1 of 20

EMPOWERMENT TECHNOLOGY

Prepared by sir Arnold Ramos

11:11PM

2 of 20

LESSON 2: ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

Add a short description

11:11PM

3 of 20

2. Apply internet online safety, security ethics and etiquette standards and practice in the use of ICTs.

1

1. Identify what constitutes appropriate and inappropriate online behavior.

2

3

3. Discern possible deceptive information and wrongly evaluated data

OBJECTIVES

4 of 20

ONLINE SAFETY

The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets.

Behind this technology there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the ways on how to be safe and secured online

ONLINE SAFETY

5 of 20

INTERNET

RISK

6 of 20

Internet Risk

Cyberbullying

It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group.

Sexting The act of sending sexually explicit text messages, images, and videos

INTERNET

RISK

7 of 20

Back to Agenda Page

INTERNET_THREATS

8 of 20

Back to Agenda Page

    • MALWARE

Briefly elaborate on what

you want to discuss.

Malware, or “malicious software,” is an umbrella term that describes any malicious program or code that is harmful to systems.

Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device’s operations. Like the human flu, it interferes with normal functioning.

9 of 20

Back to Agenda Page

1. Virus – a malicious program that replicate itself by copying itself to another program.

2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer.

3. Worm – malicious program that copy’s itself and spreads to other computers.

4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.

5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them

TYPES OF MALWARE

10 of 20

Back to Agenda Page

6. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware.

8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed.

9. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.

11 of 20

2. Spam Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

3. Phishing A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

4. Cybercrime A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

5. Cybercrime Law A law that deals with all forms of cybercrime.

INTERNET

THREATS

12 of 20

Back to Home Page

NETIQUETTE

13 of 20

Netiquette It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.

NETIQUETTE

14 of 20

1. Remember the human.

2. Adhere to the same standards of behavior online that you follow in real life.

3. Know where you are in cyberspace.

4. Respect other people's time and bandwidth.

5. Make yourself look good online.

6. Share expert knowledge.

7. Help keep flame wars under control.

8. Respect other people's privacy.

9. Don't abuse your power.

10. Be forgiving of other people's mistakes

THE CORE RULES OF NETIQUETTE BY SETH T. ROSS

15 of 20

1. Remember the human.

Remember, your written words are read by real people, all deserving of respectful communication.

2. Adhere to the same standards of behavior online that you follow in real life.

You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace.

3. Know where you are in cyberspace.

Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another

4. Respect other people's time and bandwidth.

Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts

THE CORE RULES OF NETIQUETTE BY SETH T. ROSS

16 of 20

5. Make yourself look good online.

The quality of your writing will judge you. Keep in mind to Always check for spelling and grammar errors, know what you're talking about and state it clearly, and be pleasant and polite

6. Share expert knowledge.

share what you know! When you post a question and receive intelligent answers, share the results with others.

7. Help keep flame wars under control.

when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them

8. Respect other people's privacy.

. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? so should you respect the privacy of others

THE CORE RULES OF NETIQUETTE BY SETH T. ROSS

17 of 20

9. Don't abuse your power.

knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone

10. Be forgiving of other people's mistakes

At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide.

THE CORE RULES OF NETIQUETTE BY SETH T. ROSS

18 of 20

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

Activity 2:

Directions: Answer the following questions below. (one paragraph each)

1. How do you keep yourself safe and secure online?

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

2. Why is it important to observe netiquette online?

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

_________________________________________________________________

19 of 20

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

Back to Agenda Page

Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, etc. You may choose from any of the Core Rules of Netiquette as you baseline idea in crafting your E-Posters.

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •

Assignment

20 of 20

REFERENCES:

https://www.scribd.com/document/473021579/Empowerment-Technology-SHS-Q1-Mod1-ICT-in-the-Context-of-Global-Communication-ver3

https://www.malwarebytes.com/malware

https://www.scribd.com/embeds/471229574/content

EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •