Rules of Netiquette PDF
Document Details
Uploaded by GoldenRetinalite8206
Philtech Institute of Arts and Technology
Tags
Related
Summary
This document provides guidelines for online safety and netiquette. The document details important tips for avoiding common internet threats, and explains the necessity for responsible online behavior. The document also includes a glossary of some common online threats such as malware and spam.
Full Transcript
Rules of netiquette EMPOWERMENT TECHNOLOGY Why Manners Matter for Online Learning LESSON OUTCOME IDENTIFY WHAT IS/ARE ; Online security ,safety and ethics Internet threats Protecting reputation online Copyright Contextualized online search an...
Rules of netiquette EMPOWERMENT TECHNOLOGY Why Manners Matter for Online Learning LESSON OUTCOME IDENTIFY WHAT IS/ARE ; Online security ,safety and ethics Internet threats Protecting reputation online Copyright Contextualized online search and research skills “Knowledge will give you power, but character will give you respect.” - BRUCE LEE Respect is a two-way At the end of the lesson, the students will be able to: Understand better the 24/7, social nature of digital media; GOAL OF THIS Explore your digital life; and LESSON Learn that it is important to act responsibly when carrying out relationships over digital media. WHAT IS NETIQUETTE? Netiquette is short for As teenagers, you are all exposed to many things powered by the "Internet etiquette.“ internet. because of this, do you not think that it is also important to wield It is a set of rules on this powerful tool properly? behaving properly online ONLINE SAFETY AND SECURITY The internet is truly a powerful tool. But like most things in this world there is always the “other side of the coin”: the internet is one of the most dangerous places, especially if you do not know what you are doing with it. Tips to stay safe online To avoid being a victim of internet hackers Tip 1: Be mindful of what you share online and what sites you share it to. Tip 2: do not just accept terms and conditions, read it. Tip 3: Check out the privacy policy page of a website to learn how the website handles Tip 4: Know the security features of the social networking sites you use. By keeping your profile private, search engines will not be able to scan your profile. Tip 5: Do not share your password with anyone Tip 6: Do not talk to strangers, Tip 7: Avoid logging into public networks/Wi-Fi. Browsing “incognito”(or private mode) a feature of the browser, will not protect you from hackers. Tip 8: Never post anything about a future vacation. Tip 9: Add friends you know in Tip 10: If you have a Wi-Fi at home, make it a private network by adding a password Tip 11: Install and update an antivirus software on your computer. Tip 12: Avoid visiting untrusted Tip 13: Avoid downloading anything from untrusted websites Tip 14: Buy the software, do not use pirated ones. Tip 15: do not reply or click links from suspicious emails. INTERNE T THREATS 1. malware Malware - stands for malicious software Types of malware Types of malware Virus - a malicious program designed to replicate itself and transfers from one computer to another Worm - a malicious program that transfers from one computer to another by any type of means it uses a computer network to spread itself Types of malware Trojan- a malicious program that disguised as a useful program Rogue Security Software - tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality they are not protected at all. Types of Adwaremalware - a program designed to send you advertisements, mostly as pop-ups Spyware - software that enables a user to obtain covert information about another's computer activities. Runs in the background and monitors what you are doing. 2. spam SPAM - unwanted email mostly from bots or advertisers, it can be used to send malware. Types of spam Types of spam Phishing - its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information Types of spam Pharming - a more complicated way of phishing where it exploits the DNS (domain name service) system THINK BEFORE YOU CLICK 1. Before you post something on the web, ask these question to your self: would you want your parents or grandparents to see it? Once you post something on the web, you have no control of who sees your post. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. THINK BEFORE YOU CLICK 3. Set your post to “private” in this way, search engines will not be able to scan that post. 4. Avoid using names, names are easy for search engines to scan. 5. If you feel that a post can affect you or other`s reputation, ask the one who posted it to pull it down or report it as inappropriate. 1. Pressured (dared by friends or boyfriend) 2. Low self esteem (in a twisted Why do young sense, young people do believe in people engage in portrayals of beauty in social media) sexting? 3. Seeking validation, affirmation and love (young people do sexting because they want to find or keep love.) Netiquette Explained LESSON SUMMARY Netiquette Explained LESSON SUMMARY Most teenagers spend their time online. It is vital to consider what information you share because the internet is a public place. There are several ways to stay safe online and it is essential that we know and apply them Several internet threats include malwares, spams, and phishing. Malwares could be in the form of a viral, worm, trojan, spyware, or adware. We are responsible of what we post online. It is also our responsibility to protect other’s reputation. We should be mindful of what we post when others are involved Copyright laws protect the authors or producers of literary works , photographs, paintings, drawings, films, music, choreography, and sculptures from having their work used without their permission. It is important for everyone to understand the laws to avoid being sanctioned When researching online, remember to narrow down your topic. Use advanced search features. Look for a credible source and cite your references. “Knowledge will give you power, but character respect.” - BRUCE LEE EVALUATION EVALUATION I. Word Pool DIRECTION : Select the word from the box below that correspond to your answer. EVALUATION DIRECTION : Select the word from the box below that correspond to your answer. 1. Internet threats that is designed to send you MALWARE advertisement. INCOGNITO 2. A send of a continuous email. TROJAN 3.A browser feature that is synonymous to "private PHARMING browsing”. NETIQUETTES VIRUS 4. Replicates and can transfer from one computer to ADWARE another SPAM 5. Exploits the DNS system PHISHING EVALUATION DIRECTION : Select the word from the box below that correspond to your answer. MALWARE 6. Runs in the background and monitors what INCOGNITO you are doing TROJAN 7. Disguised as a useful program but is not PHARMING 8. It a set of rules on behaving properly online NETIQUETTES 9. Stands for a malicious software VIRUS 10. a malicious program that transfers from one ADWARE SPAM computer to another. PHISHING EVALUATION II. Enumeration 11-13. (3) Types of Malware 14-15. (2) Types of Spam 16-20. Give atleast (5) tips to stay safe online