Professional Documents
Culture Documents
Online Safety, Security Safety and Etiquette PPT Lovely F
Online Safety, Security Safety and Etiquette PPT Lovely F
Online Safety, Security Safety and Etiquette PPT Lovely F
SECURITY SAFETY
AND ETIQUETTE
INTERNET THREATS
Objectives:
• apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks.
Consider the illustration below. What are your thoughts on the image?
What do you believe the man is up to? Do you know someone or have
you been a victim of someone acting inappropriately on the internet?
Part I. True or False
Directions: Read each statement carefully and identify if the statement is correct or
not. Write T if the statement is true and F if false. WRITE THE LETTER OF YOUR
ANSWER AT THE SPACE PROVIDED
• 1. Be mindful of what you share online and what site you share it to.
2. Just accept terms and conditions to reduce the time in creating
accounts online.
3. Keep your profile to public to have more friends.
4. We can share our passwords to our boyfriend or girlfriend to show
love and trust.
5. Avoid downloading anything form untrusted websites.
6. We can use two or more antivirus software to ensure that our
computer is safe.
7. Add friends you know in real life.
8. Do not reply or click links from suspicious emails.
9. Virus Protection is recommended to be turned on always.
10. Know the security features of the social networking site you use.
• The internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and
can grab that information. Any information, even things that you have
set privately, can be accessed one way or another. This is why social
networking sites like Facebook continues to improve their security
features. The threat of cybercrimes is very real. While you may not
experience the threat now, whatever information we share today
could affect our future.
What is an Internet Threat?
• Web-based threats, or online threats, are a subset of cybersecurity
risks that involve the potential for an unpleasant event or action to
occur through the internet.
•
Types of Malware
• c. Viruses - typically attach silently to downloads due to their ability to
spread at an alarming rate. Viruses are frequently attached to
downloaded files, distributed via CDs, DVDs, and USB sticks, or
installed on computers via infected email attachments.
Types of Malwares
• d. Worms - typically infect computers via a malicious email
attachment or USB flash drive. Once a worm has invaded your
computer, it will very certainly send itself to every email address
stored on your system. Your email will appear innocent to the
recipient until they open it and become infected with the same worm.
Types of Malware
• e. Spyware - is an all-encompassing internet nastiness that is
frequently associated with pop-up advertisements for downloadable
files. Spyware can monitor your keystrokes, read and destroy your
files, reformat your hard drive, and access your apps once it is
installed on your computer. Whoever controls the spyware has access
to your personal information without you being aware of it.
Types of Malware
• f. Keyloggers - Keyloggers, like a component of spyware, record a
user's keyboard operations. The majority of keyloggers will search for
distinct key entries, such as bank card numbers and passwords.
Keylogging is frequently associated with identity theft and theft of
intellectual property.
Common Internet Threats
• 3. Predators and Hackers. Computer security dangers and malware
are created by people, not machines. Hackers and predators are
programmers who prey on others for their personal advantage by
hacking into computer systems in order to steal, alter, or destroy data.
This is a sort of cyber-terrorism. These online predators are capable of
compromising credit card information, preventing you from accessing
your data, and stealing your identity.
Common Internet threats
• 4. Phishing. A type of deception. Frequently, official-looking emails
are sent in the name of a reputable supplier, such as a bank. These
emails are sent in an attempt to obtain people's passwords and
payment card information
Common Internet threats
• 5. Pharming. A more sophisticated form of phishing that makes use of
the DNS system. Pharmers frequently design web pages that look
exactly like those of a reputable organization, such as an online
banking log-in page. Users will then submit their credentials, believing
they are entering into their usual service, and the pharmer will steal
their credentials.
•
Onel de Guzman
• Onel de Guzman, a 24-year-old computer-savvy Filipino, admits to
creating computer viruses but expresses doubt that the 'Love Bug'
virus that infected computers worldwide and caused an estimated
$10 billion in damage was one he devised. Authorities in the
Philippines filed theft and other accusations against de Guzman but
later dropped them due to a lack of evidence. Although de Guzman
no longer hacks, he continues to practice 'cracking,' which he defines
as obtaining unlawful access to passwords, serial numbers, and other
numeric codes in order to acquire unlicensed software off the
Internet rather than paying for it.
Tips to protect ourselves from
internet threats:
1. Examine
• - It is critical to do thorough examinations of free software,
downloads from peerto-peer file sharing sites, and emails from
unknown senders to avoid viruses. The majority of modern web
browsers provide security options that can be enhanced to provide
the best defense against online dangers. However, as we'll reiterate
throughout this essay, the single most efficient method of preventing
malware infection is to install up-to-date antivirus software from a
reliable supplier.
2. Read Terms and Conditions
• While many users will object, reading terms and conditions can help
you have a better knowledge of how your online behavior is tracked.
