Netiquette – having good manner and right conduct in using or communicating via Internet like social media. How safe are you? Type of Information Shared Not Shared 1. First Name 2. Last Name 3. Middle Name 4. Current and previous school(s) 5. Your cellphone number 6. The name of you mother and father 7. The name of your siblings 8. Your address 9. Your home phone number 10. Your birthday • First Name There is a risk of sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you give your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. • Last Name If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being search for using search engines, which includes image search. Matching a name with a face is a modus to several cybercrimes like identity theft. • Middle Name Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be. • Current and previous school. Most people who steal identities study their subject. They can use this information for verification purposes. • Your cellphone number Your cellphone number should not be posted over the internet. The internet is a public place. It is the same posting your number in a billboard. You would not random strangers to text you or call you, or worse, pretend that they are someone else. • The name of your father and mother Risky, yet as not as risky as posting their full names, especially your mother’s maiden. In fact, you may have already encountered many websites that requires your mother’s maiden name as answer to secret question whenever you forgot your password. • The name of your siblings Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe(deceive) you. • Your address Hopefully, your answered is “no” to this one. Giving the internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you. • Your home phone number This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. • Your birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft. Tips to Stay Online 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and condition; read it. 3. Check the privacy policy page of a website to learn how the website handles the info. you share. Tips to Stay Online 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not able to scan your profile. 5. Do not share your password with anyone. Tips to Stay Online 6. Avoid logging in to public networks/ Wi-Fi. Browsing in “incognito (or private) mode”, a feature of the browser, will not protect you from hackers. 7. Do not talk to strangers whether online or face-to-face. Tips to Stay Online 8. Never post anything about future vacation. It Is similar to posting “Rob my house at this date”. 9. Add friends you know in life. 10. Avoid visiting un-trusted websites. 11. Install and update an antivirus software. Use only one anti-virus software to avoid conflict. Tips to Stay Online 12. If you have Wi-Fi at home, make it private network by adding a password. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads(torrents) as the download is most like not monitored by the site owner. Tips to Stay Online 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious emails. Internet Threats 1. Malware – stands for malicious software. a. Virus – a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives. Internet Threats b. Worm – a malicious program that transfer from one computer to another by any type of means. Often, it used a computer network to spread itself. For example I love you worm created by a Filipino. Internet Threats c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed leaves your PC unprotected and allows hackers to get your information. Internet Threats Rogue security software – tricks the user into posing that it is a security software. It tasks the user to pay to improve his/her security but in reality, they are not protected at all. Internet Threats d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has ability to monitor what you are currently doing and typing through keylogging. Internet Threats Keyloggers – used to record the keystroke done by the users. This is done to steal your password or any other sensitive information. It can record e-mail, messages or any info you type your keyboard. Internet Threats e. Adware – a program designed to send you advertisement, mostly as pop-ups. Internet Threats 2. Spam – unwanted email mostly from bots or advertiser. It can be used to send malware. 3. Phishing – Its goal to acquire sensitive personal info. like password and credit card details. 4. Cybercrime Internet Threats Phishing can be done by sending you an email that will direct the user to visit the website and asked to update his/her usersname, password, credit card info and personal info. Pharming – a more complicated way of phishing where it exploits the DNS(Domain Name Service) system. Think before you click 1) Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. Think before you click 2) Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3) Set your posts to “private”. In this way search engines will not be able to scan that post. Think before you click 4) Avoid using names. Names are easy for search engines to scan. 5) If you feel that a post can affect you or other reputation, ask the one who posted it to pull down or report it as inappropriate. Copyright Infringement If you create something – an idea, an invention, a form of literary work, or a research you have the right as how it should be used by others. This is called Intellectual property. Here are some tips that could help you avoid copyright infringement. 1. Understand – Copyright protects literacy works, photographs, paintings, drawings films, music & lyrics, choreography, and sculpture, but generally does NOT protect underlying facts and ideas. This means you can express something using your own words, but you should give credit to the source. Here are some tips that could help you avoid copyright infringement. 2. Be responsible. – Even if a material does not say that it is copyrighted, it is a valid defense against copyright. Be responsible enough to know if something has a copyright. Here are some tips that could help you avoid copyright infringement. 3. Be creative. – Ask yourself whether what you are making that came from you or something made by somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you. Here are some tips that could help you avoid copyright infringement. 4. Know the law. – There are some limitations to copyright laws. For instance in the Philippines, copyright last a lifetime(of the author) plus 50 years. There are also provisions for “fair use” which means that an intellectual Here are some tips that could help you avoid copyright infringement. 4. Know the law. – property may be used without consent as long it is used in commentaries, research, library archiving, teaching, and education. If you have doubts that what you are doing does not fall under policy of fair use, seek permission first. “Ignorance of the law is not an excuse”. Online Research Here are some tips in conducting on-line research. 1. Have a question in mind. Focus on a questions you want answered. If it is a series of questions, start with one. Never search everything on one go. Online Research Here are some tips in conducting on-line research. 2. Narrow it down. Search engine like Google, Bing or Yahoo used several filters to determine the most appropriate result for you. These search engines use your previous search history and your geographical location and send you the result which is the most related to you. Online Research Here are some tips in conducting on-line research. 2. Narrow it down. Try to search “weather” and most search engine would return the weather conditions of where you are. But if the filters fails, you should narrow down what you are searching for. For example, if you were look for Tom Sawyer – the animation series you would better use Tom Sawyer animation rather than just Tom Sawyer. Online Research Here are some tips in conducting on-line research. 3. Advanced Search. The best way to filter information you get from search engines is by using the advance search. This will allow you to filter out info. you do not need. SYMBOL FUNCTION
