Sie sind auf Seite 1von 75

Netiquette

Internet + Etiquette = Netiquette


Netiquette – having good
manner and right conduct in
using or communicating via
Internet like social media.
How safe are you?
Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
6. The name of you mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
• First Name
There is a risk of sharing your first
name. Chances are, a hacker may
already know plenty of stuff about
you even if you give your first name.
Likewise, you cannot just walk in a
room and start introducing yourself
to everyone.
• Last Name
If sharing your first name is a small
risk, having both your first and last
is more risky. You will be vulnerable
to being search for using search
engines, which includes image
search. Matching a name with a
face is a modus to several
cybercrimes like identity theft.
• Middle Name
Sharing your middle name alone is
probably not the most risky of these
shared information, but sharing
your full name would be.
• Current and previous
school.
Most people who steal identities
study their subject. They can use
this information for verification
purposes.
• Your cellphone number
Your cellphone number should not
be posted over the internet. The
internet is a public place. It is the
same posting your number in a
billboard. You would not random
strangers to text you or call you, or
worse, pretend that they are
someone else.
• The name of your
father and mother
Risky, yet as not as risky as posting their
full names, especially your mother’s
maiden. In fact, you may have already
encountered many websites that
requires your mother’s maiden name as
answer to secret question whenever
you forgot your password.
• The name of your
siblings
Disclosing this is a huge risk.
Strangers may pretend or use
their identity to dupe(deceive)
you.
• Your address
Hopefully, your answered is “no”
to this one. Giving the internet
your number is one thing; giving
them your address is a whole
other level. It would be much
easier for criminals to find you.
• Your home phone number
This shared information is more
risky than sharing your personal
phone number. Scams usually
use this information to deceive
you, one of which is when a
stranger pretends to know your
parents or pretends to be you.
• Your birthday
Letting people know your
birthday is probably a must if
you want to get as many gifts as
possible. But having it in your
profile makes you vulnerable to
identity theft.
Tips to Stay Online
1. Be mindful of what you share
online and what site you share it
to.
2. Do not just accept terms and
condition; read it.
3. Check the privacy policy page of a
website to learn how the website
handles the info. you share.
Tips to Stay Online
4. Know the security features of the
social networking site you use. By
keeping your profile private, search
engines will not able to scan your
profile.
5. Do not share your password with
anyone.
Tips to Stay Online
6. Avoid logging in to public
networks/ Wi-Fi. Browsing in
“incognito (or private) mode”, a
feature of the browser, will not
protect you from hackers.
7. Do not talk to strangers whether
online or face-to-face.
Tips to Stay Online
8. Never post anything about future
vacation. It Is similar to posting “Rob
my house at this date”.
9. Add friends you know in life.
10. Avoid visiting un-trusted
websites.
11. Install and update an antivirus
software. Use only one anti-virus
software to avoid conflict.
Tips to Stay Online
12. If you have Wi-Fi at home, make it
private network by adding a password.
13. Avoid downloading anything from
untrusted websites. You are most
vulnerable in peer-to-peer
downloads(torrents) as the download is
most like not monitored by the site
owner.
Tips to Stay Online
14. Buy the software; do not use
pirated ones.
15. Do not reply or click links from
suspicious emails.
Internet Threats
1. Malware – stands for malicious
software.
a. Virus – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives.
Internet Threats
b. Worm – a malicious program
that transfer from one
computer to another by any
type of means. Often, it used a
computer network to spread
itself. For example I love you
worm created by a Filipino.
Internet Threats
c. Trojan – a malicious program
that is disguised as a useful
program but once downloaded
or installed leaves your PC
unprotected and allows
hackers to get your
information.
Internet Threats
 Rogue security software –
tricks the user into posing that
it is a security software. It tasks
the user to pay to improve
his/her security but in reality,
they are not protected at all.
Internet Threats
d. Spyware – a program that runs
in the background without you
