0% found this document useful (0 votes)
46 views49 pages

Lesson Ii

This document discusses online safety, security, and rules of netiquette. It provides guidance on safe internet practices like not sharing personal information online, using strong passwords, keeping software updated, and avoiding downloading unknown files. It also explains common cyber crimes like identity theft, cyberbullying, and cyberstalking. Key terms defined include privacy policies, malware, spam, phishing, copyright, and netiquette. The document emphasizes the importance of being cautious online to protect one's privacy, security, and safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views49 pages

Lesson Ii

This document discusses online safety, security, and rules of netiquette. It provides guidance on safe internet practices like not sharing personal information online, using strong passwords, keeping software updated, and avoiding downloading unknown files. It also explains common cyber crimes like identity theft, cyberbullying, and cyberstalking. Key terms defined include privacy policies, malware, spam, phishing, copyright, and netiquette. The document emphasizes the importance of being cautious online to protect one's privacy, security, and safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

ONLINE

SAFETY,
SECURITY AND
RULES OF
NETIQUETTE
ACTIVIT
YIn a p1iec.e of paper write down your
observation on the following
images.
ONLINE
SAFETY
ONLINE
SAFETY
How many checks you have for
s h a re d ?
How many checks y o u h a ve for not
shared?
How safe are you when using
the internet?
ONLINE
SAFETY
First Name
There is still a risk in sharing your first name. chances are,
hacker already knows plenty of stuff about you even if you only
give out your first name.
Last Name
If sharing your first name has a small risk, sharing both your
first and last name is more risky.
ONLINE
SAFETY
Middle Name
Sharing your middle name is probably not the most risky of
these shared information, but sharing your entire full name
would be.

Current and Previous School


Most people who steal identities study their subject. They can
use this information for verification purposes.
ONLINE
SAFETY
Your Cell phone Number
Your cell phone number should never be posted over the internet.
The internet is a public place, it is the same as posting your
number on a billboard.
Who your Mother and Father are
Risky yet not as risky as posting their full names, especially
your Mother’s Maiden Name.
ONLINE
SAFETY
Who your siblings are
This is a huge risk especially if you have a younger
siblings.
Strangers may pretend or use their identity to dupe you.

Your address
It would be much easier for criminals to find you.
ONLINE
SAFETY
Your Home Phone Number
Scams usually use this information to deceive you, one of which
is when a stranger pretends to know your parents or pretends to
be you.
Your Birthday
Having it in your profile makes you more vulnerable to
identity theft.
ONLINE SAFETY
- it refers to the safety of people and their
information when using internet.
ONLINE
- refersSAFETY
to the practices and precautions
that should be observed when using the
internet to ensure that the users as well
as their computers and personal
information are safe from crimes
associated using the internet.
ONLINE SAFETY
MEASURES
1. Never give any personal information out
about yourself over the internet.
[Link] give any banking or sensitive
information unless you are sure that it is a
reputable business having a secure service.
3. Never open any messages or attachment
from someone you don’t know.
ONLINE SAFETY
MEASURES
[Link] check your privacy settings
in your account to make sure you are not
sharing
important personal information.
[Link] using a public computer terminal
make sure to delete your browsing data before
leaving.
ONLINE SAFETY
MEASURES
6. Keep your software updated to avoid
security holes.

[Link] not download or install software


or anything on your computer or cell phone
that
is unknown to you.
ONLINE
SECURITY
- related to not only Internet, often involving browser
security and the World Wide Web, but also network
security as it applies to other applications or operating
systems as a
whole.
SECURITY
REQUIREMENT
TRIAD
Confidentiality
Data confidentiality
 Privacy
Integrity
 Data integrity
 System integrity

Availability
Types of System Intruders
Masquerader
- Unauthorized user who penetrates a system
exploiting a legitimate user’s account
(outside).
Hackers
- Legitimate user who makes unauthorized accesses or
misuses
his privileges (inside).
Clandestine user
- Seizes supervisory control to evade auditing and
Parts of Virus
Infection mechanism
- The means by which a virus spreads, enabling
it to replicate. The mechanism is also referred
to
as the infection vector.
- This is how the virus spreads or propagates.
A virus typically has a search routine, which
Parts of Virus
Trigger
-Also known as a logic bomb, this is the compiled
version that could be activated any time within
an executable file when the virus is run that
determines the event or condition for the malicious
"payload" to be activated or delivered such as a
particular date, a particular time, particular
presence of another program, capacity of the disk
exceeding some limit, or a double-click that opens a
particular file.
Parts of Virus
Payload
-The "payload" is the actual body or data which carries
out the malicious purpose of the virus. Payload
activity might be noticeable (e.g., because it causes
the system to slow down or "freeze"), as most of the
time the "payload" itself is the harmful activity, or
sometimes non-destructive but distributive, which is
called virus hoax.
Virus Stages
Dormant Phase
-The Virus is idle.