+ Finds web pages that contain all the terms
that are preceded by the + symbol. “” Finds exact words in a phrase
() Finds or exclude web pages that contain a
group of words AND / & Finds web pages that contain all the terms or phrases NOT / - Excludes web pages that contain a term or phrase OR / | Finds web pages that contain either of the terms or phrases. Online Research Here are some tips in conducting on-line research. 4. Look for the credible source. Some wikis, though filled with updated information are not a credible source. This is due to the fact that anyone can edit its content. Online Research Here are some tips in conducting on-line research. 5. Give credit. If you are going to use the info. from a source for educational purposes, give credit to the original author of the page. Online Research Format for giving credit in Bibliography. •Name of the person or organization (the author of the info.) Title of the home page in italics. URL. Date last seen •Lapiz, Adrian Harold L. “Accounting: What you should know?”. http://www.jargonline.com. April 13, 2015 Key Terms: Cybercrime – a crime committed or assisted through the use of Internet. Privacy policy – tells the user how the website will handle its data. Malwares – stands for malicious software. Key Terms: Virus – a malicious program designed to replicate itself and transfer from one computer to another. WORM(Write Once Read Many)– a malicious program that transfer from one computer to another via network. Key Terms: Trojan – a malicious program that is designed to be a useful program but once downloaded or installed, leaves your PCs unprotected and allows hackers to get your information. Key Terms: Spyware – a program that runs in the background without you knowing it. It has the ability to monitor what you currently doing and typing through keylogging. Internet – (International Network) also known as “Information Superhighway” Key Terms: Adware – a program designed to send you advertisement, mostly pop-ups. SPAM – unwanted email mostly from bots or advertisers. Phishing – acquires sensitive info. like passwords and credit card details. Key Terms: Pharming – a more complicated way of phishing where it exploits DNS system. Copyright– a part of the law, wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law. Key Terms: DNS – Domain Name Service Fair use – means that the intellectual property may be used without consent as long it used in commentaries, criticism, search engines, parodies, library archiving, reports, research, teaching and education. Key Terms: Incognito – private browsing Copyright– states that anyone who uses your work without your consent is punishable by law. Private post– an option to hide a post so that search engine could not scan it. Key Terms: Wi-fi – Wireless Fidelity Keylogger – used to record keystrokes done by the user in keyboard CD – Compact Disk END OF LESSON Thank you for listening. QUIZ Identification. 1. ___________ – having good manner and right conduct in using or communicating via Internet like social media. 2. ___________ – a crime committed or assisted through the use of Internet. Identification. 3. __________ policy – tells the user how the user will handle its data. 4. Malware – stands for ____________________. Identification. 5. _________ – a malicious program designed to replicate itself and transfer from one computer to another. 6. _________ – a malicious program that transfer from one computer to another via network. Identification. 7. ________ – a program designed to send you advertisement, mostly pop-ups. 8. ________ – unwanted email mostly from bots or advertisers. 9. ________ – acquires sensitive info. like passwords and credit card details. Identification. 10.________ – a more complicated way of phishing where it exploits DNS system. 11.________– a part of the law, wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law. Identification. 12._______ – means that the intellectual property may be used without consent as long it used in commentaries, criticism, search engines, parodies, library archiving, reports, research, teaching and education. Identification. 13._________ – a program that runs in the background without you knowing it. It has the ability to monitor what you currently doing and typing through keylogging. Identification. 14._______ – a malicious program that is designed to be a useful program but once downloaded or installed, leaves your PCs unprotected and allows hackers to get your information. Identification. 15._______ – used to record the keystrokes done by the user. Answer Key Write checked by : _______ Identification. 1. Netiquette – having good manner and right conduct in using or communicating via Internet like social media. 2. Cybercrime – a crime committed or assisted through the use of Internet. Identification. 3. Privacy policy – tells the user how the user will handle its data. 4. Malware – stands for malicious software. Identification. 5. Virus – a malicious program designed to replicate itself and transfer from one computer to another. 6. WORM – a malicious program that transfer from one computer to another via network. Identification. 7. Adware – a program designed to send you advertisement, mostly pop-ups. 8. SPAM – unwanted email mostly from bots or advertisers. 9. Phishing – acquires sensitive info. like passwords and credit card details. Identification. 10.Pharming – a more complicated way of phishing where it exploits DNS system. 11.Copyright– a part of the law, wherein you have the rights to your work, and anyone who uses it without your consent is punishable by law. Identification. 12.Fair Use – means that the intellectual property may be used without consent as long it used in commentaries, criticism, search engines, parodies, library archiving, reports, research, teaching and education. Identification. 13.Spyware – a program that runs in the background without you knowing it. It has the ability to monitor what you currently doing and typing through keylogging. Identification. 14.Trojan – a malicious program that is designed to be a useful program but once downloaded or installed, leaves your PCs unprotected and allows hackers to get your information. Identification. 15.Keylogger – used to record the keystrokes done by the user in keyboard.