knowing it (thus called “spy”).
It has ability to monitor what
you are currently doing and
typing through keylogging.
Internet Threats
 Keyloggers – used to record the
keystroke done by the users.
This is done to steal your
password or any other
sensitive information. It can
record e-mail, messages or any
info you type your keyboard.
Internet Threats
e. Adware – a program designed
to send you advertisement,
mostly as pop-ups.
Internet Threats
2. Spam – unwanted email mostly
from bots or advertiser. It can be
used to send malware.
3. Phishing – Its goal to acquire
sensitive personal info. like
password and credit card details.
4. Cybercrime
Internet Threats
 Phishing can be done by sending you
an email that will direct the user to
visit the website and asked to
update his/her usersname,
password, credit card info and
personal info.
 Pharming – a more complicated way
of phishing where it exploits the
DNS(Domain Name Service) system.
Think before you click
1) Before you post something on the
web, ask these questions to
yourself: Would you want your
parents or grandparents to see it?
Would you want your future boss to
see it? Once you post something on
the web, you have no control of who
sees your posts.
Think before you click
2) Your friends depend on you to
protect their reputation online.
Talk to your friends about this
serious responsibility.
3) Set your posts to “private”. In
this way search engines will not
be able to scan that post.
Think before you click
4) Avoid using names. Names are
easy for search engines to
scan.
5) If you feel that a post can
affect you or other reputation,
ask the one who posted it to
pull down or report it as
inappropriate.
Copyright Infringement
 If you create something – an
idea, an invention, a form of
literary work, or a research
you have the right as how it
should be used by others. This
is called Intellectual property.
Here are some tips that could help you
avoid copyright infringement.
1. Understand – Copyright protects
literacy works, photographs,
paintings, drawings films, music &
lyrics, choreography, and sculpture,
but generally does NOT protect
underlying facts and ideas. This
means you can express something
using your own words, but you
should give credit to the source.
Here are some tips that could help you
avoid copyright infringement.
2. Be responsible. – Even if a
material does not say that it is
copyrighted, it is a valid defense
against copyright. Be responsible
enough to know if something has
a copyright.
Here are some tips that could help you
avoid copyright infringement.
3. Be creative. – Ask yourself
whether what you are making
that came from you or
something made by somebody
else’s creativity. It is important to
add your own creative genius in
everything that will be credited
to you.
Here are some tips that could help you
avoid copyright infringement.
4. Know the law. – There are some
limitations to copyright laws. For
instance in the Philippines,
copyright last a lifetime(of the
author) plus 50 years. There are also
provisions for “fair use” which
means that an intellectual
Here are some tips that could help you
avoid copyright infringement.
4. Know the law. – property may be
used without consent as long it is used
in commentaries, research, library
archiving, teaching, and education. If
you have doubts that what you are
doing does not fall under policy of fair
use, seek permission first. “Ignorance of
the law is not an excuse”.
Online Research
Here are some tips in conducting on-line
research.
1. Have a question in mind. Focus
on a questions you want
answered. If it is a series of
questions, start with one. Never
search everything on one go.
Online Research
Here are some tips in conducting on-line
research.
2. Narrow it down. Search engine like
Google, Bing or Yahoo used several
filters to determine the most
appropriate result for you. These search
engines use your previous search history
and your geographical location and send
you the result which is the most related
to you.
Online Research
Here are some tips in conducting on-line
research.
2. Narrow it down. Try to search “weather” and
most search engine would return the weather
conditions of where you are. But if the filters
fails, you should narrow down what you are
searching for. For example, if you were look
for Tom Sawyer – the animation series you
would better use Tom Sawyer animation
rather than just Tom Sawyer.
Online Research
Here are some tips in conducting on-line
research.
3. Advanced Search. The best way
to filter information you get from
search engines is by using the
advance search. This will allow
you to filter out info. you do not
need.
SYMBOL FUNCTION

