UPDATED-LESSON-2-rules-of-netiquette-PART-2.pdf

Full Transcript

RULES OF NETIQUETTE EMPOWERMENT TECHNOLOGIES OBJECTIVES By the end of the lesson, you should have... identify the varying internet threats and to ensure online safety and security measures; understand proper behavior when communicating online; apply computer eth...

RULES OF NETIQUETTE EMPOWERMENT TECHNOLOGIES OBJECTIVES By the end of the lesson, you should have... identify the varying internet threats and to ensure online safety and security measures; understand proper behavior when communicating online; apply computer ethics in dealing with computer tasks; used social networking sites responsively; browsed the internet efficiently and properly through proper referencing; used proper contextualized online search and research skills; and expressed the importance of online security, safety and ethics. LESSON DISCUSSION How many hours do you spend on the internet per day? Can you live without the Internet for a week? How many aspects of your life depend on the Internet? How many times have you complained about Internet connection speed? The Internet, truly a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. TIPS TO STAY SAFE ONLINE Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. 4. Know the security features of the social networking site you use. 5. Do not share you password with anyone. 6. Avoid logging in to public networks/WIFI. Browsing in “incognito (or private) mode”, a feature of the browser, will not protect you from hackers. 7. Do not talk to strangers whether online or face to face. 8. Never post anything about your future vacation. It is similar to posting, “Rob, my house at this dat”. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. IF WEBSITE IS NOT SAFE IF WEBSITES ARE SAFE 11. Install and update an antivirus. software on your computer. use only one antivirus software to avoid conflicts. 12. If you have a WiFi at home, make it private network by adding a password. 13. Avoid downloading anything from unstrusted websites. 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious emails. INTERNET THREATS Computer Viruses - are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory and cause your computer not to function correctly. Hacker a clever or expert programmer who can gain unauthorized access to other computers. He can "hack" his way through the security levels of a computer system or network (Christensson, Hacker Definition 2006). And can vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud. INTERNET THREATS An internet threat is a threat that makes use of the World Wide Web to disperse, conceal, and update themselves with the intention of facilitating cybercrime. ONEL DE GUZMAN He created the ILOVEYOU worm THE TEN COMMANDMENTS OF COMPUTER ETHICS DEFINED BY THE COMPUTER ETHICS INSTITUTE: 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people’s computer work 3. Thou shalt not snoop around in other people’s files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not use or copy software for which you have not paid 7. Thou shalt not use other people’s computer resources without authorization 8. Thou shalt not appropriate other people’s intellectual output 9. Thou shalt think about the social consequences of the program you write 10. Thou shalt use a computer in ways that show consideration and respect QUOTE OF THE DAY “PASSWORDS ARE LIKE UNDERWARE, DON’T LET PEOPLE SEE IT, CHANGE IT VERY OFTEN, AND YOU SHOULDN’T SHARE IT WITH STRANGERS”. - CHRIS PIRILLO

Use Quizgecko on...
Browser
Browser