🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

EmpTech_q1_Module2.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

12 Empowerment Technologies Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette What I Need to Know This module was designed and written to meet the needs of the grade 12 students with regard to ICT related skills. It is here to help you master the ICT for...

12 Empowerment Technologies Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette What I Need to Know This module was designed and written to meet the needs of the grade 12 students with regard to ICT related skills. It is here to help you master the ICT for Academic & Professional Purposes which aims to teach the students to communicate effectively in diverse academic and professional situations. Module 2 which is entitled, “Online Safety, Security, Ethics, and Etiquette”, aims to apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks. A connected world needs more than a network of computers and gadgets. It use the Internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational. At the end of the module, learners are expected to: 1. Explore your digital life; 2. Learn that it is important to act responsibly when carrying out relationships over digital media; 3. Will be a better user of search engines. In particular, you can be more deeply aware of search techniques that will give results that are useful for your academic and chosen career; and 4. Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks 2 What I Know Directions: Write T if the statement is true otherwise write F. Write your answer on the space provided before the number. ____1. The person who sends spam message is called spammer. ____2. Email spam is also called unknown email ____3. Phishing is a dangerous computer program that replicates itself through a network. ____4. Anti-virus can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, and allow access to computer ____5. Worm virus is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website ____6. Pharming is a major concern of many online banking and electronic commerce transactions. ____7. Regularly updated antivirus and anti-spyware can detect and delete trojan horse. ____8. Computer virus attaches itself to a host program and infect other computers. ____9. To eliminate the virus in the computer, you should install an anti-virus ____10. Always download unknown software on your computer What’s In Are you aware of what is happening on your computer system? Let’s find out! Answer the following questions below CHALLENGE QUESTIONS Do you have same password on all of your social media? How would you know if your account has been hacked? What are the signs that your computer has a virus? If your computer applications run slowly and they take longer than usual to start and if you keep getting annoying ads that are opening randomly or strange messages on my computer’s screen; These are two of the many warning signs that show your PC might suffer from malware infection. Your computer stores and provides access to a lot of sensitive and important data. Keeping this data and all of your accounts safe is a priority. Regular changing of password reduces the risk of exposure and avoids being hacked. What’s New “My media life is like a...” This statement is a simile, a literary device for comparing two unlike things. For instance, someone who does not use much media might say that her media life is like a desert, because there is little life there. Someone might say that his media life is like a track meet, because he is exhausted at the end of the day. You might be interested to know that digital media can be interchanged with more popular terms such as social media or social networking sites. At the same time, you might wonder: “What is social media’s role in your life?” Now, consider the following statement. “Instead of promoting social behavior, social media promotes disengagement, self-absorption, loneliness and sadness.” Do you agree? Now think about this: Social media or media enabled by digital tools are 24/7 and socially connected as demonstrated by popular ICT. “Watch the video “Digital Life 101,” (https://www.commonsensemedia.org/ video/modal/2078096) to better appreciate the 24/7 and social nature of digital media—a major change from the media consumption culture of the past. What is It DANGERS ON THE INTERNET MALWARE SPAM PHISHING Malware is an abbreviated term meaning “malicious software.” This software is use to gain access or damage a computer without the knowledge of the owner. There are different types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer. Types of Malware Computer Virus is a type of malicious software that when executed, it replicates itself by modifying other computer programs and inserting its own code. It spreads like a biological virus. It can be transfer by the use of removable storage media devices. Damages could be mild to severe. Computer Worm is computer program that replicates itself through a network and can be dangerous. Some worms hide or delete files, others disrupt the network function. It is usually spread through email with attachments from suspicious sources. It spreads by make use of the weaknesses in operating systems. Trojan Horse is malware fronting to perform a good task, but covertly performs undesirable function without the user’s consent with the intention of entering the computer. It could weaken or damage the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, and allow access to computer. Adware is a program that can able to send you advertisements, mostly as pop-ups. It is software that produce revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process. Spyware is computer program that is install on a personal computer to collect personal information or even take control over the computer without the knowledge of the user. It can keep an eye on what you are doing and collect information about the user’s internet habits and practices. INTERNET THREATS Email Spam AKA Junk mail. Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. The unwanted email mostly from bots or advertisers. Pharming is a threatening hacker attack on a website, which directs all traffic to that website to another fictitious website. This is use to obtain username and passwords, as well as credit cards details and financial information. Hackers use these to steal their money electronically or use the credit cards of the victims. Phishing is a deceiving practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. Hacker is a person who is an expert in entering and controling other people’s computer without authorization. Usually vandalizes the victims’ website, steals personal information, take intellectual property, and performs credit card fraud. Types of Hacker 1. ‘Black Hat’ Hackers is an individual who aim to gain unauthorized entry into a system or network to exploit them for malicious reasons. These hackers do not have any permission or authority to compromise their targets. 