+ Finds web pages that contain all the terms


that are preceded by the + symbol.
“” Finds exact words in a phrase

() Finds or exclude web pages that contain a


group of words
AND / & Finds web pages that contain all the terms
or phrases
NOT / - Excludes web pages that contain a term or
phrase
OR / | Finds web pages that contain either of the
terms or phrases.
Online Research
Here are some tips in conducting on-line
research.
4. Look for the credible source.
Some wikis, though filled with
updated information are not a
credible source. This is due to the
fact that anyone can edit its
content.
Online Research
Here are some tips in conducting on-line
research.
5. Give credit. If you are going to
use the info. from a source for
educational purposes, give credit
to the original author of the
page.
Online Research
Format for giving credit in Bibliography.
•Name of the person or organization
(the author of the info.) Title of the
home page in italics. URL. Date last seen
•Lapiz, Adrian Harold L. “Accounting:
What you should know?”.
http://www.jargonline.com. April 13,
2015
Key Terms:
 Cybercrime – a crime committed
or assisted through the use of
Internet.
 Privacy policy – tells the user
how the website will handle its
data.
 Malwares – stands for malicious
software.
Key Terms:
 Virus – a malicious program
designed to replicate itself and
transfer from one computer to
another.
 WORM(Write Once Read Many)–
a malicious program that transfer
from one computer to another
via network.
Key Terms:
 Trojan – a malicious program
that is designed to be a useful
program but once downloaded
or installed, leaves your PCs
unprotected and allows hackers
to get your information.
Key Terms:
 Spyware – a program that runs in
the background without you
knowing it. It has the ability to
monitor what you currently doing
and typing through keylogging.
 Internet – (International Network)
also known as “Information
Superhighway”
Key Terms:
 Adware – a program designed to
send you advertisement, mostly
pop-ups.
 SPAM – unwanted email mostly
from bots or advertisers.
 Phishing – acquires sensitive
info. like passwords and credit
card details.
Key Terms:
 Pharming – a more complicated
way of phishing where it exploits
DNS system.
 Copyright– a part of the law,
wherein you have the rights to
your work, and anyone who uses
it without your consent is
punishable by law.
Key Terms:
 DNS – Domain Name Service
 Fair use – means that the
intellectual property may be
used without consent as long it
used in commentaries, criticism,
search engines, parodies, library
archiving, reports, research,
teaching and education.
Key Terms:
 Incognito – private browsing
 Copyright– states that anyone
who uses your work without
your consent is punishable by
law.
 Private post– an option to hide a
post so that search engine could
not scan it.
Key Terms:
 Wi-fi
 – Wireless Fidelity
 Keylogger – used to record
keystrokes done by the
user in keyboard
 CD – Compact Disk
END OF LESSON
Thank you for listening.
QUIZ
Identification.
1. ___________ – having good
manner and right conduct in
using or communicating via
Internet like social media.
2. ___________ – a crime
committed or assisted
through the use of Internet.
Identification.
3. __________ policy – tells
the user how the user will
handle its data.
4. Malware – stands for
____________________.
Identification.
5. _________ – a malicious program
designed to replicate itself and
transfer from one computer to
another.
6. _________ – a malicious program
that transfer from one computer
to another via network.
Identification.
7. ________ – a program designed
to send you advertisement,
mostly pop-ups.
8. ________ – unwanted email
mostly from bots or advertisers.
9. ________ – acquires sensitive
info. like passwords and credit
card details.
Identification.
10.________ – a more complicated
way of phishing where it exploits
DNS system.
11.________– a part of the law,
wherein you have the rights to
your work, and anyone who uses
it without your consent is
punishable by law.
Identification.
12._______ – means that the
intellectual property may be
used without consent as long it
used in commentaries, criticism,
search engines, parodies, library
archiving, reports, research,
teaching and education.
Identification.
13._________ – a program that runs
in the background without you
knowing it. It has the ability to
monitor what you currently
doing and typing through
keylogging.
Identification.
14._______ – a malicious program
that is designed to be a useful
program but once downloaded
or installed, leaves your PCs
unprotected and allows hackers
to get your information.
Identification.
15._______ – used to record the
keystrokes done by the user.
Answer Key
Write checked by : _______
Identification.
1. Netiquette – having good
manner and right conduct in
using or communicating via
Internet like social media.
2. Cybercrime – a crime
committed or assisted
through the use of Internet.
Identification.
3. Privacy policy – tells the
user how the user will
handle its data.
4. Malware – stands for
malicious software.
Identification.
5. Virus – a malicious program
designed to replicate itself
and transfer from one
computer to another.
6. WORM – a malicious program
that transfer from one
computer to another via
network.
Identification.
7. Adware – a program designed to
send you advertisement, mostly
pop-ups.
8. SPAM – unwanted email mostly
from bots or advertisers.
9. Phishing – acquires sensitive
info. like passwords and credit
card details.
Identification.
10.Pharming – a more complicated
way of phishing where it exploits
DNS system.
11.Copyright– a part of the law,
wherein you have the rights to
your work, and anyone who uses
it without your consent is
punishable by law.
Identification.
12.Fair Use – means that the
intellectual property may be
used without consent as long it
used in commentaries, criticism,
search engines, parodies, library
archiving, reports, research,
teaching and education.
Identification.
13.Spyware – a program that runs in
the background without you
knowing it. It has the ability to
monitor what you currently
doing and typing through
keylogging.
Identification.
14.Trojan – a malicious program
that is designed to be a useful
program but once downloaded
or installed, leaves your PCs
unprotected and allows hackers
to get your information.
Identification.
15.Keylogger – used to record the
keystrokes done by the user in
keyboard.

Das könnte Ihnen auch gefallen