Online Safety, Security Safety and Etiquette PPT Lovely F

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

ONLINE SAFETY,

SECURITY SAFETY
AND ETIQUETTE
INTERNET THREATS
Objectives:
• apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks.
Consider the illustration below. What are your thoughts on the image?
What do you believe the man is up to? Do you know someone or have
you been a victim of someone acting inappropriately on the internet?
Part I. True or False
Directions: Read each statement carefully and identify if the statement is correct or
not. Write T if the statement is true and F if false. WRITE THE LETTER OF YOUR
ANSWER AT THE SPACE PROVIDED

• 1. Be mindful of what you share online and what site you share it to.
2. Just accept terms and conditions to reduce the time in creating
accounts online.
3. Keep your profile to public to have more friends.
4. We can share our passwords to our boyfriend or girlfriend to show
love and trust.
5. Avoid downloading anything form untrusted websites.
6. We can use two or more antivirus software to ensure that our
computer is safe.
7. Add friends you know in real life.
8. Do not reply or click links from suspicious emails.
9. Virus Protection is recommended to be turned on always.
10. Know the security features of the social networking site you use.
• The internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and
can grab that information. Any information, even things that you have
set privately, can be accessed one way or another. This is why social
networking sites like Facebook continues to improve their security
features. The threat of cybercrimes is very real. While you may not
experience the threat now, whatever information we share today
could affect our future.
What is an Internet Threat?
• Web-based threats, or online threats, are a subset of cybersecurity
risks that involve the potential for an unpleasant event or action to
occur through the internet.

• End-user vulnerabilities, web service developers/operators, or web


services themselves enable online threats. Regardless of the motive
or reason for an online threat, the repercussions can be detrimental
to both persons and companies.
A. Common Internet Threats
• 1. Spam – Simply as unwanted messages, the majority of our email
accounts have a 'Spam' or 'Junk' category implies that spam emails
are a significant concern, accounting for more than 50% of all emails.
Apart from being bothersome, spam emails do not pose a direct
threat. Many, however, may contain malware.
2. Malware. Short for malicious software, is a blanket term for viruses, worms,
trojans and other harmful computer programs hackers use to wreak destruction
and gain access to sensitive information. The following are some types of
malwares:
• a. Adware - is a type of malware that shows unwanted advertisements
while a person is browsing the internet. Advertisements frequently route
your queries to advertising websites and secretly collect marketing-related
data about you, which is deemed harmful. Adware is frequently included in
a large number of shareware and freeware downloads as a lawful method
of generating advertising income to support development. However,
certain websites are tainted with dangerous adware that is downloaded to
your computer automatically. Trojans can then be employed.
Types of Malwares
• b. Trojans - leave your computer completely vulnerable, allowing
criminals to steal any data on it. Trojans frequently disguised as
normal computer programs in order for hackers to infiltrate your
machine undetected.


Types of Malware
• c. Viruses - typically attach silently to downloads due to their ability to
spread at an alarming rate. Viruses are frequently attached to
downloaded files, distributed via CDs, DVDs, and USB sticks, or
installed on computers via infected email attachments.
Types of Malwares
• d. Worms - typically infect computers via a malicious email
attachment or USB flash drive. Once a worm has invaded your
computer, it will very certainly send itself to every email address
stored on your system. Your email will appear innocent to the
recipient until they open it and become infected with the same worm.
Types of Malware
• e. Spyware - is an all-encompassing internet nastiness that is
frequently associated with pop-up advertisements for downloadable
files. Spyware can monitor your keystrokes, read and destroy your
files, reformat your hard drive, and access your apps once it is
installed on your computer. Whoever controls the spyware has access
to your personal information without you being aware of it.
Types of Malware
• f. Keyloggers - Keyloggers, like a component of spyware, record a
user's keyboard operations. The majority of keyloggers will search for
distinct key entries, such as bank card numbers and passwords.
Keylogging is frequently associated with identity theft and theft of
intellectual property.
Common Internet Threats
• 3. Predators and Hackers. Computer security dangers and malware
are created by people, not machines. Hackers and predators are
programmers who prey on others for their personal advantage by
hacking into computer systems in order to steal, alter, or destroy data.
This is a sort of cyber-terrorism. These online predators are capable of
compromising credit card information, preventing you from accessing
your data, and stealing your identity.
Common Internet threats
• 4. Phishing. A type of deception. Frequently, official-looking emails
are sent in the name of a reputable supplier, such as a bank. These
emails are sent in an attempt to obtain people's passwords and
payment card information
Common Internet threats
• 5. Pharming. A more sophisticated form of phishing that makes use of
the DNS system. Pharmers frequently design web pages that look
exactly like those of a reputable organization, such as an online
banking log-in page. Users will then submit their credentials, believing
they are entering into their usual service, and the pharmer will steal
their credentials.

