E-Tech Lesson 2: Online Threats PDF

Summary

This document is a lesson on online safety and cybersecurity. It discusses various online threats like malware, phishing, spamming, and cyberbullying, along with tips to stay safe online.

Full Transcript

Browser 09:00 AM Register Now Page 03 09:00 AM Register Now Page 04 09:00 AM Page 02 09:00 AM Page 05 12:01 PM it refers to the online security or safety of the people and their information when...

Browser 09:00 AM Register Now Page 03 09:00 AM Register Now Page 04 09:00 AM Page 02 09:00 AM Page 05 12:01 PM it refers to the online security or safety of the people and their information when using internet. Register Now Page 06 12:01 PM Page 07 12:01 PM or malicious software, any program or file that is harmful to a computer user. Page 08 12:01 PM are malware that attach to another program and, when executed unintentionally by the user replicates itself by modifying other computer programs and infecting them with its own bits of code Page 9 12:01 PM WORM a malicious program that transfers from one computer to another by any type of means. https://tinyurl.com/2s3fsy52 Page 11 12:01 PM is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. TROJAN Page 12 12:01 PM is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger Page 13 12:01 PM (advertising supported software) is unwanted software designed to throw advertisements up on your screen. Example, pop-up ads and banner ads. Page 14 12:01 PM is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back. Page 15 12:01 PM are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it. Page 06 12:01 PM its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username, password, credit card or personal information. Page 17 12:01 PM Pharmers frequently construct web pages that look like those of a reputable company, such as an online banking log-in page. Users will then submit their credentials, assuming they are logging in to their regular service, and the pharmer will steal their credentials. Page 06 12:01 PM refers to the act of tormenting, harassing, or embarrassing another person using the internet The Anti-Bullying Act of 2013 (RA 10627) Page 18 12:01 PM 1 Register Now Page 19 12:01 PM 2 Register Now Page 20 12:01 PM 3 Register Now Page 21 12:01 PM 4 Register Now Page 22 12:01 PM 5 Register Now Page 23 12:01 PM 6 Register Now Page 23 12:01 PM 7 Register Now Page 25 12:01 PM 8 Register Now Page 26 12:01 PM 9 Register Now Page 27 12:01 PM 10 Register Now Page 28 12:01 PM What is netiquette? Netiquette, or network etiquette, is concerned with the "proper" manner of communication in the online environment. Core Rules of Netiquette Remember the Human When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Rule 1 Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. Rule 2 Know where you are in cyberspace Netiquette varies from website to website. What s acceptable in one environment is not acceptable in another. Rule 3 Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Rule 4 Make yourself look good online One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear Always check for spelling and grammar errors Rule 5 Know what you're talking about and state it clearly Be pleasant and polite Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded. Rule 6 Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). Rule 7 Respect other people's privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Rule 8 Don't abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. Rule 9 Be forgiving of other people's mistakes If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum. Rule 10 Page 37 12:01 PM --Newton Lee--- 12:01 PM MARITES L. BALISTOY 12:01 PM

Use Quizgecko on...
Browser
Browser