🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Copy of Empowerment Technologies_Lesson-2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Online Safety, Security, Ethics, other sensitive information. It can record email, E-TECHNOLOGY: and Etiquette messages, or any information you type using yo...

Online Safety, Security, Ethics, other sensitive information. It can record email, E-TECHNOLOGY: and Etiquette messages, or any information you type using your NETIQUETTE keyboard. Netiquette is a combination of the words: network and etiquette, and is Adware is a program designed to send you advertisements, defined as a set of rules for acceptable online behaviour. It is a network mostly as pop-ups. etiquette, the do’s and don’ts of online communication. Internet is defined as the information superhighway which means that Spam – unwanted emails mostly from bots or advertisers; can be used to anyone has access to this highway, can place information, and can grab send malwares that information. Phishing - Its goal is to acquire sensitive personal information like Online Safety and Security passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her The internet, truly, is a powerful tool. It can be used to: username, password, credit card, or personal information. promote your business Think Before You Click gain new friends Update all your devices stay in touch with the old ones Before going online make sure you have updated and patched your browser operating system, and all your apps. The regular It is also a source of entertainment through games, online communities, and updates usually include security patches. everything in between. However, the internet is also one of the most Visit secure sites dangerous places, especially if you do not know what you are doing with it. Before you purchase anything, make sure there is closed Tips to Stay Safe Online padlock on your web browser’s address bar or a URL address that begins with shttp or https. This indicates that the store is The internet is a public place and it is up to you to protect yourself. encrypted or secured. 1. Be mindful of what you share online and what site you share it Do not give away too much information to. If a website is asking for too much information, like SSN or 2. Do not just accept terms and conditions; read it. account information, leave the site until you can confirm its 3. Check out the privacy policy page of a website to learn how the legitimacy. website handles the information you share. Secure all your devices 4. Know the security features of the social networking sites you Password protects your laptop, tablet, and smart phone, and set use. By keeping your profile private, search engines will not able the timer to auto lock after a short period of time. This will make to scan your profile. it very difficult for any information to be stolen. 5. Do not share your password with anyone. Back up data 6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito While it would be horrible to lose a device, it will be a lot less (or private) mode,” a feature of the browser, will not protect you stressful if you know that you had backups of all your important from hackers. documents and files in a secure place to restore them from. 7. Do not talk to strangers whether online or face-to-face. Buy from all you know 8. Never post anything about future vacation. Credit cards are generally the safest option allowing you to 9. Add friends you know in real life. contest purchases and they usually do not hold you liable for 10. Avoid visiting untrusted website. fraudulent charges. 11. Install and update an antivirus software on your computer. Use Only use your secure Wi-Fi only one anti-virus software to avoid conflicts. Using the direct web access on your phone is safer than insecure 12. If you have a Wi-Fi at home, make it private network by adding wireless network when on your mobile device. Avoid URGENT a password. deals that arrive in unsolicited emails if there is any doubt, delete 13. Avoid downloading anything from untrusted websites. You are it. most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner. COPYRIGHT INFRINGEMENT 14. Buy the software; do not use pirated ones. 15. Do not reply or clicks links from suspicious e-mails. The copyright law includes your rights over your work, and anyone who uses it without your consent is punishable by law. This is called intellectual Internet Threats property. Malware - stands for malicious software Virus is a malicious program designed to replicate itself and Tips That Could Help You Avoid Copyright Infringement transfer one computer to another either through the Internet and 1. Understand - Copyright protects literary works, photographs, local networks or data storage like flash drives and CDs. paintings, drawings, film, music (and lyrics), choreography, and Worm is a malicious program that transfers from one computer sculptures, but it generally does NOT protect underlying ideas to another by any type of means. Often, it uses a computer and facts. This means you can express something using your network to spread itself. own words, but you should give credit to the source. Trojan is a malicious program that is disguised as a useful 2. Be Responsible - Even if a material does not say that it is program but once downloaded or installed, leaves your PC copyrighted, it is not a valid defense against copyright. Be unprotected and allows hackers to get your information responsible enough to know if something has copyright. o Rogue Security Software - A form of malicious 3. Be Creative - Ask yourself whether what you are making is software and Internet fraud that misleads users into something that came from you or something made from believing there is a virus on their computer, and somebody else’s creativity. It is important to add your own manipulates them into paying money for a fake creative genius in everything that will be credit to you. malware removal tool (that actually introduces 4. Know the Law - There are some limitations to copyright laws. malware to the computer). For instance, in the Philippines, copyrights only last a lifetime (of Spyware is a program that runs in the background without you the author) plus 50 years. There are also provisions for “fair use” knowing it (thus called “spy”). It has the ability to monitor what which mean an intellectual property may be used without you are currently doing and typing through keylogging. consent as long as it in commentaries, news reports, research, o Keyloggers - used to record the keystroke done by etc. if you have doubts that you are doing does not fall under the the users. This is done to steal their password or any policy of fair use, seek permission first.

Use Quizgecko on...
Browser
Browser