ETech Week 1 PPT 2024-2025 PDF

Summary

This presentation discusses internet ethics and safety, covering topics such as netiquette, online safety, cybercrimes, cyberbullying, and important concepts to be mindful of online.

Full Transcript

EMPOWERMENT TECHNOLOGIES God Almighty, of all beginnings and endings, we glorify You for allowing us to look at the current crisis as an opportunity to continue fostering our education. Pardon us for the times when we made fear rule over us. Thank You for assuring us that, with faith, we can make t...

EMPOWERMENT TECHNOLOGIES God Almighty, of all beginnings and endings, we glorify You for allowing us to look at the current crisis as an opportunity to continue fostering our education. Pardon us for the times when we made fear rule over us. Thank You for assuring us that, with faith, we can make things better especially for our learners. Let Your spirit renew us as we champion our journey in learning, full of wisdom, compassion, and love towards one another. AMEN. ETHICS ON THE INTERNET RULES OF NETIQUETTE Answer 1.The farmer takes the chicken over first. 2.He brings the wolf second and comes back with the chicken. 3.He drops off the chicken and takes the grain to the other side with the wolf. 4.The farmer makes one last trip to retrieve the chicken. LEARNING OBJECTIVES 1. Demonstrate understanding of concepts in internet security and ethics 2. Apply ethical standards and practices in online transactions 3. Assess instances that breach online safety, security and ethical standard. What is Netiquette? Netiquette is a made-up word from the words net and etiquette. Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette for the internet. Online Safety and Security Online Safety Refer to the maximization of internet user’s knowledge and awareness of safety protocols, online crimes, and security risk in the private property and information which are connected to the use of internet. Rules that are followed and the actions that are taken to make sure that online users and data privacy aren’t compromised by cybercriminals. A precautionary measures that user’s applies to ensure that his/her experience online does not harm him/her in any way. Cyber Crimes Social engineering In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Spear Phisher A spear phishing attack is an attempt to acquire sensitive information or access to a computer system by sending counterfeit messages that appear to be legitimate. Hacker An individual who uses computer, networking or other skills to overcome a technical problem. Anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes. Rogue Employee A rogue employee is a staff member that undermines the rules and regulations of the organization they work for. Since many businesses allow their workforce to bring their personal devices to work, employees are more tempted than ever to subvert the cybersecurity best practices set by their organizations. Ransom Artist Ransomware is a common and dangerous type of malware. It works by locking up or encrypting your files so you can no longer access them. A ransom, usually in the form of cryptocurrency, is demanded to restore. Online Crimes 1. Cyberbullying –Republic Act 10627 or The Anti-Bullying Act of 2013 defines bullying as “any severe or repeated use by one or more students of a written, verbal or electronics expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating hostile environment at school, infringing on the rights of another or materially or substantially disrupting the education process”. Any violation of this act is considered as cyberbullying. The Sec.3 of the implementing Rules of the RA 10627 states that cyberbullying “covers social bullying aiming to belittle another individual or group or gender-based bullying that humiliates another on the basis of perceived or sexual orientation, or gender identify. Forms of Cyberbullying Flaming – an online fight using electronic messages with angry and vulgar languages. Harassment – the act of repeatedly sending nasty, mean, and insulting messages Denigration – sending or posting gossip or rumors about a person to damages his or her reputation or friendships. Impersonation – when someone is pretending to be someone else and sending or posting materials to get that person in trouble or in danger. Outing – the act of sharing someone’s secrets or embarrassing information or images online. Trickery – when someone is talking to a person to let him or her reveal his/her secrets and then, shares the sensitive information online. Exclusion – when one is intentionally or cruelly excluded from an online group. Cyberstalking – the act of repeated, intense harassment and denigration that includes thre ats or creates significant fear. Online Crimes 2. Identity Theft - someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception. The deepfake application is one example of identity theft. With this application, your faces can be swapped and voices can be altered. 3. Phishing – the fraudulent practice of sending emails purporting to be from reputable company to induce individuals to reveal personal information such as passwords, OTP, and credit card number. These messages and emails can camouflage as congratulatory messages for winning. 4. Plagiarism and Copyright Infringement – “Plagiarism is presenting someone else’s work or ideas as your own with or without their consent, by incorporating it in your work without full acknowledgement. On the other hand copyright infringement when a copyrighted work is reproduced, distributed, performed, publicly displayed or made into a derivative work without the permission of the copyright owner. It covers works in literature, musical, dramatics, pantomimes and choreographies, pictorials, graphics and sculptural, motion pictures and audio-visual, and sound recordings. Internet Security Threat 1. Malware – the shortened form of malicious software. Some of the examples are computer viruses, worms, and dishonest spywares. 2. Computer Worms – these are programs that can replicate themselves from one computer to another in great volume, and can spread themselves rapidly without human interventions. 3. Spam – or unwanted messages are harmless. They are usually junk mails sent in your email, but there are times that they contains links that put you at risk. 4. Phishing – created by cybercriminals who intend to ask for private or elicit information from their victims. Internet Security Strategies 1. Browser Selection – be selective and make sure your browser are secured. Among the trusted browsers are Mozilla Firefox, Iridium, Microsoft Edge, Opera, Apple Safari, Google Chrome, Brave and Tor. 2. Email Security – established a multilayered and comprehensive email security. 3. Multifactor Authentication (MFA) – a process by which computer access is controlled by requiring several authentication mechanisms. 4. Firewalls – the first line of defense among networks. The security tools that prevent unauthorized access to a network. Online Ethics and Etiquette Generally ethics deals with what is good and bad. It is a set of moral principles that can be taken as a guiding philosophy in life. In the context of Internet use, the Markulla Center for Applied Ethics of Santa Clara University, defines ethics as “ the analysis of the role that the internet plays in what philosophers call the development of good life---- the kind of life that we want for ourselves, for society overall, the kinds of people we want to be.” This means that internet ethics maintain a space that respects and promotes the rights and humanity of its users. Internet Ethics deals with: 1. Privacy – even you are required to provide data for online transactions, or for creating online account in any social media platforms, the questions is how secure would these data be. 2. Big Data – because of the great number of internet users, big amounts of data are being collected, managed and maintained. Questions are how data are collected, from whom they are collected, for what purpose this will be used, or what exclusions are made. 3. Net Neutrality – this means that all internet providers should give equal treatment to all contents that flow in their network. 4. Access to the Internet – if internet is right, then how do we view the large portion of humanity that does not have limited access 5. to it? TIPS TO STAY SAFE ONLINE Be mindful of what you share online Do not just accept terms and conditions Check out the policy page of a website Know the security features of the social networking site you use Do not share your password Add friends you know in real life Do not reply or click links from suspicious emails Key Terms Cybercrime- a crime committed or assisted through the use of internet Privacy Policy- tells the user how the website will handle its data Copyright – a part of the law, wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law Fair use – means than an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, news reports, research and other educational activities. TANONG MO SAGOT KO! OPEN FORUM Kindly use the RAISED HAND icon to be acknowledged Performance Task Instruction: Compose a reflection paper on the nature of ICT, specifically on Internet safety and etiquette, in the context of your life, society, and professional tracks. Reflection Writing: Reflection on your learning in this lesson. Be guided by the following questions in writing your reflection. 1. What safety security issues have I encountered in my online explorations? 2. What violations have I done while online? 3. How can I improve my online security? 4. How can I be a responsible netizen? Thank you!!! The Internet is not what you think…… Think before you Click.

Use Quizgecko on...
Browser
Browser