🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Lesson-2_Online-Safety-Security-Ethics-and-Netiquette.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Lesson 2:  online safety refers to the act of staying safe online. It is also commonly known as internet safety, e- safety and cyber safety.  Being safe online means individuals are protecting themselves and others from online harms and risks which may jeopardiz...

Lesson 2:  online safety refers to the act of staying safe online. It is also commonly known as internet safety, e- safety and cyber safety.  Being safe online means individuals are protecting themselves and others from online harms and risks which may jeopardize their personal information, lead to unsafe communications or even effect their mental health and wellbeing.  Online security refers to the protection of your digital assets and information from unauthorized access, theft, or damage. It encompasses various measures to safeguard your data, devices, and online activities. Some aspects of online security:  Data Protection: Ensuring that your personal information, such as passwords, financial details, and sensitive documents, is kept confidential and protected from unauthorized access.  Device Security: Protecting your computers, smartphones, and other devices from malware, viruses, and other malicious software. Some aspects of online security:  Network Security: Securing your internet connection and network infrastructure to prevent unauthorized access and data breaches.  Application Security: Protecting software applications and websites from vulnerabilities that could be exploited by hackers.  Social Engineering Prevention: Educating users about social engineering tactics (like phishing, Pretexting, Baiting, Quid Pro Quo, and Tailgating) and how to avoid falling victim to them.  Protecting Your Personal Information:  Strong Passwords: Use unique, complex passwords for each account. Avoid using easily guessable information like birthdays or names.  Two-Factor Authentication (2FA): Enable 2FA whenever possible. This adds an extra layer of security by requiring a code sent to your phone or email in addition to your password.  Be Cautious of Phishing: Be wary of suspicious emails, texts, or calls asking for personal information. Legitimate organizations will never ask for sensitive data via email or phone.  Protecting Your Devices  Keep Software Updated: Regularly update your operating system, antivirus software, and web browser to patch security vulnerabilities.  Avoid Public Wi-Fi: Be cautious when using public Wi-Fi networks. Avoid accessing sensitive accounts or conducting financial transactions on unsecured networks.  Use a VPN: A Virtual Private Network (VPN) can encrypt your internet traffic, making it harder for hackers to intercept your data.  Protecting Your Digital Footprint  Limit Public Information: Be cautious about what you share publicly online. Avoid posting sensitive information like your full address, date of birth, or financial details.  Privacy Settings: Regularly review and adjust the privacy settings on your social media accounts, email, and other online platforms.  Geolocation: Be mindful of sharing your location. Many apps and websites can track your location, so be cautious about enabling geolocation features.  Online Interactions  Think Before You Share: Be mindful of what you post online. Avoid sharing personal information, such as your home address or phone number.  Be Cautious of Strangers: Exercise caution when interacting with strangers online. Don't meet someone in person without verifying their identity.  Report Online Abuse: If you encounter harassment or abuse online, report it to the platform's moderators or law enforcement.  Safeguarding Your Devices  Mobile Security: Protect your mobile devices with strong passwords, biometric authentication (if available), and antivirus apps.  Device Management: Use remote device management tools to locate, lock, or wipe your device if it's lost or stolen.  Online Transactions  Secure Websites: Only conduct financial transactions on websites that use HTTPS (Hypertext Transfer Protocol Secure). Look for the padlock symbol in your browser's address bar.  Credit Card Security: Use credit cards for online purchases, as they often offer better fraud protection than debit cards.  Strong Payment Passwords: Create strong passwords for your online payment accounts and avoid using the same password for multiple accounts  Protecting Your Children Online  Parental Controls: Use parental control features on devices and internet service providers to monitor and restrict your children's online activities.  Open Communication: Talk to your children about online safety and the importance of not sharing personal information with strangers.  Educate About Cyberbullying: Teach your children how to recognize and report cyberbullying.  A Deeper Dive into Online Safety  Regularly Review Privacy Settings: Check the privacy settings on your social media accounts and adjust them to your preferences.  Back Up Your Data: Regularly back up your important files to prevent data loss in case of a cyberattack or hardware failure.  Stay Informed: Stay updated on the latest online threats and security best practices.  Ethics is a branch of philosophy that deals with the moral principles that govern human behavior.  It is concerned with questions about what is right and wrong, good and bad, and just and unjust.  Ethics can be individual, organizational, or societal.  Unspoken rules when communicating and working through the Internet  “sexting”  Cell phone history  Geotagging Be mindful of what you share online and what site you share it to. Do not just accept terms and conditions, read it Check out the privacy policy page of a website to learn how the website will handle the information you share. Know the security features of the social networking site you use. Do not share your password with anyone. Avoid logging in to public networks/Wi-Fi. Do not talk to strangers. Never post anything about a future vacation. It’s similar to posting “rob my house at this date”. Add friends you know in real life only. Avoid visiting untrusted websites. Download and update your anti-virus. Only use one anti-virus to avoid conflicts. If you have a Wi-Fi at home, make it a private network by adding a password. Avoid downloading anything from untrusted websites. Buy the software, do not pirate them. Do not reply or click links from suspicious e-mails. Copyright Fair Use Policy Proper Citations Understand Be Responsible Be creative Know the law Using Google Advance Search Looking for a credible source Name of the Person or Organization whose website it is. Title of the home page (in italics) [Title is shown in the title bar, sometimes the title is empty]. URL. When last seen. Example: Adrian Harold L. Lapiz. Oleander’s Fun Facts about Bananas.http://oleander.penz.com/random/bananal ove.htm. Viewed on September 7, 2015.

Use Quizgecko on...
Browser
Browser