Lesson 2 ONLINE SAFETY, SECURITY ETHICS AND ETIQUETTE

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 84

“YOU ARE BRAVER

THAN YOU BELIEVE,


STRONGER THAN YOU
SEEM, AND SMARTER
THAN YOU THINK”

-Christopher Robin
Week 2 Lesson 2: ONLINE
SAFETY, SECURITY ETHICS
AND ETIQUETTE
KEEPING YOURSELF
SAFE ONLINE
ONLINE SAFETY AND ETHICS
According to google’s
support page
ONLINE SAFETY AND ETHICS
1. Check for viruses and
malware
ONLINE SAFETY AND ETHICS
What Can Malware Do?

• In short, malware can wreak havoc on a


computer and its network. Hackers use it
to steal passwords, delete files and render
computers inoperable. A malware infection
can cause many problems that affect daily
operation and the long-term security of your
company.
What Can Malware Do?

• A virus can damage programs, delete files


and reformat or erase your hard drive,
which results in reduced performance or
even crashing your system entirely. Hackers
can also use viruses to access your personal
information to steal or destroy your data.
Why is it important to scan for viruses?

• Virus scans search through your system to


locate and remove any malicious threats
on your device. You'll find most antivirus
software guards against malware. This can
include threats like viruses and worms, as well
as, spyware, Trojans, ransomware, and
adware.
ILOVEYOU
Example of a virus.
• What is the history of ILOVEYOU virus?
• ILOVEYOU, sometimes referred to as Love Bug or
Love Letter for you, is a computer worm that infected
over ten million Windows personal computers on
and after 5 May 2000. It started spreading as an
email message with the subject line "ILOVEYOU"
and the attachment "LOVE-LETTER-FOR-YOU.
What is the history of ILOVEYOU
virus?
• Onel De Guzman, of AMA Computer College
• ILOVEYOU, sometimes referred to as Love Bug or
Love Letter for you, is a computer worm that infected
over ten million Windows personal computers on
and after 5 May 2000. It started spreading as an
email message with the subject line "ILOVEYOU"
and the attachment "LOVE-LETTER-FOR-YOU.
2. Do an account
security checkup
ONLINE SAFETY AND ETHICS
Google Security Checkup

• Google's Security Checkup is a great way to


ensure that your account is secure and isn't
being accessed by anyone but you. It can also
help highlight security flaws on your account
that may be easily missed.
Google Security Checkup

• Manage apps with access to your account


• Review signed-in devices
• Review recent security events
• i.e. New Sign-ins, App Password creation & deletion,
etc.
• Enable Two-Step Verification
3. Google has a security
checkup feature, in your
account’s page
ONLINE SAFETY AND ETHICS
3. That allows an
overall checkup and for
a possible update of
your details
ONLINE SAFETY AND ETHICS
4. Update your account
recovery options
ONLINE SAFETY AND ETHICS
5. Enroll in 2-step
verification
ONLINE SAFETY AND ETHICS
What happens when you turn
on 2-step verification?
2-step verification adds an extra layer of
security to your Google Account. In
addition to your username and password,
you'll enter a code that Google will send
you via text or voice message upon
signing in.
6. Google allows you to
add extra layer of
security
ONLINE SAFETY AND ETHICS
6. By requiring you to
grab a code sent to your
phone after logging in,
with your password
ONLINE SAFETY AND ETHICS
7. Perform a regular
operating system and
browser updates.
ONLINE SAFETY AND ETHICS
Operating system updates
Operating system updates provide fixes to
possible bugs and security holes, along with
cleaning up outdated software that may slow
down your device. Ensure that your computer,
mobile phone, or tablet is using the latest version
of its OS to protect your devices and data from
cybersecurity issues
8. Never use your
google account
password on another
website
ONLINE SAFETY AND ETHICS
9. Protect your
password
ONLINE SAFETY AND ETHICS
10. Use a strong
password
ONLINE SAFETY AND ETHICS
How to create a unique password
and protect your accounts?
• In addition to making unique passwords, we also
recommend
strengthening all of your existing passwords and
following best practices for any new ones. You can
make your passwords stronger by not including
personal information in them (this includes pet
names, favourite sports teams and birthdays).
How to create a unique password
and protect your accounts?
• You should also use a minimum of 12
characters that includes upper- and lower-
case letters, numbers and special
characters. You can be even more secure by
using a passphrase instead, which has a
combination of four or more random words
and a minimum of 15 characters.
How to create a unique password
and protect your accounts?
• A challenge for creating strong and unique
passwords for all your online accounts is keeping
track of them. This is why we recommend trying a
password manager. A password manager does
exactly what it promises to do. It manages your
passwords on your behalf, so you don’t have to
remember them all.
The core rules of netiquette
1. Remember the
human
ONLINE SAFETY AND ETHICS
2. Adhere to the same
standards of behavior
online, that you follow
in real life
ONLINE SAFETY AND ETHICS
3. Know where you are
in cyberspace
ONLINE SAFETY AND ETHICS
4. Respect other
people’s time and
bandwidth
ONLINE SAFETY AND ETHICS
5. Make yourself look
good online
ONLINE SAFETY AND ETHICS
6. Share expert
knowledge
ONLINE SAFETY AND ETHICS
7. Help keep flames of
war under control
ONLINE SAFETY AND ETHICS
8. Respect other’s
privacy
ONLINE SAFETY AND ETHICS
9. Don’t abuse your
power
ONLINE SAFETY AND ETHICS
9. Don’t abuse your
power
ONLINE SAFETY AND ETHICS
10. Be forgiving of
other people’s mistakes
ONLINE SAFETY AND ETHICS
Week 2 Lesson 3: INTERNET
SEARCH / RESEARCH

