Online Safety, Security, and Etiquette Standards PDF

Summary

This document provides a guide on online safety and cybersecurity. It details various online threats, such as cyberbullying, identity theft, and malware, and gives tips for safe online practices. It also explains netiquette, which emphasizes proper online conduct.

Full Transcript

EMPOWERMENT TECHNOLOGIES 01 Online Safety, Security, and Etiquette Standards PREPARED BY: JOEMIL A. DAYAO TIPS ON HOW TO BE SAFE ONLINE 1. DO NOT SHARE YOUR PASSWORD WITH ANYONE 2...

EMPOWERMENT TECHNOLOGIES 01 Online Safety, Security, and Etiquette Standards PREPARED BY: JOEMIL A. DAYAO TIPS ON HOW TO BE SAFE ONLINE 1. DO NOT SHARE YOUR PASSWORD WITH ANYONE 2. NEVER FULLY RELY ON PRIVACY SETTINGS 3. NEVER POST YOUR FUTURE VACATION 4. AVOID VISITING UNTRUSTED WEBSITES 5. INSTALL AND UPDATE ANTIVIRUS SOFTWARE ON YOUR COMPUTER 6. ADD PASSWORD TO YOUR WIFI AT HOME (MAKE IT PRIVATE) 7. AVOID LOGGING IN TO PUBLIC NETWORKS 8. DO NOT REPLY OR CLICK LINKS FROM SUSPICIOUS EMAILS/SENDERS 9. DO NOT JUST ACCEPT TERMS AND CONDITIONS; READ IT 10. THINK BEFORE YOU CLICK THINK BEFORE YOU CLICK "CONTENT IS FIRE, SOCIAL MEDIA IS GASOLINE" CYBER BULLYING It happens when someone intentionally abused, harass, INTERNET and mistreated by other person using electronic communication. RISK IDENTITY THEFT It is a crime of stealing personal information for the purpose of assuming that person's name or identity to make any form of transactions. CYBERSTALKING A criminal practice where electronic communication is used to stalk or harass individual group. SEXTING The act of sending sexually explicit text messages, images, and videos. REMEMBER ME: RA 9995 Anti-Photo and Video Voyeurism Act RA 11313 Safe Spaces Act (Bawal Bastos Law) REMEMBER ME: LIBEL Article 353 of the Revised Penal Code. SLANDER Article 358 of the Revised Penal Code. REMEMBER ME: RA 10173 Data Privacy Act of 2012 ▪ Unauthorized processing of personal or sensitive information. REMEMBER ME: RA 10627 Anti-Bullying Act of 2013 RA 10175 Cybercrime Prevention Act of 2012 INTERNET THREATS 1. SPAM Also known as junk email or unwanted emails send by advertiser or bot. It can be used to send a malware. 2. MALWARE Malware (short for “malicious software”) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. TYPES OF MALWARE VIRUS A malicious program that replicate itself by copying itself to another program. TROJAN HORSE A malicious program that disguised as legitimate program that user will accept and use but take control of your computer. WORM A malicious program that copy's itself and spreads to other computers. TYPES OF MALWARE SPYWARE A malicious program that gathers information from victim's computer and send it back to the hacker. ADWARE An unwanted advertisement that will pop-up several times on victim's computer then behave abnormally and tedious to close them. KEYLOGGERS A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device. TYPES OF MALWARE BOTNET A collection of infected internet-connected devices such as PC and mobile phone that are controlled by a common type of malware. ROOTKIT A software tools used by hackers to gain control over a computer on a network without being exposed. RANSOMWARE A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus. INTERNET THREATS 3. PHISHING A cyberattack method using deceptive emails and websites to acquire sensitive personal information. 4. CYBERCRIME A crime in which computer is used as object and tool in committing a crime such as hacking, phishing, spamming, child pornography, libel, identity thief and others. NETIQUETTE IT IS A WORD THAT CAME FROM THE TWO WORDS “NET” AND “ETIQUETTE”. IT IS AN ETIQUETTE APPLIED ONLINE THAT SHOWS PROPER MANNER AND BEHAVIOR. RULES OF NETIQUETTE BY: SETH T. ROSS REMEMBER THE HUMAN ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE KNOW WHERE YOU ARE IN CYBERSPACE RESPECT OTHER PEOPLE'S TIME AND BANDWIDTH MAKE YOURSELF LOOK GOOD ONLINE SHARE EXPERT KNOWLEDGE HELP KEEP FLAME WARS UNDER CONTROL RESPECT OTHER PEOPLE'S PRIVACY DON'T ABUSE YOUR POWER BE FORGIVING OF OTHER PEOPLE'S MISTAKES

Use Quizgecko on...
Browser
Browser