Technical Vocational Livelihood: Brief Introduction

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

TECHNICAL VOCATIONAL LIVELIHOOD

ACTIVITY SHEET 2

BRIEF INTRODUCTION
Welcome again guys! I hope you had learned a lot from our previous lesson about the
introduction of Information and Communications Technology. Today we will discuss about
online safety, security and rules of netiquettes in order for you to answer the questions “Are
you safe and secured online?” and “How safe and secured are you online?”. This module will
give you an idea how to behave properly online and what are the different threats that you
might encounter while you are online. Are you ready? I hope you are all excited as we started
working on this module.

Objectives
At the end of this module, you are expected to:
1. Apply online safety, security, ethics, and etiquette standards while using the
internet.
2. Use the Internet as a tool for credible research and information gathering.

Learning Competencies (Essential Competencies)


Apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.

Use the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational.

Let’s Recall (Review)


Before we start let us review some terminologies that you will encounter as you go
through this module:
Cyber crime: a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS): tells the user how the website will handle its data.
Malware: stands for malicious software.
Virus: a malicious program designed to transfer from one computer to another in any means
possible.
Worms: a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan: a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
Spyware: a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware: a program designed to send you advertisement, mostly pop-ups.
Spam: unwanted email mostly from bots or advertisers.
Phishing: acquires sensitive personal information like passwords and credits card details.
Pharming: a more complicated way of phishing where it exploits the DNS system.
Copyright: a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Let’s Understand (Study the Concept)

To start with this module, let us first understand why Internet is considered to be a
powerful tool and yet a dangerous place if you do not know what you are doing with it.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain
new friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one of the
most dangerous places, especially if you do not know what you are doing.
Below are the list of information and I want you to make a self-check if these
information of yours are shared online or not. Let us start!

Are you finished? Ok! Very good. For now, set aside your answers and at the end of
the module let us assess if you are a smart and responsible user of internet or not.
Online safety refers to the practices and
precautions that should be observed when using the
internet to ensure that the users as well as their
computers and personal information are safe from
crimes associated with using the internet. There are
numerous delinquencies that can be committed on
the internet (1) Stalking (2) Identity Theft (3) Privacy
violations and (4) Harassments.
Online Safety Measures
• Never give any personal information about yourself over the internet.
• Do not give any banking or sensitive information. To make sure you’re in a secured
network the website address should begin with “https://”.
• Never open messages or attachments from someone you do not know.
• Regularly review your privacy settings in your online accounts.
• When using a public computer terminal, be sure to delete our browsing data before
leaving.
• Keep your software updated to avoid security holes.
• Do not download and install software that is unknown to you.
Online threats are act performed by knowledgeable computer user sometimes referred to
as hackers that illegally browses or steal someone’s information.
Types of Internet threats

• Phishing : Its goal is to acquire sensitive personal


information like passwords and credit card details.
• Pharming: A malicious website that resembles a
legitimate website, used to gather username and
password.
• Internet Scam: A type of scam that misleads the users in
many ways attempting to take lead of them.
• Internet Bots: A network of zombie computers that have
been taken over by a robot or bot that performs large scale
malicious acts for the creator of the bot net.
• Malware: Stands for malicious software disguised as real software often secretly
installed intended to transfer and gather information like password without the users’
permission.
• Virus: Is a program designed to replicate by attaching itself into other computer
program, data files, or the boot sector of the hard drive
• Worm: Can be injected into a network by any types of means, like a USB stick or an
email attachment.
• Computer bug: A malfunction on a computer system through its runtime
• Cyber stalking: The use of the internet or other electronic device to harass or stalk
individual, group or organization
• Cyber bullying: The act of tormenting, threatening, harassing or embarrassing
another person using the internet or other technologies
• Spam: An unsolicited email, instant message, or social media messages
• Spoofing: Describes a criminal who impersonates another individual or organization,
with the intent to gather personal or business information

Netiquette is a term came from network etiquette is a set of rule and norms for acceptable
conduct or behavior online.
Ten Rules of Netiquettes
Rule No. 1: Remember the human
Remember that you are talking to a real person when you are online. The internet
brings people together who would otherwise never meet. Remember this saying when sending
an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life. You need to remember
that you can get caught doing things you should not be doing online just like you can in real
life. You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
Always take a look around when you enter a new domain when surfing the web. Get a
sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.