Onel de Guzman
• Onel de Guzman, a 24-year-old computer-savvy Filipino, admits to
creating computer viruses but expresses doubt that the 'Love Bug'
virus that infected computers worldwide and caused an estimated
$10 billion in damage was one he devised. Authorities in the
Philippines filed theft and other accusations against de Guzman but
later dropped them due to a lack of evidence. Although de Guzman
no longer hacks, he continues to practice 'cracking,' which he defines
as obtaining unlawful access to passwords, serial numbers, and other
numeric codes in order to acquire unlicensed software off the
Internet rather than paying for it.
Tips to protect ourselves from
internet threats:
1. Examine
• - It is critical to do thorough examinations of free software,
downloads from peerto-peer file sharing sites, and emails from
unknown senders to avoid viruses. The majority of modern web
browsers provide security options that can be enhanced to provide
the best defense against online dangers. However, as we'll reiterate
throughout this essay, the single most efficient method of preventing
malware infection is to install up-to-date antivirus software from a
reliable supplier.
2. Read Terms and Conditions
• While many users will object, reading terms and conditions can help
you have a better knowledge of how your online behavior is tracked.
Naturally, if a firm you are unfamiliar with advertises a bargain that
appears to be too good to be true, make sure you have an internet
security solution in place and proceed with care.

3. Protect Yourself
• Using online security products that include identity theft protection is
one of the most effective ways to safeguard yourself against this type
of cybercriminal. Antivirus systems that include identity theft
protection may be "taught" in fractions of a second to spot phishing
threats.
B. Online Safety,
Security, Ethics, and
Etiquettes
Online Safety. The main concern is the protection of computer
machine, software systems, files, data, and user’s health and life
from threat, damage, and harm.
Online Security. The measure applied to safeguard the ICT
system and block the entrance of malicious software such as virus
or to refrain from suspicious incoming files from unknown sources.
Table 1. Example of Applying Online Safety and Security

Online Safety Online Security


Computer machines -Regular Virus Scanning - Turn-on Network
and Cleaning Protection
Software Machines - Perform USB Scan - Turn-on Virus and
Threat Protection
- Install Legitimate Anti-
Malware
Mobile Phones Apply Web Filter Set Difficult Passwords
Files/Data -Do not entrust your file -Apply File Password
password -Apply User Restrictions
-Don’t share confidential
files to anyone online
Table 1. Example of Applying Online Safety and Security
Online Safety Online Security
User’s Health - Limit the amount of -Apply Web and Video
time you spend on the Filter
internet and allow
adequate time for
physical activity.
- Leave the sites that
pollutes mind.
User’s life - Do not give out all your -Reset your password
personal information in regularly( but be sure to
social media. remember it)
- Unwanted internet
behavior should be
reported.
Lesson 2:BASIC
RULES OF
NETIQUETTE

Netiquette is a term coined from the words network and etiquette that refers
to a set of rules governing acceptable online behavior. Internet ethics,
likewise, is concerned with the appropriate use of online resources in an
online social setting.
Basic netiquette guidelines to avoid harming your
online and offline interactions.

• A. Speak Respectfully. If you wouldn't do it to the face of someone who


might read what you write, don't write it. This includes any social
networking site, forum, chat room, or email message, even if you think it's
anonymous. Yes. It's not simply what you say, but also how. Use the shift
key for capital characters, or write in lower case, but not caps lock. All
capitals text is viewed as yelling. Please and thank you are required.

• B. Share with Care. Avoid sending naked sexts, intoxicated photos, or
unedited home videos. If you don't want your boss, parents, or kids to see
it, don't post it online. Phone calls in public are also prohibited. Invisible to
one person does not mean invisible to all others.
Basic netiquette guidelines to avoid harming your
online and offline interactions.

• C. Exclude No One. Send a private message to a single individual or a


small group of people you want to share an inside joke with. No obscure
comments on your Facebook status, forum, or Instagram story should make
others feel left out. Laughing at text or email jokes in front of others is also
inappropriate. If you don't want to share it, save it.
• D. Respect Privacy. Never forward information without first checking
with the sender. You may assume we are all online buddies, but your friends
may not want their names or email addresses made public. The same goes for
posting or sending images or videos of other people. Remember that tagging
someone on Facebook allows others to view their photos unless they have set
their privacy settings. Sign up for newsletters and other communications with
your own email address
Basic netiquette guidelines to avoid harming your online and offline interactions.

