Empowerment Technologies: Online Safety and Security, Ethics and Netiquettes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Empowerment

Technologies
Online Safety and Security, Ethics and
Netiquettes

TRACE COLLEGE
Online Safety & Security
Online Safety & Security
How Safe are You?
Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current & Previous School(s)
5. Cellphone Number
6. Name of your mother & father
7. Name of your siblings
8. Your address
9. Your home phone number
10. Your birthdate
Online Safety & Security
Internet

The Internet
• is a powerful tool.
• It can be used to promote your business
• gain new friends
• stay in touch with the old ones
• It is also a source of entertainment through games, online communities
and everything in between
• One of the most dangerous places
Online Safety & Security
How Safe are You?

Type of Information Risks


1. First Name • a hacker may already know plenty of stuff about you

2. Last Name • You will be vulnerable to being searched for using search
engines, which include image search.
• Matching a name with a face is a modus to several cyber
crimes like identity theft.

3. Middle Name • Sharing your middle name alone is probably not the most
risky of these shared information, but sharing your full na
me would be.
Online Safety & Security
How Safe are You?

Type of Information Risks


4. Current & Previous • Most people who steal identities study their subject. They
School(s) can use this for verification purposes

5. Cellphone Number • Should never be posted over the internet


• You would not want random strangers to text or call you,
or worse, pretend that they are someone else.
6. Name of your mot • Risky, yet not risky as posting their full names.
her & father
7. Name of your sibli • Huge risk.
ngs • Strangers may pretend or use their identity to dupe you.
How safe are you?
Type of Information Risks
8. Your address • High risk
• Much easier for criminals to find you

9. Your home phone • More risky that sharing personal phone number
number • Scams usually use this information to deceive you

10. Your birthdate • Vulnerable to identity theft


Online Safety & Security
Internet

The Internet is defined as information superhighway. Anyone has access


to this highway, can place information, and can grab that information. An
y information, even things that you have set privately, can be accessed o
ne way or another. The threat of cybercrime is very real. While you may
not experience the threat now, whatever information we share today coul
d affect our future.
Tips on Staying Safe Online
The Internet is a public place and its up to you to protect yourself.

1. Create a smart & strong password. Never give out your password.
2. Be mindful of what you share online and what site you share it to.
3. Check out the privacy policy page of a website to learn how the website h
andles the information you share.
4. Know the security features of the social network site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Be smart when using instant messaging apps. Protect yourself by using n
icknames as screen name and never accept strangers on your IM group.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito” will not
protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
Tips on Staying Safe Online
The Internet is a public place and its up to you to protect yourself.

8. Never post anything about future vacation. It is similar to posting “Rob my


house at this date.”
9. Add only friends in real life.
10. Avoid visiting untrusted sites.
11. Install & update antivirus software on your computer. Use only one antivir
us to avoid conflict.
12. Add password to your home network/Wi-Fi.
13. Avoid Downloading anything from untrusted sites.
14. Buy softwares; do not use pirated ones.
15. Do not reply or click links in suspicious emails.
Internet Threats
1. Malware (Malicious Software)
a. Virus – malicious program design to replicate itself and transfer from one
computer to another either through internet and local network or data stor
age flash drives and CDs
b. Worm – malicious program that transfer from one computer to another an
y type of means.
c. Trojan - malicious program that is disguised as a useful program but onc
e downloaded or installed, leaves your PC unprotected and allows hacker
s to get your information.
*Rouge Security software – tricks the user into posing that it is a security
software. It ask user to pay to improve his/her security but in reality they
are not protected at all.
Internet Threats
d. Spyware – a program that runs in background without you knowing it. It has
the ability to monitor what you are currently doing and typing through keyloggi
ng.
* Keylogger – used to record keystroke done by the user. This is done to steal
their password or any other sensitive information.
2. Spam – unwanted email mostly from bots or ads. It can be used to send malwa
re.
3. Phishing – its goal is to acquire sensitive personal information like passwords &
credit card details. This is done by sending you an email that will direct the user to
visit a website and be asked to update his/her username, password, creditcard or
personal detail.
*Pharming – a more complicated way of phishing where it exploits the DNS (Dom
ain Name Service) system.
Netiquette
Netiquette
What is Netiquette?