Remember people have other things to do besides read your email. You are not the
center of their world. Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
Be polite and pleasant to everyone. Always check your spelling and grammar before
posting. Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
Ask questions online. Share what you know online. Post the answers to your questions
online because someone may have the same question you do.
Rule no. 7: Help keep flame wars under control
Netiquette does not forgive flaming. Netiquette does however forbid people who are
flaming to hurt discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
Do not read other people’s mail without their permission. Going through other people’s
things could cost you, your job or you could even go to jail. Not respecting other people’s
privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
Do not take advantage of other people just because you have more knowledge or
power than them. Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
Do not point out mistakes to people online. Remember that you were once he new kid
on the block. You still need to have a good manners even though you are online and cannot
see the person face to face.

Let’s Apply

DIRECTION: Identify what is being asked and write your answer on the space provided.
1. A malicious website that resembles a legitimate website, used to gather username and
password.
2. An unsolicited email and instant message.
3. A malfunction on a computer system through its runtime.
4. The use of the internet or other electronic device to harass or stalk individual, group or
organization.
5. Describes a criminal who impersonates another individual or organization, with the intent
to gather personal or business information.
6. Can be injected into a network by any types of means.
7. A type of scam that misleads the users in many ways attempting to take lead of them.
Let’s Analyze
DIRECTION: Match column A with column B. Write your answer before the number

A B
1. Internet scam a. A malicious website that resembles a legitimate
2. Virus
website, used to gather information.
3. Online safety
4. Cyber Bullying b. The use of electronic device to harass or stalk
5. Phishing individual or group.
6. Online threats c. Stands for malicious software.
7. Internet bots d. A network zombie that performs large scale
8. Malware malicious acts for the creator of the bot net.
9. Cyber Stalking
e. Act performed by knowledgeable computer
10. Pharming
user sometimes referred to as hackers.
f. Its goal is to acquire sensitive personal
information like passwords.
g. The act of tormenting, threatening, harassing or
embarrassing another person using the internet
or other technologies.
h. Refers to the practices and precautions that
should be observed when using the internet.
i. Is a program designed to replicate by attaching
itself into other computer program.
j. A type of scam that misleads the users in many
ways attempting to take lead of them.

Let’s Try (Evaluation)


DIRECTION: Write the word True if the given statement is correct, otherwise write the False
and underline the word/s that makes the statement incorrect.

1. To make sure you’re in a secured network the website address should begin with
“http://”.
2. According to Rule 5, post the answers to your questions online because someone may
have the same question you do.
3. Keep your post and emails to minimum by saying what you want to say.
4. It is okay to read other people’s mail without their permission.
5. Rule 7 states that help keep flame wars under control.
6. Respecting other people’s privacy is a bad netiquette.
7. Do not take advantage of other people just because you have more knowledge or
power than them.
8. Treat others as you would want them to treat you if the roles were reversed.

9. Always take a look around when you enter a new domain when surfing the web.

10. Remember that you are talking to a real person when you are online.

.
Let’s Create
DIRECTION: Create/compose a 1-2 minute jingle about the concepts that you had learned on
this module. The rubric below will be used to evaluate your output.

Criteria Points
Message/Relevance of the output
The message of the song is timely and relevant. 4 points
The message of the song is somehow timely and relevant. 3 points
1 point
The message of the song has nothing to do with the concepts
discussed in the module.
Knowledge on the concept
The output showcased the correct concept of the topic. 4 points
The output showcased the somehow correct concept of the topic. 3 points
The output does not manifest the correct concept of the topic. 1 point
Originality and Musicality
The output presented showcased originality. 2 points
The output presented does not showcased originality. 1 point
TOTAL 10 points

You might also like