EMPOWERMENT TECHNOLOGY
Prepared by sir Arnold Ramos
11:11PM
LESSON 2: ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
Add a short description
11:11PM
2. Apply internet online safety, security ethics and etiquette standards and practice in the use of ICTs.
1
1. Identify what constitutes appropriate and inappropriate online behavior.
2
3
3. Discern possible deceptive information and wrongly evaluated data
OBJECTIVES
ONLINE SAFETY
The importance of internet plays a crucial part in human development. Life becomes easy and comfortable because of this technology. Most of us are connected to the internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets.
Behind this technology there is a risk that everyone should be aware of. You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet. We need to keep ourselves safe and secure whenever we use the internet. That is why it is very important to know and learn the ways on how to be safe and secured online
ONLINE SAFETY
INTERNET
RISK
Internet Risk
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.
Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group.
Sexting The act of sending sexually explicit text messages, images, and videos
INTERNET
RISK
Back to Agenda Page
INTERNET_THREATS
Back to Agenda Page
Briefly elaborate on what
you want to discuss.
Malware, or “malicious software,” is an umbrella term that describes any malicious program or code that is harmful to systems.
Hostile, intrusive, and intentionally nasty, malware seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device’s operations. Like the human flu, it interferes with normal functioning.
Back to Agenda Page
1. Virus – a malicious program that replicate itself by copying itself to another program.
2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other computers.
4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them
TYPES OF MALWARE
Back to Agenda Page
6. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
2. Spam Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
3. Phishing A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
4. Cybercrime A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
5. Cybercrime Law A law that deals with all forms of cybercrime.
INTERNET
THREATS
Back to Home Page
NETIQUETTE
Netiquette It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
NETIQUETTE
1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes
THE CORE RULES OF NETIQUETTE BY SETH T. ROSS
1. Remember the human.
Remember, your written words are read by real people, all deserving of respectful communication.
2. Adhere to the same standards of behavior online that you follow in real life.
You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace.
3. Know where you are in cyberspace.
Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another
4. Respect other people's time and bandwidth.
Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts
THE CORE RULES OF NETIQUETTE BY SETH T. ROSS
5. Make yourself look good online.
The quality of your writing will judge you. Keep in mind to Always check for spelling and grammar errors, know what you're talking about and state it clearly, and be pleasant and polite
6. Share expert knowledge.
share what you know! When you post a question and receive intelligent answers, share the results with others.
7. Help keep flame wars under control.
when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them
8. Respect other people's privacy.
. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? so should you respect the privacy of others
THE CORE RULES OF NETIQUETTE BY SETH T. ROSS
9. Don't abuse your power.
knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone
10. Be forgiving of other people's mistakes
At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide.
THE CORE RULES OF NETIQUETTE BY SETH T. ROSS
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
Activity 2:
Directions: Answer the following questions below. (one paragraph each)
1. How do you keep yourself safe and secure online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. Why is it important to observe netiquette online?
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
Back to Agenda Page
Create a poster showing the Netiquette rules with examples of how you can use them in your daily life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, etc. You may choose from any of the Core Rules of Netiquette as you baseline idea in crafting your E-Posters.
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •
Assignment
REFERENCES:
https://www.scribd.com/document/473021579/Empowerment-Technology-SHS-Q1-Mod1-ICT-in-the-Context-of-Global-Communication-ver3
https://www.malwarebytes.com/malware
https://www.scribd.com/embeds/471229574/content
EMPOWERMENT • TECHNOLOGY • EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •EMPOWERMENT • TECHNOLOGY •