Propagation Phase
-Virus places an identical copy of itself into other
programs or into certain system areas on the
disk.
Virus Stages
Triggering Phase
-Virus is activated to perform the function for
which it was intended.
Execution Phase
-It can be destructive such as deleting files on
disk, crashing the system, or corrupting files or
relatively harmless such as popping up humorous
or political messages on screen.
Key
1. Cyber CrimeTerms
- a crime committed or assisted through the use
of the Internet.
a. Cyber Bullying
- can work in the same way as bullying in the
playground; the victim feels frightened and
alone, while the bully tries to hide from being
caught.
Key
1. Cyber CrimeTerms

b. Cyber Stalking

- Harassment on the internet can be just as


frightening as other forms of stalking.
Key
1. Cyber CrimeTerms
c. Identity Theft
- The more information you make available online,
the greater the risk of identity theft. It can be very
tempting to reply to an email or open an
attachment or post information about yourself on
social networking sites, but you should never do
it.
Key
1. Cyber CrimeTerms

d. Sexting
- usually refers to sending and receiving rude
messages or videos of:
 naked pictures
 'underwear shots'
 any sexual texts, images or videos
Key
1. Cyber CrimeTerms

d. Sexting

- These images or videos can be sent from a


boyfriend or girlfriend or a friend or someone
you've met online. You also may have sent a
sexual photo, video or text to someone else.
Key
1. Cyber CrimeTerms
d. Sexting
Remember:
 There is no turning back once you press send.
 Even if you use apps like Snapchat the person
can take a screen shot
 You risk being seen as someone you are not.
Key
Terms
2. Privacy Policy / Terms of Service
- tells the user how the website will
handle its data.
3. Malware
-stands for malicious software variants, including
viruses, ransom ware and spyware.
Key
3. Malware Terms
a. Virus
- a malicious program designed to transfer from
one computer to another in any means
possible.
b. Worms
- a malicious program designed to replicate itself
and transfer from one file folder to another and
also
Key
3. Terms
Malware
c. Trojan
- a malicious program designed that is disguised as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to
get your information.
Key
3. Malware Terms
d. Spyware
- a program that runs in the background without
you knowing it. It has the ability to monitor what
you
are currently doing and typing through key logging.

e. Adware
- a program designed to send you advertisement,
Key
4. Spam Terms
- unwanted email mostly
from bots or advertisers.
5. Phishing
-acquires sensitive personal information like
passwords and credits card details.
Key
6. Pharming Terms
- a more complicated way of phishing
where it exploits the DNS system.
7. Copyright
- a part of law, wherein you have the rights to
work, anyone who uses it w/o your consent is
punishable by law.
Key
8. Fair use Terms
- means that an intellectual property may be
used w/o consent as long as it is used in
commentaries, criticism, parodies, research and
etc.
9. Key
Loggers
- used to record the keystrokes done by user.
This is done to steal passwords or any other
sensitive information.
Key
Terms
10. Rogue Security Software
- is a form of malicious software and internet
fraud that misleads users into believing there is a
virus on their computer, and manipulates them
into paying money for a fake malware removal
tool.
NETIQUETT
E etiquette, the do’s and don’ts of
- is network
online communication.
10 Rules of Netiquette
Rule 1: Remember the Human
You need to remember that you are talking to a
real person when you are online.
The internet brings people together who would
otherwise never meet.
Remember this saying when sending an email:
Would I say this to the person’s face.
10 Rules of Netiquette
Rule 2: Adhere to the same standard
online that you follow in real life
You need to behave the same way online that you
do in real life.
You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
You are still talking to a real person with
feelings
10 Rules of Netiquette
Rule 3: Know where you are in cyber
space

Always take a look around when you enter a new


domain when surfing the web.
Get a sense of what the discussion group is about
before you join it.
10 Rules of Netiquette
Rule 4: Respect other people’s time
and bandwidth
Remember people have other things to do
besides
read your email. You are not the center of their
world.
Keep your post and emails to minimum by
saying
what you want to say.
10 Rules of Netiquette
Rule 5: Make yourself look good online

Be polite and pleasant to everyone.

Always check your spelling and grammar before


posting.
Know what you are talking about and make sense
saying it.
10 Rules of Netiquette
Rule 6: Share expert knowledge
Ask questions online

Share what you know online.

Post the answers to your questions online because


someone may have the same question you do.
10 Rules of Netiquette
Rule 7: Helps keep flame wars under
control

Netiquette does not forgive flaming.


Netiquette does however forbid people who are
flaming to hurt discussion groups by putting
the
10 Rules of Netiquette
Rule 8: Respect other people’s privacy
Do not read other people’s mail without their
permission.
Going through other people’s things could cost
you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad
netiquette
10 Rules of Netiquette
Rule 9: Don’t abuse your power
Do not take advantage of other people just
because you have more knowledge or power than
them.
Treat others as you would want them to treat you
if the roles were reversed.
10 Rules of Netiquette
Rule 10: Be forgiving of other
people’s mistake
Do not point out mistakes to people online.
Remember that you were once the new kid on
the
block.
You still need to have a good manners even
though you are online and cannot see the person
ACTIVITY 2.
Make an ad/poster online about
“Think Before You Click”
campaign.
Post it to your FB timeline. Use
the hashtags
#EmpowermentTechnology

You might also like