Contextualized Online Search and Research Skills


“I look at Google and think they
have a strong academic culture.
Elegant solutions to complex
problems.”
- Mark Zuckerberg
Contextualized Online Search and Research Skills
•Internet research is the practice of
using Internet information, especially
free information on the World Wide
Web, in research. It is:
•focused and purposeful (so not
recreational browsing),

•uses Internet information or


Internet-based resources (like
Internet discussion forum)
•tends towards the immediate
(drawing answers from information
you can access without delay)

• and tends to access information


without a purchase price.
•Research is a broad term. Here,
it is used to mean "looking
something up (on the Web)". It
includes any activity where a
topic is identified, and
•an effort is made to actively
gather information for the
purpose of furthering
understanding. It may include
some post collection analysis like
a concern for quality or synthesis.
The Internet can be a researcher's
dream come true. By browsing the
Internet, much as you would browse
the shelves of a library, you can
access information on seemingly
limitless topics.
Contextualized Online Search and Research Skills
The research process
Contextualized Online Search and Research Skills
•an effort is made to actively
gather information for the
purpose of furthering
understanding. It may include
some post collection analysis like
a concern for quality or synthesis.
•Lessons and projects should
be designed so that research
time on the Web can be
maximized in terms of
efficiency.
•This may mean gathering
necessary information
beforehand, having students
work in groups, or focusing
on whole-class projects.
Barron and Ivers (1996) outlined the
following cycle for online research
projects.
Contextualized Online Search and Research Skills
Step 1: Questioning ---
Before going on the
Internet, you should
structure their questions.
Contextualized Online Search and Research Skills
Step 2:
Planning --- Develop a
search strategy with a list
of sites to investigate.
Contextualized Online Search and Research Skills
Step 3: Gathering --- Use
the Web to collect and
gather information.
Contextualized Online Search and Research Skills
Step 4:
Sorting & Sifting ---
Analyze and categorize
the data they gathered on
the Web.
Contextualized Online Search and Research Skills
Step 5: Synthesizing ---
Integrate the information
into the lesson, and draw
conclusions.
Contextualized Online Search and Research Skills
Step 6: Evaluating ---
Assess the results, and if
necessary, begin the
process again.
Contextualized Online Search and Research Skills
Searching the Web:

There are billions of pages of


information on the World Wide
Web, and finding relevant and
reliable information can be a
challenge
Contextualized Online Search and Research Skills
Techniques for using the
different search tools vary.
For best results, read the
search tips or hints that are
provided at each search site.
Contextualized Online Search and Research Skills
Also, note that some of the
search engines do not allow
Boolean searches that
combine words with the
logical connectors of AND,
OR, or NOT.
Contextualized Online Search and Research Skills
Common commands for
search engines include:
Contextualized Online Search and Research Skills
Quotation Marks ( " ) Using
quotation marks will help to
find specific phrases involving
more than one word.

For example:

"Martin Luther King"


Contextualized Online Search and Research Skills
Addition Sign ( + ) Adding
a + sign before a word
means that it MUST be
included in each site listed.

For example:
+ Florida + taxes
Contextualized Online Search and Research Skills
Subtraction Sign
( - ) Adding a - sign before a
word means that it will
NOT appear in the sites
listed.

For example:
+ Washington -DC
Contextualized Online Search and Research Skills
Asterisks ( * ) Asterisks can be
used for wild-cards in some
search engines.

For example: Mexic* will look


for Mexico, Mexican, Mexicali,
etc.
Contextualized Online Search and Research Skills
Analyzing web resources

Answer the following questions to evaluate web


resources.

Contextualized Online Search and Research Skills


Accuracy

Are sources listed for the facts?

Can information be verified


through another source?

Has the site been edited for


grammar, spelling, etc.?
Authority

Is the publisher reputable?

Is the sponsorship clear?

Is a phone number or postal


address available?
Authority

Is there a link to the sponsoring


organization?

Is the author qualified to write


on this topic?
Objectivity

Does the sponsor have


commercial interests?

Is advertising included on
the page?

Are there obvious biases?


Currency

Is a publication date
indicated?

Is there a date for the last


update?

Is the topic one that does


not change frequently?
Coverage

Are the topics covered in


depth?

Does the content appear


to be complete?
Copyright issues
Everyone has a somewhat flexible, but not
unlimited, copyright privilege under the "fair use
clause" of the U.S. Copyright Act.

Contextualized Online Search and Research Skills


"Fair use" is the means by
which educators of non-
profit educational
institutions may use
copyrighted works without
seeking permission or
making payment to the
author or publisher.
Teachers and students are
also protected to some
extent by the Digital
Millennium Copyright Act,
which went into effect in
October 1998.
Under current guidelines,
teachers and students are
able to make limited use of
copyrighted materials for
instructional purposes.
Thank you!

You might also like