Etech Lesson 2 - Online Safety- Security- Ethics and Etiquette PDF

Summary

This document provides a lesson on online safety, security, ethics, and etiquette, focusing on the risks associated with sharing personal information online. It also explores the types of online threats, such as malware, phishing, and vishing, and how to conduct safe online research.

Full Transcript

Lesson 2 ONLINE SAFETY, × SECURITY, ETHICS AND ETIQUETTE A.B Learning Objectives Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Use the internet as a t...

Lesson 2 ONLINE SAFETY, × SECURITY, ETHICS AND ETIQUETTE A.B Learning Objectives Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Use the internet as a tool for credible research and information gathering to best achieve specific class objectives or address situational LESSON OUTLINE × ONLINE SAFETY COPYRIGHT INTERNET SAFETY TIPS SEARCHING THE WEB INTERNET THREATS ONLINE RESEARCH LESSON MOTIVATION ONLINE SAFETY Online safety refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet. TYPE OF INFORMATION First Name Mothers’ and Fathers Name Last Name Siblings Middle Name Home Address Current and Previous School Home Phone Number Cellphone Number Birthday TYPE OF INFORMATION FIRST NAME There is still a risk in sharing your first name. Chances are, a hacker already knows plenty of stuff about you even if you only give out your first name. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with. TYPE OF INFORMATION LAST NAME If sharing your first name is a small risk, having both your first and last is a more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft. TYPE OF INFORMATION MIDDLE NAME Sharing just your middle name is probably not the most risky of these shared information, but sharing your entire full name would be. TYPE OF INFORMATION CURRENT AND PREVIOUS SCHOOL (S) Most people who steal identities study their subject. They can use this information for verification purposes. TYPE OF INFORMATION YOUR CELLPHONE NUMBER Your cellphone number should never be posted over the Internet. The Internet is a public place. It is the same as posting your number on a billboard. TYPE OF INFORMATION WHO YOUR MOTHER AND FATHER ARE Risky, yet not as risky as posting their full names, especially your mother's maiden name. In fact, if you have already encountered many websites that require your mother's maiden name as an answer to a secret question whenever you lose your password. TYPE OF INFORMATION WHO YOUR SIBLINGS ARE This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dupe you. TYPE OF INFORMATION YOUR ADDRESS Hopefully you answered no to this one. Giving the Internet your number is one thing, giving them your address is a whole other level. It would be much easier for criminals to find you. TYPE OF INFORMATION YOUR HOME PHONE NUMBER This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. TYPE OF INFORMATION YOUR BIRTHDAY Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. What is NETIQUETTE? It is a combination of the words network and etiquette. It is a set of rules for behaving properly online. INTERNET SAFETY TIPS Know the scams Learn about the different kinds of scam and what you do to avoid them. INTERNET SAFETY TIPS 2. Think before you click Think twice, trice and a zillion times before you click any links or buttons INTERNET SAFETY TIPS 3. Safety peruse These sites may have an address that’s very similar to a legitimate site, but the page can have misspellings, bad grammar or low resolution images. INTERNET SAFETY TIPS 4. Shop safely Don’t shop on a site unless it has the “https” and a padlock icon to the left or right of the URL. INTERNET SAFETY TIPS 5. Use Strong Password Use an extremely uncrackable one like “9&4yiw2PYqz#: INTERNET SAFETY TIPS Try this website. Example password: HELLO password would be cracked INSTANTLY INTERNET SAFETY TIPS 6. Protect your info. Keep your guard up Backup all of your data on your computer, smartphone and table, theft or a crash. INTERNET SAFETY TIPS 7. Watch your WI-FI connectivity Protect your network by changing your router’s settings and making sure that you have the connection password-protected. INTERNET SAFETY TIPS 8. Do not turn off the firewall A firewall is a grate line of defense against cyberattacks. INTERNET SAFETY TIPS 9. Keep up to date The best security updates automatically to protect your computer. Use the manufacturer’s latest security patches to make regular updates. INTERNET SAFETY TIPS 10. Use your noggin Use your COMMON SENSE while surfing the web ONLINE THREATS Malware Pharming Spam Vishing Phishing MALWARE Stands for Malicious Software It is an umbrella term that describes any malicious program or code that is harmful to systems. TYPES OF MALWARE 1.VIRUS A malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage. TYPES OF MALWARE 2.WORMS A malicious program that transfer from one computer to another by any type of means. Often, it uses computer network to spread itself. TYPES OF MALWARE 3.TROJAN A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. TYPES OF MALWARE 4.SPYWARE A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what your are currently doing and