ICT 101 Notes - Online Security (PDF)
Document Details
Uploaded by Deleted User
B.R. Asuncion
Tags
Summary
These notes cover Internet safety, including a variety of topics such as Internet threats, hacking, and malware. They also discuss the importance of safeguarding personal data and online security measures.
Full Transcript
ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION LESSON 1: ONLINE SECURITY you would like to receive and avoid confrontational or offensive INTERNET SAFETY...
ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION LESSON 1: ONLINE SECURITY you would like to receive and avoid confrontational or offensive INTERNET SAFETY language It refers to the online security or safety of people and their information when using the INTERNET THREATS internet. HACKING Hacking is a term used to describe TIPS TO STAY SAFE ONLINE actions taken by someone to gain 1. Be mindful of what you share and unauthorized access to a computer. what site you share it to The criminals by which cyber 2. Do not just accept terms and criminals gain access to your conditions: read it computer 3. Check out the privacy policy page of a website BROWSER HIJACKING 4. Know the security features of the It happens when malware or social networking site you use spyware replaces a web user’s 5. Do not share passwords with anyone browser homepage that redirects 6. Avoid logging in to public the user to unwanted websites while networks/wifi’s capturing sensitive private data for 7. Do not talk strangers whether online personal or business gain. of face to face 8. Never post anything about future IDENTITY THEFT vacations It happens when a criminal 9. Add friends you know in real life impersonates a user by stealing his 10. Avoid visiting untrusted websites or her personal information to 11. Install and update an antivirus withdraw money or page goods software on your computer Protect yourself from identity theft 12. If you have wifi at home, make it a ○ Monitor your account online private network by adding a ○ Do not post or give your password identification card/details 13. Avoid downloading anything from online untrusted websites ○ Properly dispose of 14. Buy the softwake: do not use pirated documents with personal ones data 15. Do not reply or slick links from ○ Limit how much information suspicious emails you share MALWARE It is malicious software that is NETIQUETTE intended to damage or disable the Network etiquette computer unit which has codes to Set of rules for behaving properly collect information without one online knowledge Type of malware GOLDEN RULE ○ Viruses Do unto others as you would have ○ Worms them do unto you ○ Trojans Make a good impression - treat ○ Ransomware others with the same respect that ○ Bots ICT 101 NOTES l PAGE 1 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION ○ Adware drives, preventing you from ○ Spyware opening them. ○ Rootkits ○ Fileless malware ○ Malvertising SPYWARE Spyware is any software with malicious behavior that aims to PHARMING gather information about a person It is a technique that redirects a or organization and send it to legitimate website’s traffic to an another entity in a way that harms illegitimate website to gain access to the user by violating their privacy, a user’s personal information endangering their device's security, Pharming attacks sends user to or other means. fake websites instead of the real Types of spyware website the user intended to visit ○ Adware ○ Trojans PHISHING ○ Mobile spyware It is an email or instant message ○ Password stealers scam ○ Keyloggers Which looks like an official message from a legitimate organization like a TROJAN HORSE bank or credit card company that In Greek mythology, the Trojan asks about one’s personal Horse was a wooden horse said to information have been used by the Greeks during the Trojan War to enter the SPAM city of Troy and win the war. It is an irrelevant, inappropriate, A Trojan Horse Virus is a type of unwanted, or junk email that comes malware that downloads onto a from legitimate companies which in computer disguised as a legitimate the long run may be used for program. phishing, scams, and malware RANSOMWARE T.H.I.N.K Ransomware is a type of malware that restricts access to your T.H.I.N.K T: Is it true? computer or your files and displays a H: Is it Helpful? message that demands payment in I: Is it Inspiring? order for the restriction to be N: Is if Necessary? removed. K: Is it Kind? Types of ransomware ○ Lock screen ransomware: displays an image that prevents you from accessing your computer. ○ Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage ICT 101 NOTES l PAGE 2 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION LESSON 2: CONVERGENCE OF The need for devices that will not only interact with media but are TECHNOLOGY capable of handling a large number CONVERGENCE of other formats. The union or merging of two or more things The impact of the convergence of to make a new entity. technology can be exemplified with MOBILE PHONES because aside