Sie sind auf Seite 1von 44

Lesson 2

RULES OF NETIQUETTE
OBJECTIVES
At the end of the lesson, the learners should be able
to:
identify safety and security create campaign materials
threats when using the promoting the responsible use
internet; of social networking sites

determine the ethical ways of


handling private and public
information in the internet;
.
VIDEO #1
• https://www.youtube.com/watch?v=tKOeloKIe8Y
HOW SAFE ARE YOU?
Instruction: Put a check under shared or not shared.
Type of Information Shared Not Shared
1.First Name
2.Last Name
3.Middle Name
4.Current and Previous Schools
5.Your cellphone number
6.The name of your mother and
father
7.The name of your siblings
8.Your address
9.Your home phone number
10.Your birthday
• Is there any danger of being found by search
engines?
• So how did these things happen?
• How can search engines locate you?
VIDEO #2
• https://www.youtube.com/watch?v=MjPpG2e71Ec
ONLINE SAFETY AND SECURITY

Internet
HOW
SAFE
ARE
YOU?
1. BE MINDFUL OF WHAT YOU SHARE ONLINE
2. DO NOT JUST ACCEPT TERMS AND CONDITIONS;
READ IT.
3. CHECK OUT THE PRIVACY POLICY PAGE OF A WEBSIRE TO
LEARN HOW THE WEBSITE HANDLES INFORMATION YOU
SHARE.
4. KNOW THE SECURITY FEATURES OF THE SOCIAL
NETWORKING SITE YOU USE. BY KEEPING YOUR PROFILE
PRIVATE, SEARCH ENGINES WILL NOT BE ABLE TO SCAN
YOUR PROFILE.
5. DO NOT SHARE YOUR PASSWORD WITH ANYONE
6.AVOID LOGGING TO PROFILE NETWORKS/WI-FI.
BROWSING IN “INCOGNITO (OR PRIVATE) MODE,A FEATURE
OF THE BROWSER, WILL NOT PROTECT YOU FROM HACKERS.
7. DO NOT TALK TO STRANGERS WHETHER ONLINE OR
FACE-TO-FACE.
8. NEVER POST ANYTHING ABOUT A FUTURE VACATION. IT IS
SIMILAR TO POSTING, ROB MY HOUSE THIS DATE.”
9. ADD FRIENDS YOU KNOW IN REAL LIFE.
10. AVOID VISITING UNTRUSTED WEBSITES.
11. INSTALL AND UPDATE AN ANTIVIRUS SOFTWARE ON
YOUR COMPUTER. USE ONLY ONE ANTI-VIRUS SOFTWARE TO
AVOID CONFLICTS.
12. IF YOU HAVE A WIFI AT HOME, MAKE IT A PRIVATE
NETWORK ADDING A PASSWORD.
13. AVOID DOWNLOADING ANYTHING FROM
UNTRUSTED WEBSITES.
14. BUY A SOFTWARE; DO NOT USE PIRATED ONES.
15. DO NOT REPLY OR CLICK LINKS FROM SUSPICIOUS
EMAILS.
• Visit a social networking site and look for the
site’s privacy policy.
• Explain how the website handles their private
and public information
INTERNET THREATS
MALWARE

• Malicious Software

VIDEO # 3
HTTPS://WWW.YOUTUBE.COM/WATCH?V=N8MBZU0X2NQ
VIRUS WORM
https://www.youtube.com/watch?v=EoXJW1meAYQ

TROJAN ROGUE SECURITY SOFTWARE


SPYWARE SPAM

PHISHING PHARMING
MALWARES
• MALWARE Stands for malicious software
VIRUS – a malicious program designed to replicate itself and transfer from one computer to another
either through the Internet and local networks or data storage like flash drives and CDs.
WORM– a malicious program that transfers from one computer to another by any type of means. Often,
it uses a computer network to spread itself. For example, the ILOVEYOU worm(Love Bug Worm) created
by a Filipino.
TROJAN– a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information.
* Rogue security software - tricks the user into posing that it is a security software. It asks the user to
pay to improve his/her security but in reality, they are not protected at all.
SPYWARE– a program that runs in the background without you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging.
* Keyloggers- used to record the keystroke done by the users. This is done to steal their password or any
other sensitive information. It can record email, messages, or any information you type using your
keyboard.
ADWARE– a program designed to send you advertisements, mostly as pop-ups.
SPAM

• Unwanted email mostly from bots or advertisers. It can be used to


send malware.
PHISHING
• It goal is to acquire sensitive personal information like passwords and
credit card details. This is done by sending you an email that will direct
the user to visit a website and be asked to update his/her username,
password, credit card, or personal information.
*Pharming – a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.
CYBERBULLYING
• Cyber News Report
Form groups with three members each. Research for several news
and events related to cybercrime. Using your cellphone or any
video-recording device, report it as if you were a newscaster.
Present in 1-2 minutes recording.

Das könnte Ihnen auch gefallen