Sie sind auf Seite 1von 67

Lesson2

Rules of
Netiquett
By: ML Baloro
SHS Teacher
Reference: EMPOWERMENT Technologies
e
Innovative Training Work, Inc. First Edition
Objective
:
1. Consider one’s and others’ safety
when sharing information using the
internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determined how to avoid
the dangers of the internet
4. Be responsible in the use of
social networking sites
Protecting
reputation
s online
Interne
Copyright
t
Threats

Contextualize
Online
Security, safety
Rules of d online
Netiquett search and
and ethics
e research skills
Pre-
test
Write YES if you agree with the statement and NO
if you disagree.
1. My computer has an antivirus so it is okay to
open most e-mail attachments like e-cards and
video files.
2. Your friend told you that this college application
was rejected due to the fact that you posted a
video of him doing crazy stuff at a party. You
posted the video several years ago but later took
it down to protect your friend’s reputation. Can
your friend be right that the college found the
video?
3. You and your best friend play a lot of
video games. One time, she asks you for
your password so she can help you level
up and get in-game money. She promises
to keep your password a secret. Is it okay
to give away your password?
4. You received an email stating that your
mother’s bank account is going to be
forfeited if you do not respond to the
email. Is it safe to reply?
5. You forgot that your essay for English class
is due tomorrow. While doing your
research, you found a website offering free
essays. Is it okay to use the essay from this
free essay website?
6. A virus is a malware that multiplies and
infects other computers through flash
drives.
7. Keyloggers are software that show pop-
up ads even if you are not using your
browser.
8. Search engines scan websites for
search results even if you have set
your post to “private”.
9.There is a danger in posting
information about a future vacation.
10.Letting people know your birthday is
probably a must if you want to get as many
gifts as possible. But having it in your
profile makes you vulnerable to identify
the theft.
10 best rules of
netiquette
The Golden Rule No FLAMING
Don’t type in ALL CAPS Don’t SPAM (it is any
( Treat others as you (Flame is a personal ( people may unsolicited e-mail from
would like to be insult communicated misinterpret) unknown sources)
treated) through the internet

Don’t talk with people Use proper Grammar BE HONEST / Be


Obey Copyright Laws
you do not know ( do and Spelling yourself
not arrange to meet (Don’t steal someone
(errors diminishes the (tell the truth, do not
anyone you meet else’s idea, property
credibility of the pretend to be someone
online) and rights)
message else)

Follow the TOS SHOP SECURE SITES


(TOS- Term of Service) (These are sites with
transport layer security
(Rules and policy of (TLS or SLS Socket
the sites Layer Security
Lesson 2
Netiquette: Rules of
Behavior on the Internet.
The etiquette guidelines that
govern behavior when
communicating on
netiquette. the
Internet
Covers have become
Netiquette
not onlyof behavior
known
rules asduring but also
discussions
reflect theguidelines that
unique electronic
nature of
Jul 24,
Rules of
1.Netiquette
Online
Security,
Safety and Ethics
2. Internet
Threats
3. Protecting
Reputations Online
4. Copyright
Remember
the human

You need to remember that you are talking to a


real person when you are online.
The internet brings people together who would
otherwise never meet.
Remember this sayingwhen sending an
email: WouldI say
email: Would I say this to the person’s face.
Adhere to the same standards online that
you follow in real life

You need to behave the same way online


that you do in
real life.
You need to remember that you can get
caught doing
things you should not be doing online just
like you can in
real life.
Know
where you
are
in
Always take a look around
cyberspac
e
when you enter a new domain
when surfing the web.
Get a sense of what the
Respect other people’s time and
bandwidth

Remember people have


other things to do
besides read
your email. You are not the center of
their world.
Make
yourself
look
good
Remember to always
online
check your
spelling and grammar
before posting.
Always know
Share expert
knowledge

Ask questions online


Share what you know
online. Postthe questions
online
answers to your may have the
because someone
same question
Help keep
flame
wars
under
control
Netiquette does not forbid
flaming. Netiquette does
however forbid people who
Respect
other
people’s
Do not read other privacy without
people’s mail their
permission.
Going through otherpeople’s things
could cost you, your job or things or
you could even go to jail.
Not respecting otherpeople’s privacy
Don’t abuse your
power

Do not take advantage of other


people just because you have
more knowledge or power than
them.
Treat others as you would want
Be forgiving of other
people’s mistakes