from its basic purpose of mobile telephony, the CONVERGENCE OF latest cell phones provide and support TECHNOLOGY multiple features. Interlinking of computing & other technologies 3 C’S OF TECHNOLOGY THE PROCESS by which existing CONVERGENCE technologies merge into NEW FORMS that bring together COMPUTER TECHNOLOGY Through the convergence of is the design and construction of technology, devices can interact computers to better help people at with a wider array of media types. school, in business, and at home. different types of media and applications. CONTENT TECHNOLOGY Multimedia content means the mixing of different media on the TIMELINE OF CONVERGENCE same screen in an interactive mode. It was 1691, when the verb converge was created; it implied the COMMUNICATION tendency of two lines to approach TECHNOLOGY one another. The capacity to operate, maintain, During the 20th Century, the and upgrade communications word convergence became broader equipment. and primarily started with the emergence of COMPUTER, TYPES OF CONVERGENCE INTERNET & MOBILE TECHNOLOGY. Convergence: Digital Convergence Convergence became possible with the refers to the convergence of various types unification of formerly distinct products that of data such as text, voice, video, and worked using digital technologies. graphics into digital form. 3 PRIMARY REASONS OF Messaging Convergence: refers to the grouping of services that integrates CONVERGENCE SMS with voice. The rapid advancement in the field of the Internet along with the Media Convergence: refers to the emergence of various products and merging of traditional media (like services in the digital media space. newspapers, television, and radio) with The availability of carrier technology digital technologies. with high bandwidth; and ICT 101 NOTES l PAGE 3 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION Industry convergence: refers, in TECHNOLOGICAL CONVERGENCE general to the merging of industry leaders has brought NEW OPPORTUNITIES in and players that opted to increase their terms of development in enterprises, digital interests in the market. communication, and social media. Technology convergence: refers to LESSON 3: BUILDING BLOCKS the convenience of users to get access to OF SOCIAL MEDIA media content especially on using Consumers used the Internet to smartphones, tablets, and the internet. simply expand content: they read it, they watched it, and they used it to Social Awareness convergence: buy products and services. refers to an opportunity for wider coverage Increasingly, however, consumers are and market range through mainstream utilizing platforms—such as content net-based communication such as social sharing sites, blogs, social networking, media sites and blogging platforms. and wikis—to create, modify, share, and discuss Internet content. Content Convergence: refers to the integration and blending of various types of media content into a unified experience. SOCIAL MEDIA Aside from telecommunications Social Media is considered as the and media, technological convergence is largest area starting to pervade other old-line Social media facilitates the practice industries. Initially, most newspapers and of social networking and is based on other print products had little to no internet the principle that people are presence. Over time, news outlets profoundly communal and have a recognized the value of integrating new need to interact using voice, gesture, media to deliver real-time content and and written languages. boost the reach of advertisers. can create a platform for sharing stories, narratives, and photos, Converging technologies fueled the providing facts and data in a birth of social media applications for consumable way, which engages an sharing content via an online platform. audience by helping them understand. Almost every major media outlet a variety of web-based platforms, has embraced a software development applications and technologies that and IT operations approach to create enable people to socially interact branded applications, where users can with one another, create, share, or interact directly with editorial staff and exchange information, ideas, and other subscribers via the publisher's pictures/videos in virtual Facebook page, Twitter handles, or communities and networks online. chatroom. It is described as websites and applications dedicated to forums, Technology affects almost every micro-blogging, social networking, aspect of 21st -century life, from transport social bookmarking, social duration, efficiency and safety to access to food and and wikis. healthcare, socialization, and productivity. ○ Examples: Facebook, The power of the internet has enabled YouTube, Del.icio.us, Twitter, global communities to form ideas and Digg, blogs and other sites resources to be shared more easily. that have ICT 101 NOTES l PAGE 4 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION ○ content based on user SHARING participation, and It is the block that defines the way user-generated content users