Empowerment Technologies Lesson 2: Online Safety, Security, Ethics and Etiquette PDF

Document Details

AgilePeach7940

Uploaded by AgilePeach7940

St. Therese Montessori School of San Pablo, Inc.

Sir Luis Angelo Lumpayao

Tags

online safety internet threats cybersecurity technology education

Summary

This document provides information on online safety, including internet threats, types of malware, netiquette, and tips for staying safe online. It is intended for a secondary school educational setting, covering different types of threats and how to approach online interactions safely.

Full Transcript

EMPOWERMENT TECHNOLOGIES LESSON 2 The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things...

EMPOWERMENT TECHNOLOGIES LESSON 2 The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always "other side of the coin". The internet is one of the most dangerous places especially if you do not know what you are doing with it. Netiquette is a made-up word from the words net and etiquette. Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette for the internet. Internet Threats refers to various dangers and risks that can compromise online safety, security, and privacy. These threats can target individuals, businesses, or systems, leading to data breaches, financial loss, or identity theft. Malicious software, is any program or file that is harmful to a computer user. A malicious program designed to replicate itself and transfer from one computer to another. Example: Agent smith - A malware that replaces legitimate apps with infected versions, stealing data and displaying unwanted ads. A malicious program that transfers from one computer to another by any type of means. Example: ILOVEYOU Worm The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000 by Onel De Guzman. A malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Example: Triada - A Trojan that secretly installs other malicious apps on Android devices and can hijack banking transactions. A program that runs in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently doing and typing through keylogging. Example: Keylogger used to record keystrokes done by the user. This is done to steal their password or any other sensitive information. The key logger software typically uses log file to store its recording A program designed to send you advertisements, mostly as pop-ups. Example: Fireball - A type of malware that displays excessive pop-up ads, slows down devices, and tracks user activity. A ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Example: Slocker - A ransomware that locks the phone’s screen and demands payment to regain access. An unwanted email mostly from bots or advertisers. It can be used to send malware. Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her username, password, credit card or personal information. It is the use of works protected by copyright law without permission for a usage where such permission is required. Here are some tips that could help you avoid copyright infringement: 1. Always assume that the work is copyrighted. 2. Do not copy, share or alter without seeking permission. 3. Review and retain licensing agreements. 4. Consider buying content. 5. Give credit to the original author of the page or information. 1. Before your post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? 2. If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as inappropriate. The practice of protecting oneself from digital risks such as cyberbullying, phishing, scams, and harmful content. It includes using strong passwords, avoiding suspicious links, and being mindful of the personal information shared online. The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the internet. 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. 4. Do not share your password with anyone. 5. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode will NOT protect you from hackers. 6. Do not talk to strangers whether online or face-to-face/ 7. Never post anything about a future vacation. It is similar to posting, "Rob my house at this date." 8. Add friends you know in real life. 9. Avoid visiting untrusted websites. 10. Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts. DIRECTIONS: Create a simple poster warning about on how to stay safe online. RUBRIC FOR EVALUATION Content - 10 points Creativity - 5 points Originality - 5 points PRESENTATION BY: SIR LUIS ANGELO LUMPAYAO

Use Quizgecko on...
Browser
Browser