Do not point out mistakes to people


online. Remember that you were once
the new kid on the block.
You still need to have good manners
even though
you are online and can not see the
Online
Security,
Safety,
Ethics, and
Etiquette
Prepared by: Mark Jhon Oxillo
Are you Safe
and Secured
online?
How Safe
and Secured
are you
online?
Online Safety and
Security
What is internet
Safety?
-It refers to the
online security or
safety of people
and their
information when
using the internet.
Internet is defined as the
information superhighway.
This means that anyone
has access to this
highway, can place info,
and can grab that info.
Types of Information with Risk:
 Mother’s and Father’s name
 Sibling’s Name
 Address
 Home Phone Number
 Birthday
 Email Address
Types of Information with Risk:
 First Name
 Last Name
 Middle Name
 Current and Previous
School
 Cellphone Number
Some Tips to Stay Safe Online:
 Be mindful on what you
share online.
 Do not just accept terms and
conditions, read it.
 Do not share your password
with anyone.
Some Tips to Stay Safe Online:
Do not talk to strangers
whether online or face-to-
face.
Never post anything about a
future vacation.
Add friends you know in real
life.
Some Tips to Stay Safe Online:
Avoid visiting untrusted
websites.
If you have WiFi at home,
make it private by adding a
password.
Some Tips to Stay Safe Online:
Install and update an
antivirus software on your
computer.
Some Antivirus:
BitDefender
Some Antivirus:
ESET NOD32
Some
Antivirus
F-Secure
:
Some Antivirus:
Kaspersky
Some Antivirus:
Norton
Some Antivirus:
AVAST
Some
Antivirus
SMADA
:
V
Some
Tips to
 Avoid downloading anything
Stay Safe
from untrusted websites.
Online:
 Buy the software, do not use
pirated ones.
 Do not reply or click links
from suspicious emails.
Internet Threats
Internet
1. MalwareThreats:
– stands for
malicious software.

5 Types of Malware:

a. Virus – a malicious program


designed to replicate itself and
transfer from one computer to
another (internet, local networks,
FDs, CDs, etc.)
Internet
Threats:
5 Types of Malware:
b. Worm – a malicious
program that transfers
from one computer to
another by any types of
means. Ex. ILOVEYOU
Worm
Internet Threats:
5 Types of Malware:

c. Trojan – a malicious program


that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
Internet Threats:
5 Types of Malware:

d. Spyware – a program that


runs in the background without
you knowing it (thus called
“spy”). It has the ability to
monitor what you are currently
doing and typing through
keylogging.
Internet
Threats:
5 Types of Malware:

e. Adware – a program
designed to send you
advertisements, mostly as
pop-ups.
Internet
Threats:
2. Spam – an unwanted email
mostly from bots or
advertisers. It can be used to
send malware.
Internet Threats:
3. Phishing – an
unwanted
acquisition of
sensitive personal
information like
passwords and
credit card details.
Internet
Threats:
4. Botnet – group
of compromised
computer
connected to a
network
("zombie")
Internet
Threats:
5. Denial of Service Attack -
disrupts computer access to internet services
online
Think
before
you click!
HTTPS - "Hyper-Text Transfer
Protocol Secure"
TYPE OF INFORMATION RISKS

1. First Name There is a risk in sharing your first name, Chances are ,
a hacker may already know plenty of stuff about you
even if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both
your first and last is more risky. Matching a name with
a face is a modus to several cybercrimes' like identity
theft
3. Middle Name Sharing your middle name is probably not the most
risky of these shared information, but sharing your full
name would be.
4. Current and Most people who steal identities study their subject.
previous school/s They can use this information for verification purposes.
5. Your cell You cell phone number should never be posted over
phone number the internet.
Internet
Threats

1. Malware – What it is good for?


Stands for a. Steal
malicious personal
software. information
- is a set of b. Delete files
instructions that run c. Click fraud
on you computer and d. Steal software
make your system do serial numbers
something that an e. Use your
attacker wants it to do. computer as relay
Different Kinds of
Malware
Keyloggers

Virus Worm Trojan Spyware Adware

Rogue
security

software
Viru
s
- A computer virus is a piece of malicious
computer code that attaches itself to a
software program, email or computer
file without your permission.
- It can transfers through the internet and
local networks or data storage like flash
drives and CD’s
Rogue security software- tricks
the user into posting that is a
security software. It asks the user
to pay to improve hi/her security
but in reality that are not
protected at all.

Wor
Trojan m program
A malicious
A malicious program Spread to that transfers from one
that is disguised as other computer to another
a useful program compute
by any type of means.
but once rs
It uses computer
downloaded or network to spread
installed, leaves itself.
your PC
Ex. ILOVEYOU worm
unprotected and
allows hackers to Love Bug Worm
get your created
information. by Filipino
Spyware

- A program that runs in the background


without you knowing it. It has the ability to
monitor what you are currently doing and
typing through keylogging.
Keyloggers- used to record the keystroke
done by the user. This is done to steal their
password or any other sensitive information. It
can record email, messages or any information
you type using your keyboard.
Adwar
e
A program designed to send
your advertisement, mostly as
pop-ups

SPAM- Refers to the


transmission of unsolicited
messages from various
origins using electric
messaging systems
EXAMPL
E
* Pharming – a more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system

Phishing – is a software or a
program used by an attacker
to obtain personal
information.
- It targets the
passwords to hack and
take control of a user
account..
How to avoid these
threats?
A very effective way of avoiding these threats
is verifying the authenticity and credibility of
the WEB source
Think before You
Click !
1. Ask yourself? Would you want your parents
or grandparents to see it?

Talk to your friends about this serious


responsibility.

Set your post to “private”

Avoid using names. Names are easy for search engines to


scan

If you feel that a post can affect you or other’s


reputation, ask the one who posted it to pull it down or
report it as inappropriate

Das könnte Ihnen auch gefallen