Netiquette = Internet + Etiquette


Internet is a global system of interconnected computer networks
Etiquette is a code of social behavior
The French word étiquette literally signifies a tag or label and first appear
ed in English around 1750 (Victorian era).
∴ Netiquette is etiquette governing communication
on the Internet.
Netiquette
Core Rules of Netiquette

Rule 1: Remember the Human

Never forget that the person reading your mail or posting is, indeed,
a person, with feelings that can be hurt

Corollary 1: It's not nice to hurt other people's feelings.


Corollary 2: Never mail or post anything you wouldn't say to your reader's face.
Corollary 3: Notify your readers when flaming.
Netiquette
Core Rules of Netiquette

Rule 2: Adhere to the same standards of behavior online that you follow in real life

Standards of behavior may be different in some areas of cyberspace,


but they are not lower than in real life.

Corollary 1: Be ethical.
Corollary 2: Breaking the law is bad Netiquette
Netiquette
Core Rules of Netiquette

Rule 3: Know where you are in cyberspace

What's perfectly acceptable in one area may be dreadfully rude in an


other.

Corollary 1: Netiquette varies from domain to domain.


Corollary 2: Lurk before you leap.
Netiquette
Core Rules of Netiquette
Rule 4: Respect other people's time and bandwidth
When you send email or post to a discussion group, you're taking up
other people's time (or hoping to). It's your responsibility to ensure th
at the time they spend reading your posting isn't wasted.
Corollary 1: It's OK to think that what you're doing at the moment is the most important thing in the universe,
but don't expect anyone else to agree with you.
Corollary 2: Post messages to the appropriate discussion group.
Corollary 3: Try not to ask stupid questions on discussion groups.
Corollary 4: Read the FAQ (Frequently Asked Questions) document.
Corollary 5: When appropriate, use private email instead of posting to the group.
Corollary 6: Don't post subscribe, unsubscribe, or FAQ requests.
Corollary 7: Don't waste expert readers' time by posting basic information.
Corollary 8: If you disagree with the premise of a particular discussion group, don't waste the time and band
width of the members by telling them how stupid they are. Just stay away.
Corollary 9: Conserve bandwidth when you retrieve information from a host or server.
Netiquette
Core Rules of Netiquette

Rule 5: Make yourself look good online

As in the world at large, most people who communicate online just w


ant to be liked. Networks -- particularly discussion groups -- let you re
ach out to people you'd otherwise never meet.
Corollary 1: Check grammar and spelling before you post.
Corollary 2: Know what you're talking about and make sense.
Corollary 3: Don't post flame-bait.
Netiquette
Core Rules of Netiquette

Rule 6: Share expert knowledge


The strength of cyberspace is in its numbers. The reason asking questions
online works is that a lot of knowledgeable people are reading the questions.
And if even a few of them offer intelligent answers, the sum total of world kno
wledge increases. The Internet itself was founded and grew because scientis
ts wanted to share information. Gradually, the rest of us got in on the act.

Corollary 1: Offer answers and help to people who ask questions on discussion
groups.
Corollary 2: If you've received email answers to a posted question, summarize
them and post the summary to the discussion group.
Netiquette
Core Rules of Netiquette

Rule 7: Help keep flame wars under control

"Flaming" is what people do when they express a strongly held opinion wit
hout holding back any emotion. It's the kind of message that makes people
respond, "Oh come on, tell us how you really feel."

Corollary 1: Don't respond to flame-bait.


Corollary 2: Don't post spelling or grammar flames.
Corollary 3: If you've posted flame-bait or perpetuated a flame war, apologize.
Netiquette
Core Rules of Netiquette

Rule 8: Respect other people's privacy

The moral: Failing to respect other people's privacy is not just bad Netiquet
te. It could also cost you your job.

Don't read other people's private email.


Netiquette
Core Rules of Netiquette

Rule 9: Don't abuse your power

Some people in cyberspace have more power than others. There are wizards
in MUDs (multi-user dungeons), experts in every office, and system administr
ators in every system.
Knowing more than others, or having more power than they do, does not give
you the right to take advantage of them. For example, sysadmins should nev
er read private email.

The more power you have, the more important it is that you use it well.
Netiquette
Core Rules of Netiquette

Rule 10: Be forgiving of other people's mistakes

when someone makes a mistake -- whether it's a spelling error or a spelling fl


ame, a stupid question or an unnecessarily long answer -- be kind about it. If i
t's a minor error, you may not need to say anything. Even if you feel strongly
about it, think twice before reacting. Having good manners yourself doesn't gi
ve you license to correct everyone else.

You were a network newbie once too!


Empowerment
Technologies
Online Safety and Security, Ethics and
Netiquettes

TRACE COLLEGE

You might also like