Naturally, if a firm you are unfamiliar with advertises a bargain that
appears to be too good to be true, make sure you have an internet
security solution in place and proceed with care.
•
3. Protect Yourself
• Using online security products that include identity theft protection is
one of the most effective ways to safeguard yourself against this type
of cybercriminal. Antivirus systems that include identity theft
protection may be "taught" in fractions of a second to spot phishing
threats.
B. Online Safety,
Security, Ethics, and
Etiquettes
Online Safety. The main concern is the protection of computer
machine, software systems, files, data, and user’s health and life
from threat, damage, and harm.
Online Security. The measure applied to safeguard the ICT
system and block the entrance of malicious software such as virus
or to refrain from suspicious incoming files from unknown sources.
Table 1. Example of Applying Online Safety and Security
• E. Reposting Fact Checked. That cancer cure may seem fantastic, but if it is a scam, it
will cause confusion. And urban myths add to the internet's noise and waste time. If
you are unsure of the facts, email them to someone who does. Or use Google or
Snopes.com. Remember that many viruses are spread via chain letters and requests
to share information to ten friends or everyone in your address book. Don't be fooled.
Sending the message will bring you bad luck and karma.
•
• F. Answer Emails Quickly. Accept and eliminate spam, unwanted messages, and other
nonsense. If you have provided someone your email address or are in a position
where people might fairly expect to contact you by email, please respond within a
few days. If it will take longer to respond, inform them via email. Don't just disregard
a question if you don't want to answer it. Reply that it is a challenging question and
they should look elsewhere for answers.
Basic netiquette guidelines to avoid harming
your online and offline interactions.
• G. Form Good Connection Physically. When utilizing technology, it's
easy to lose track of what's going on around you, but connecting with
others is more vital than ever. Remember the great influence you can
make by putting down your phone and talking to someone.
Ten Commandments
of Computer Ethics
• I. Thou shalt not use a computer to harm other people. Don't use the computer
to harm others. It is unethical to use a computer to hurt another user. It's not just
about pain. It involves modifying or deleting other users' data.
• II. Thou shalt not interfere with other people’s computer work. Use computer
technologies to disrupt other users' work. Computer software can be used to
annoy or interrupt other users.
• III. Thou shalt not snoop around in other people’s computer files. Do not spy on
someone else's computer info. We realize it's wrong to read private letters. It's
also illegal to read someone's emails or files. Getting info from someone's personal
files is like breaking into their room.
• IV. Thou shalt not use a computer to steal. Don't utilize computers to steal data.
Stealing or releasing sensitive information constitutes robbery.
• V. Thou shalt not use a computer to bear false witness. Don't use computers to
propagate disinformation. The Internet has made information viral today. This implies
that incorrect information can spread quickly via social media or email. It's unethical to
help spread false information.
• VI. Thou shalt not copy or use proprietary software for which you have not paid. Do
not copy or use proprietary software without permission (without permission). Avoid
pirating software or buying it. Unless the program is free. Software, like any other
creative work, is copyrighted. A line of code is the creator's own effort. It is his/her
copyright.
• VII. Thou shalt not use other people’s computer resources without authorization or
proper compensation. Unless approved, do not use another's computer. Multi-user
systems have unique passwords. Invading another user's password is immoral. Ethically,
breaking passwords is not a good idea.
• VIII. Thou shalt not appropriate other people’s intellectual output. Do not steal other
people's ideas. It's wrong to claim ownership of someone else's work. A software
developer's programs are hers. If he works for an organization, they are its property. It's
unethical to copy and spread them in one's own name.
• IX. Thou shalt think about the social consequences of the program you are writing
or the system you are designing. Consider the societal impact of software before
building it. Looking at the social implications of a program is a larger view of technology.
• X. Thou shalt always use a computer in ways that shows consideration and respect
for others. Respect your fellow members when using computers to communicate. The
same rules apply to computer communication as they do in the physical world.
Practice Exercises:
• MULTIPLE CHOICE
• DIRECTIONS: Read each statement carefully and identify the word or group of words
that best describe the statement. Select from the given choices after each question and
WRITE THE LETTER OF YOUR ANSWER AT YOUR PAPER.
• _____1. A type of malware software that displays unwanted ads when a user is surfing
the internet.
A. Adware B. Trojans C. Viruses D. Worms
• _____2. A form of fraudulent activity wherein emails are sent to acquire people’s
passwords and credit card details.
A. Malware B. Hackers C. Phishing D. Pharming
• _____3. Individuals capable of compromising credit card information, lock you out of your
data, and steal your identity.
A. Malware B. Hackers C. Phishing D. Pharming
4. A malware that usually attach themselves covertly to downloads as
they are designed to spread at an alarming rate.
A. Adware B. Trojans C. Viruses D. Worms
5. This malware can monitor your keystrokes, read and delete your
files, reformat your hard drive, and access your applications.
A. Keyloggers B. Spyware C. Adware D. Spam