Online Safety, Security, Ethics and Etiquette PDF

Summary

This document discusses online safety, security, ethics, and etiquette. It includes various online threats, safety measures, and the importance of considering one's and others' reputation when using the internet. There is also a section on netiquette, internet threats, and types of malware.

Full Transcript

Online Safety, Security, Ethics and Etiquette Quarter 3 Week 1 Module 1 Lesson 2 Most Essential Learning Competencies: apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Specific Objective...

Online Safety, Security, Ethics and Etiquette Quarter 3 Week 1 Module 1 Lesson 2 Most Essential Learning Competencies: apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Specific Objectives: 1. name the various online threats; 2. identify the online safety measures; and 3. consider one’s and others’ reputation when using the Internet. Activity 1. Self-Check on Online Habits Reflect and assess yourself on your online habits. Check “Yes” or “No” on the table below. Self-Check on Online Habits YES NO I always talk to strangers on social media. Giving your password to your friends. Posting about future your vacations. Visiting unsecured websites. Ranting on social media. Posting image or video without asking permission from the owner. Online Safety and Security Is trying to be safe on the internet and is the act of maximizing a user’s awareness of personal safety and security risks to private information and property associated with using the internet, and the self protection from the computer crime. Tips on how to be safe online  Do not share your password with anyone.  Add friends you know in real life.  Do not visit untrusted websites.  Add password to your WIFI at home to make it private.  Install and update antivirus in your computer.  Do not give your personal information to anyone  Think before you click.  Never post about your future vacation. DO NOT SHARE YOUR PASSWORD WITH ANYONE. ADD FRIENDS YOU KNOW IN REAL LIFE. Cyberbullying It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions. Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group. Sexting The act of sending sexually explicit text messages, images, and videos. Internet Threats Malware – also known as Malicious Software. Types of Malware 1. Virus – a malicious program that replicate itself by copying itself to another program. 2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer. 3. Worm – malicious program that copy’s itself and spreads to other computers. Malicious email attachments or USB sticks are the most common ways for worms to get onto a computer. When a worm infects your computer, it will most likely send itself to every email account on your machine. Your email will appear innocent to the recipient until they read it and find themselves infected by the same worm. 4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker. 5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them. Phishing Phishing is a type of fraudulent behavior in its most basic form. Official looking emails impersonating a well- known source, such as a bank, are frequently sent. It is the purpose of these emails to acquire people's passwords and credit card information. Pharming Pharming is a more sophisticated form of phishing that takes advantage of the DNS system. Pharmers frequently construct web pages that look like those of a reputable company, such as an online banking log-in page. Users will then submit their credentials, assuming they are logging in to their regular service, and the pharmer will steal their credentials. Rogue Security Software This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. Keyloggers Keyloggers, which are similar to spyware, record a user's keyboard operations. The majority of keyloggers will hunt for easily identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to keylogging. Ransomware - or ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Spam Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. Cybercrime A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others. Cybercrime Law A law that deals with all forms of cybercrime. Netiquette It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. The Core Rules of Netiquette by Seth T. Ross 1.Remember the human. 2.Adhere to the same standards of behavior online that you follow in real life. 3.Know where you are in cyberspace. 4.Respect other people's time and bandwidth. 5.Make yourself look good online. 6.Share expert knowledge. 7.Help keep flame wars under control. 8.Respect other people's privacy. 9.Don't abuse your power. 10.Be forgiving of other people's mistakes.

Use Quizgecko on...
Browser
Browser