security and ethics in
the use of ICTs is necessary because _______________________
_______________________________________________________
2. What common security threats you have encounter while using
computer or social media platforms? How did you avoid it from
happening?
3. Why is it important to be safe and secured online?
What is Safety?

What is Security?
What is Safety?
Safety is the condition of being protected from or unlikely to
cause danger, risk, or injury. Online Safety refers to the
practices and precautions that should be observed when
using Internet to ensure the users, computers and personal
information safe from crimes.

Example: Keep personal information private


What is Security?
Security is the protection of software
applications, web browsers and virtual private
networks that use the internet.

Example: Complex password entry


Online safety tips when using Internet
1. Do not reply or click link from suspicious emails.
2. Be mindful with what you share online and what site you share it to.
3. Avoid downloading anything from untrusted websites.
4. Install and updates an antivirus software on your computer.
5. Do not share your password with anyone.
6. Check out the privacy policy page of a website to learn how the website
handles the information you share.
Online safety tips when using Internet
7. If you have Wi-fi at home, make it a private network by adding a password.

8. Know the security features of the social networking site you use. By securing your profile
private, search engines will not be able to scan your profile.

9. Install and updates an antivirus software on your computer. Use only one antivirus software
to avoid conflicts.

10. Do not share your password with anyone..

11. Add friends you know in real life.


What is Ethics?

Ethics is the moral principles that govern a


person's behavior or the conducting of an
activity.
The Commandments of
Computer Ethics (Ramon
Barquin)
1. Thou shalt not use a computer to harm other people
(Dili ka mogamit ug kompyuter aron makadaot sa ubang
mga tawo)
2. Thou shalt not interfere with other people’s computer work
(Dili ka manghilabot sa trabaho sa kompyuter sa ubang
mga tawo)
The Commandments of Computer
Ethics
3. Thou shalt not snoop around in other people’s
choice
(Dili ka magsuroysuroy sa pagpili sa ubang tawo )
4. Thou shalt not use a computer to steal
(Dili ka mogamit ug kompyuter sa pagpangawat)
The Commandments of Computer ethics
5. Thou shalt not use a computer to bear false witness
(Dili ka mogamit ug kompyuter sa pagsaksi ug bakak)
6. Thou shalt not use or copy software for which you have not
paid
(Dili ka mogamit o magkopya sa software nga wala nimo
mabayri)
7. Thou shalt not use other people’s computer resources without
authorization
(Dili ka mogamit sa mga kapanguhaan sa kompyuter sa
ubang mga tawo nga walay pagtugot)
The Commandments of Computer ethics
8. Thou shalt not appropriate other people’s intellectual output
(Dili nimo gamiton ang intelektwal nga output sa ubang mga tawo)

9. Thou shalt not think about the social consequences of the program you write
(Dili ka maghunahuna mahitungod sa sosyal nga mga sangputanan sa
programa nga imong gisulat)

10. Thou shall use a computer in ways that show consideration and respect
(Angay mogamit og kompyuter sa mga paagi nga nagpakita og
konsiderasyon ug pagtahud )
Activity 4: Let’s comment on this !
Instructions: Learning Objective 1
The students will answer as to how the following activities should be
responded through applying the learned online safety, security and ethics.
1. Asking for your password
2. Agreement of terms and conditions from a page/website
3. Suspicious link from email
4. Friend requests from unfamiliar profile/faces
5. Ask to share unverified news or information
Activity 5: Show me your reaction !
Instruction: The students will react on the statements by putting a happy face if
the statements corresponds to the computer safety, security and ethical
standards or sad face if not.
1. Nathan’s work was interrupted because of John’s flash drive contained virus.
2. Natasha always posting her future plans like vacation.
3. Nica automatically agree on terms and conditions of a website.
4. Kendra install antivirus software on her computer as many as she could.
5. Juancho does not reply on suspicious accounts.
Activity 5: Show me your reaction !
Instruction: The students will react on the statements by putting a happy face if the
statements corresponds to the computer safety, security and ethical standards or sad face
if not.
6. Since it’s already deadline, Grant copied a ready-made essay from Google.
7. I never check the security features of the social networking site I use.
8. Belle never take someone’s file or work without permission.
9. I shared my Facebook password with my friends since I trust them.
10. Amaia never click on pop-up ads.
Activity 6: Reflection time

Instructions: Learning Objective 3


Complete the statement below by supplementing the significance and
values learned from the lesson. (personal or academic – from the learner).
I can apply the concept/values acquired from the lesson
through________________________________________________________________________________
_________________________________________________________________________________________.
The concept/lesson is significant to me because
______________________________________________________________________________________
_________________________________________________________________________________________.
Assignment: Draw the words !

Instruction: In a short-sized bond paper, how will you


draw Online safety and security? Make your work
explain the word.
CONCLUDING QOUTE

https://quotefancy.com/media/wallpaper/1600x900/4768866-Jerry-Smith-
REFERENCES
Barsobia, JP. (2020). Commandments-computer-ethics. January 2020. Retrieved from
https://my-homeworkhelpersph.com/technology-and-home-economics/
Chanti, R. (2014). Safety and Security. Retrieved from https://techspirited.com/ten-
commandments-of- computer-ethics
https://www.bing.com/images-onlinesecurity/search
Thank you for your time !

You might also like