2. ‘Grey Hat’ Hackers make us of networks and computer systems in the way that black hats do, but do so without any malicious intent, revealing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. 3. ‘White Hat’ Hackers are known to be the good guys, working with organizations to strengthen the security of a system. A white hat has an authorization to engage the targets and to compromise them within the prescribed rules of engagement. What is It ONLINE SAFETY, SECURITY AND NETIQUETTE CHALLENGE QUESTIONS Do you think you are safe and secured online? How safe and secured do you think you are online? Online safety refers to the practices and precautions when using the internet. Online safety should be observe to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet. It is also the act of maximizing the awareness of the user for his/her personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime. TIPS TO SAFETY ONLINE  Be mindful on what you share online.  Never give any personal information about yourself over the Internet.  Do not give any banking or sensitive information on your social media  Do not just accept terms and conditions, read it.  Do not share your password with anyone.  Do not talk to strangers whether online or face-to- face.  Never post anything about a future vacation.  Add friends you know in real life.  Avoid visiting untrusted websites.  If you have WiFi at home, make it private by adding a password.  Install and update an antivirus software on your computer. Anti Virus Antivirus software is a program that are designed to detect, search and remove viruses, and other malicious software like worms, adware, spyware and more. This software helps defend your computer against malware and cybercriminals. Below are some examples of antivirus. Netiquette comes from the two word Network and Etiquette. It define as a set of rules and norms for acceptable conduct or online behavior. In an online social environment, the acceptable use of online resources is the focus on the online ethics. COMPUTER ETHICS Ten Commandments in Computer Ethics #1. You should not use a computer to harm other people. #2. You should not interfere with other people's computer work. #3. You should not snoop around in other people's files. #4. You should not use a computer to steal. #5. You should not use a computer to bear false witness. #6. You should not use or copy software for which you have not paid. #7. You should not use other people's computer resources without authorization. #8. You should not appropriate other people's intellectual output. #9. You should think about the social consequences of the program you write. #10. You should use a computer in ways that show consideration and respect. What’s More CAN YOU KEEP THIS PRIVATE? DIRECTIONS: Read and reflect each item carefully. Check (✓) the space whether you have shared or not shared these pieces of information in all your Facebook or any social media account. Type of Information Shared Not Shared Contact Number Home Address Sibling’s Name Birthday Father’s Complete Name Mother’s Complete Name Pet pictures Current School Previous School Current Location 1. From the table above, how many of this information have you shared. _________________________________________________________________________ 2. From the table above, how many of this information have you not shared. _________________________________________________________________________ 3. Based on the following answer, do you think you are safely using the internet? Why? _________________________________________________________________________ _________________________________________________________________________ _________________________________________________________________________ What I Have Learned REFLECT AND DISCUSS Direction: From the picture below, reflect and write your answer on the space provided below. “Think Before you Click” __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ __________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ What I Can Do Let’s put our learning into practice. Research on the first global computer virus that had disrupted the operations of businesses and government agencies around the world. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _______________________________________________________________________________ _ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ _______________________________________________________________________________ Assessment Direction: Read each items carefully and choose the letter of your best answer. Write your answer on the space provided before the number. 1. This person is able to enter and control other people’s computer without authorization. a. Hacker b. Scammer c. Spammer d. None of the above 2. It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer a. Email Spam b. Pharming c. Phishing d. Trojan Horse 3. A dangerous computer program replicates itself through a network. a. Computer Worm b. Pharming c. Spyware d. Trojan Horse 4. It refers to the practices and precautions when using the internet. a. Computer Virus b. Netiquette c. Online Safety d. Spam 5. It is a type of malicious software that when executed, it replicates itself by modifying other computer programs and inserting its own code. a. Computer Virus b. Netiquette c. Online Safety d. Spam 6. In computer ethics, what commandments fall in number 6? a. You should not use a computer to steal. b. You should not snoop around in other people's files. c. You should not use a computer to harm other people. d. You should not interfere with other people's computer work. 7. He is the developer of “Love bug” virus. a. Onel de Guzman b. Ella Mae Luyun c. Evgeniy Bogachev d. Sven Jaschan 8. It is a type of hacker who aim to gain unauthorized entry into a system or network to exploit them for malicious reasons. a. Black Hat b. Gray Hat c. White Hat d. None of the above 9. It is a program that are designed to detect, search and remove viruses, and other malicious software like worms, adware, spyware and more a. Anti-Virus b. Computer Virus c. Ransomeware d. Spam 10. It is a deceiving practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. a. Email Spam b. Pharming c. Phishing d. Trojan Horse Additional Activities Have you ever experience to have a virus in your computer? If yes, you might be tempted to write it all and determine the reason why you had the virus. How much damage does that virus cause? So for this activity, research for the top 8 most famous virus around the world. Discuss the software they use and how destructive it is. Write your answer on a separate word file.

Use Quizgecko on...
Browser
Browser