Module 2 in EmTech 12
Module 2 in EmTech 12
Module 2 in EmTech 12
SECOND SEMESTER
MODULE MAP
Apply online safety, security, ethics, and At the completion of this module, you shall be
etiquette standards and practice in the able to:
use of ICTs as it would relate to their Identify the different threats that could
specific professional tracks. (CS_ICT11/12- found on the internet;
ICTPT-la-b-2) Describe the do’s and don’ts of online
communication ; and
Explain how to avoid internet threats.
INTEGRATED VALUES
ACTIVITY
Have you been a victim of internet hacking? Were your files have corrupted because
of a virus or a malware? Share your experience about it and the actions you did to resolve
the problem. Write your answer in the box below. (5 pts)
ANALYSIS
No part of this module may be reproduced in any form including photocopying without permission from OLPA. 2
Phone: 09097636502 E-mail: [email protected]
ABSTRACTION
INTERNET THREATS
Internet safety refers to the online security or safety of people and their information
when using the internet. However, there are instances that we cannot avoid internet threats
because we are using the internet.
The following are some of the internet threats we could encounter:
1. Malware- Stands for malicious software. It is a set of instructions that run on your
computer and make your system do something that an attacker wants it to do.
Kinds of Malware
a. Virus- A computer virus is a piece of malicious computer code that attaches itself
to a software program, email, or computer file without your permission. It can
transfers through the internet and local networks or data storage like hard drives
and CDs.
b. Trojan- A malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get
your information.
c. Worm- A malicious program that transfers from one computer to another by any
type of means. It uses computer network to spread itself.
Example: ILOVEYOU worm
d. Spyware- A program that runs in the background without you knowing it. It has
the ability to monitor what you are currently doing and typing through
keylogging.
e. Adware- A program designed to send you advertisements, mostly as pop ups.
A very effective way of avoiding these threats is verifying the authenticity and
credibility of the web source.
Install anti-virus on your computer.
Top 10 best free anti-virus of 2020 according to antivirussoftwareguide.com
• Total AV • PC Protect
• McAfee • Bitdefender
• Norton • Avast
• AVG • Kaspersky
• Malwarebyte • Bullguard
No part of this module may be reproduced in any form including photocopying without permission from OLPA. 3
Phone: 09097636502 E-mail: [email protected]
RULES OF NETIQUETTE
Netiquette stands for network etiquette which means the do’s and don’ts of online
communication.
Here are the ten rules of netiquette for the security and safety of online users:
You need to remember that you are talking to a real person when you are
online. The internet brings people together who would otherwise never
meet. Remember this saying when sending an email: Would I say this to the
person’s face?
Rule no. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life. You need
to remember that you can get caught doing things you should not be
doing online just like you can in real life. You are still talking to a real person
with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the
web. Get a sense of what the discussion group is about before you join it.
Remember people have other things to do besides read your email. You
are not center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Ask questions online, share what you know online. Post the answers to your
questions online because someone may have the same question you do.
Do not read other people’s mail without their permission. Going through
other people’s things could cost you, your job or you could go even to jail.
Not respecting other people’s privacy is a bad netiquette.
Do not take advantage of other people just because you have more
knowledge or power than them. Treat others as you would want them to
treat you if the roles were reversed.
Do not point out mistakes to people online. Remember that you were once
the new kid on the block.
No part of this module may be reproduced in any form including photocopying without permission from OLPA. 4
Phone: 09097636502 E-mail: [email protected] 3
APPLICATION
Choose three (3) among the 10 rules of netiquettes and cite an example/situation
where the rules that you chose were followed.
Example: Rule no. 8 Respect other people’s privacy. Nene borrowed the cellphone of
her classmate to take a photo of their class, suddenly the phone rung and a
notification was pop-out on the screen. Nene immediately gave the phone
to her classmate without reading the whole notification.
Write your answer on the space provided. (5 pts each)
1. Rule No. ___________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
_____________________________________________________________________________________
ASSESSMENT
A. Answer the following questions. Write your answer on the space provided.
No part of this module may be reproduced in any form including photocopying without permission from OLPA. 5
Phone: 09097636502 E-mail: [email protected]
3
B. Essay. In your own experience of using the internet, how do you avoid online and
internet threats?
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
REFERENCES
https://www.google.com/amp/s/ictcom444251764.wordpress.com/2018/03/31/empower
ment-technologies-lessons-1-15/amp/Empowerment Technology
https://youtu.be/uL_c_2So9HU
“Thank you for putting effort on answering this module. You did a great job”
No part of this module may be reproduced in any form including photocopying without permission from OLPA. 6
Phone: 09097636502 E-mail: [email protected] 3