exchange, distribute, and (UGC). receive content. UCG (User-generated The term “social” often implies that content or exchanges between people are user-created content) crucial. is any form of content created by the users of a social media PRESENCE This block represents the range to service that is which users can know if other users available publicly are accessible. within that service. Social media is largely about sharing; thoughts and ideas, RELATIONSHIPS emotion, news, and issues. The block that shows how the users can be related to other users. One of the most important advantages of Social media helps you maintain social media is connectivity. relationships by making it easy to It can connect innumerable users reach family and friends who live from any place at any time. far; it closes the gap created by Through social media and its distance. connectivity, the information could be shared across the world, and REPUTATION building relationships with each It characterizes the scope to which other also became easy. It leads to users can identify the standing of worldwide connections others, including themselves, in a You may have not seen someone for social media setting. a few years but newsfeed updates keep you in the loop of what is GROUPS happening in their lives. It is the block that shows the range on how users can form communities and sub communities SEVEN FUNCTIONAL (BUILDING BLOCKS OF SOCIAL MEDIA) PROMINENT SOCIAL MEDIA IDENTITY FACEBOOK This block denotes the extent to MOVE FAST AND BREAK THINGS which users reveal their identities in Zuckerberg intended for this to a social media setting. inform internal design and management processes, but it aptly CONSERVATIONS captures how entrepreneurs regard disruption: more is always better. This block describes how users is a popular free social networking communicate with other users in website that allows registered users social media settings. to create profiles, share ideas, upload photos and videos, send messages, and keep in touch with friends, family and colleagues. ICT 101 NOTES l PAGE 5 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION INSTAGRAM later become just "Broadcast CAPTURE AND SHARE THE yourself". WORLD’S MOMENTS The name “YouTube” is said to be Instagram's tagline is “Capture and derived from “You” which means you Share the World's Moments” and (from the fact that thevideo came Instagram is all about just that. from you) and “Tube” means Moments. Visual Moments. television (cathode ray tube). Instagram is an American photo and YouTube is an American online video video sharing social networking sharing and social media platform service founded by Kevin Systrom owned by Google. and Mike Krieger. In April 2012, It was launched on February 14, Facebook Inc. 2005, by Steve Chen, Chad Hurley, ○ On a normal day, there are and Jawed Karim. 80 million photos shared on It is the second most visited website, Instagram and 3.5 billion right after Google itself. likes. Every day, one hundred FIRST VIDEO ON YOUTUBE million accounts upload a ○ "ME AT THE ZOO" is the first Story on a daily basis. The video uploaded to YouTube, majority of Instagram users on April 23, 2005, 8:31:52 p.m. are between 18 and 29 years PDT, or April 24, 2005, at old. In 2017, Instagram was 03:31:52 UTC. The 19-second the most used network for video features YouTube's cyberbullying. co-founder Jawed Karim, who was 25 years old at the time, in front of two TWITTER elephants at the San Diego WE BELIEVE REAL CHANGE Zoo in California, noting their STARTS WITH CONVERSATION. long trunks. They believe in free expression and think every voice has the power to impact the world. TIKTOK Twitter is a FREE microblogging MAKE EVERY SECOND COUNT service that allows registered It is not only TikTok's slogan, but members to broadcast short posts also a crucial tip for marketers to called TWEETS. grab their audiences' attention on ○ Twitter members can the platform. broadcast tweets and follow TikTok, known in China as Douyin, is other users’ tweets by using a video-focused social networking multiple platforms and service owned by Chinese company services. Byte Dance Ltd. It hosts a variety of TWITTER’S BLUE BIRD is LARRY; short-form user videos, from genres he was named after the famous NBA like pranks, stunts, tricks, jokes, player Larry Bird. dance, and entertainment with durations from 15 seconds to three minutes. ○ It went international in 2017 YOUTUBE as TikTok; the name, BROADCAST YOURSELF. WATCH. apparently, is a play on The site slogan was "Broadcast tick-tock, onomatopoeia for yourself. Watch and share your clocks and a term for videos worldwide!", which would ICT 101 NOTES l PAGE 6 ICT 101/INFORMATION,COMPUTER, AND TECHNOLOGY 1st QUARTER l 2ND SEMESTER l B.R ASUNCION countdowns and minute-by-minute action. MOBILE SOCIAL MEDIA refers to the combination of mobile devices and social media. This is a group of mobile marketing applications that allow the creation and exchange of user-generated content. ICT 101 NOTES l PAGE 7