• E. Reposting Fact Checked. That cancer cure may seem fantastic, but if it is a scam, it
will cause confusion. And urban myths add to the internet's noise and waste time. If
you are unsure of the facts, email them to someone who does. Or use Google or
Snopes.com. Remember that many viruses are spread via chain letters and requests
to share information to ten friends or everyone in your address book. Don't be fooled.
Sending the message will bring you bad luck and karma.

• F. Answer Emails Quickly. Accept and eliminate spam, unwanted messages, and other
nonsense. If you have provided someone your email address or are in a position
where people might fairly expect to contact you by email, please respond within a
few days. If it will take longer to respond, inform them via email. Don't just disregard
a question if you don't want to answer it. Reply that it is a challenging question and
they should look elsewhere for answers.
Basic netiquette guidelines to avoid harming
your online and offline interactions.
• G. Form Good Connection Physically. When utilizing technology, it's
easy to lose track of what's going on around you, but connecting with
others is more vital than ever. Remember the great influence you can
make by putting down your phone and talking to someone.
Ten Commandments
of Computer Ethics
• I. Thou shalt not use a computer to harm other people. Don't use the computer
to harm others. It is unethical to use a computer to hurt another user. It's not just
about pain. It involves modifying or deleting other users' data.

• II. Thou shalt not interfere with other people’s computer work. Use computer
technologies to disrupt other users' work. Computer software can be used to
annoy or interrupt other users.

• III. Thou shalt not snoop around in other people’s computer files. Do not spy on
someone else's computer info. We realize it's wrong to read private letters. It's
also illegal to read someone's emails or files. Getting info from someone's personal
files is like breaking into their room.
• IV. Thou shalt not use a computer to steal. Don't utilize computers to steal data.
Stealing or releasing sensitive information constitutes robbery.

• V. Thou shalt not use a computer to bear false witness. Don't use computers to
propagate disinformation. The Internet has made information viral today. This implies
that incorrect information can spread quickly via social media or email. It's unethical to
help spread false information.

• VI. Thou shalt not copy or use proprietary software for which you have not paid. Do
not copy or use proprietary software without permission (without permission). Avoid
pirating software or buying it. Unless the program is free. Software, like any other
creative work, is copyrighted. A line of code is the creator's own effort. It is his/her
copyright.
• VII. Thou shalt not use other people’s computer resources without authorization or
proper compensation. Unless approved, do not use another's computer. Multi-user
systems have unique passwords. Invading another user's password is immoral. Ethically,
breaking passwords is not a good idea.

• VIII. Thou shalt not appropriate other people’s intellectual output. Do not steal other
people's ideas. It's wrong to claim ownership of someone else's work. A software
developer's programs are hers. If he works for an organization, they are its property. It's
unethical to copy and spread them in one's own name.

• IX. Thou shalt think about the social consequences of the program you are writing
or the system you are designing. Consider the societal impact of software before
building it. Looking at the social implications of a program is a larger view of technology.

• X. Thou shalt always use a computer in ways that shows consideration and respect
for others. Respect your fellow members when using computers to communicate. The
same rules apply to computer communication as they do in the physical world.
Practice Exercises:
• MULTIPLE CHOICE
• DIRECTIONS: Read each statement carefully and identify the word or group of words
that best describe the statement. Select from the given choices after each question and
WRITE THE LETTER OF YOUR ANSWER AT YOUR PAPER.
• _____1. A type of malware software that displays unwanted ads when a user is surfing
the internet.
A. Adware B. Trojans C. Viruses D. Worms
• _____2. A form of fraudulent activity wherein emails are sent to acquire people’s
passwords and credit card details.
A. Malware B. Hackers C. Phishing D. Pharming
• _____3. Individuals capable of compromising credit card information, lock you out of your
data, and steal your identity.
A. Malware B. Hackers C. Phishing D. Pharming
4. A malware that usually attach themselves covertly to downloads as
they are designed to spread at an alarming rate.
A. Adware B. Trojans C. Viruses D. Worms

5. This malware can monitor your keystrokes, read and delete your
files, reformat your hard drive, and access your applications.
A. Keyloggers B. Spyware C. Adware D. Spam

You might also like