typing through keylogging. TYPES OF MALWARE 5.ADWARE A program designed to send you advertisements, mostly as pop-ups. SPAM Unwanted email mostly from bots or advertisers. It can be used to send malware. PHISHING The goal is to acquire sensitive personal information like passwords and credit card details. You click the link of the website from the email. PHARMING An online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data You click the link of the website from the search engine (Direct access to website). VISHING An online fraud that involves the use of voice calls, using either conventional phone systems or Voice over Internet Procotol (VoIP) systems. COPYRIGHT × It is a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression. COPYRIGHT × The following types of works are allowed protection under the copyright law: Inventions Literary Works Musical Works Dramatic Works Pantomimes and Choreographic Works Pictorial, Graphic, and Sculptural Works Motion Pictures and Other Audiovisual Works Sound Recordings Compilations COPYRIGHT × There are three basic requirements that a work must meet to be protected by copyright. The work must be: A Work of Original Authorship Fixed 1.Original To be original, a work must merely be independently created. 2. A Work of Authorship To qualify as a work of authorship for the purposes of copyright protection, a work must be a product of creative expression that falls under a category of copyrightable subject matter. 3.Fixed A work is considered to be fixed so long as it is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. COPYRIGHT × Who is a copyright owner? Everyone is a copyright owner. Once you create an original work and fix it, like taking a photograph, writing a poem or blog, or recording a new song, you are the author and the owner. COPYRIGHT × How long does copyright protection last? In the Philippines, copyrighted works lasts during the lifetime of the author plus 50 years after the author’s death. COPYRIGHT × What are the penalties provided by Philippine law for copyright infringement? Under Philippine law, copyright infringement is punishable by the following: Imprisonment of between 1 to 3 years and a fine of between 50,000 to 150,000 pesos for the first offense. Imprisonment of 3 years and 1 day to six years plus a fine of between 150,000 to 500,000 pesos for the second offense. Imprisonment of 6 years and 1 day to 9 years plus a fine ranging from 500,000 to 1,500,000 pesos for the third and subsequent offenses. FAIR USE × A legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee or royalty. SEARCHING THE WEB SEARCH ENGINE These are websites used for retrieval of data, files, or documents from data bases. Some search engines we use today are: ANATOMY OF URL × 1.SCHEME The scheme (also called protocol) tells web servers which protocol to use when it accesses a page on your website. 2. SUBDOMAIN A subdomain in a URL indicates which particular page of your website the web browser should serve up. 3.SECOND-LEVEL DOMAIN Your second-level domain (SLD) is the name of your website. It helps people know they’re visiting a certain brand’s site. 4.TOP-LEVEL DOMAIN The top-level domain (TLD) specifies what type of entity your organization registers as on the internet. POPULAR TOP LEVEL DOMAIN × 5.PORT The port is a number used to specify a connection endpoint and to direct data to a specific service. 6.SUBDIRECTORY A subdirectory — also known as a subfolder — helps people to understand which particular section of a webpage they’re on. 7.PATH The path specifies the location of the file or resource that the user wants to access. 8.QUERY That question mark says that a specific query is being performed and is used to precede a query string. A query string specifies the parameters of the data being asked from a website’s database. We’ll dig into parameters next. 9. PARAMETERS Parameters are the values being queried during a search. The parameter can be a number, encrypted value, search term or other data that can be found on the website. 10. FRAGMENTS Fragments are an optional component of URLs that are typically placed at the end with a hash (#). ONLINE RESEARCH a research method that involves the collection of information from the internet. TIPS IN CONDUCTING AN ONLINE RESEARCH 1. Have a question in mind -Focus on a question you want answered. If it is a series of questions, start with one. Never search everything on one go. 2. Narrow it down -Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for you. TIPS IN CONDUCTING AN ONLINE RESEARCH 3. Advanced Search -This will allow you to filter out information you do not need. 4. Look for a credible source -The source should be relevant to your research. The author and publication should be a trusted authority on the subject you are researching. TIPS IN CONDUCTING AN ONLINE RESEARCH 5. Give Credit -All materials that you have quoted (left in the author's original language) or paraphrased (put into your own words) must be cited in order to give the author/creator credit for the work and to allow readers to retrieve the information to review it.

Use Quizgecko on...
Browser
Browser