Week 2 Emp Tech

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

EMPOWERMENT TECHNOLOGY 11

Online Safety, Security and Netiquette

LC: Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks

Objectives: At the end of the lesson the students will be able to:
1. Identify online safety measures and netiquette;
2. Elaborate the characteristics of online threats
3. Apply properly the safety measures/behaviors when online;

Reference: Bandala, A. A. (2016), Empowerment Technologies, Diwa Learning System, Inc. pages 14-17

The internet is the guiding technology of the Information Technology Age just as the electrical engine was of the Industrial Age. In these times, more
and more people are already engaged in the use of technology. These people who are raised in a digital, media-saturated world are called digital
natives. No doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social networking sites, it
can also bring trouble - from cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always
our primary concern.

WHAT I KNOW
I bet you are ready to know if you have practiced online safety, aren’t you? But before that, take time to answer the pre-test to gauge how much
you know about the lesson.

Direction: Read each item carefully and choose the letter of the correct answer. Write your answers before the number..
1. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
2. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
3. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
4. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
5. Knowledge and understanding of netiquette is useful because ___________
A. it will help you create a positive impression on those you meet in cyberspace.
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybercasts.
D. All of the above.
6. What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance against its victim?
A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
7. What type of online threat happens when the attacker impersonates another individual or organization to gather personal or business
information?
A. Cyberstalking B. Spoofing C. Scamming D. Pharming
8. What type of information should you avoid giving when using the internet?
A. Phone number B. Profile Picture C. Shirt Size D. Religion
 What is the golden rule of netiquette?
A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.
10. You get an email telling you that you won a hundred thousand without joining in a competition. You should ___________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge

WHAT’S IN
Read the headlines found below and try to reflect on the questions that follows, write your answer on the space provided.

Reflect on the following questions:


What is common among the headlines above?

Are your social media accounts secured enough that you may not be a victim of these things?
What type of information do you share in your social media accounts?

There's almost no limit to what you can do online. The Internet makes it possible to access information quickly, communicate around the
world, and much more. Unfortunately, the Internet is also home to certain risks, such as malware, spam, and phishing. If you want to stay safe
online, you'll need to understand these risks and learn how to avoid them.

S NEW
ACTIVITY 2.1: Shared or Not Shared? That is the Question
DIRECTIONS: Read and reflect each item carefully. Check on the space whether you have shared or not shared these pieces of information in all
your social media accounts.
TYPE OF INFORMATION SHARED NOT SHARED How many of these information have you SHARED?
_
First Name
Middle Name
Last Name
Current and Previous School/s
Your cellphone number
Your cellphone number
Complete name of mother and father
Your parents’ cellphone numbers
our Birthday
Name of Siblings
Your Address

How many of these information have you NOT SHARED?

Based from your answers above, do you think you


are safe when using the Internet? Why?

WHAT IS IT
Online Safety, Security and Netiquette

Online safety refers to the practices and precautions that


should be observed when using the internet to ensure that
the users as well as their computers and personal information are safe from crimes associated with using the internet. Below are personal
information that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such as stalking, identity theft, privacy violations, and
harassment.

To avoid these online crimes, follow the following online safety measures:
 Never give any personal information out about yourself over the internet.
 Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service.
 To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never
access your accounts by following an email link, instead type your URL by yourself.
 Never open messages or attachments from someone you do not
know.
 Regularly review your privacy settings in your online accounts to
make sure you are not sharing important personal information.
 When using a public computer terminal, be sure to delete your browsing data
before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your computer or cell phone
that is unknown to you.
Info source: https://www.wikihow.com/Find-if-a-Website-Is-Legitimate

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:
Rule 1: Remember the human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and bandwidth.
Rule 5: Make yourself look good online.
Rule 6: Share expert knowledge.
Rule 7: Help keep flame wars under control.
Rule 8: Respect other people privacy.
Rule 9: Don’t abuse your power.
Rule 10: Be forgiving of other peoples mistakes.

Flame war is a series of flame posts or messages in a thread that are considered derogatory in
nature or are completely off-topic. Often these flames are posted for the sole purpose of offending
or upsetting other users. The flame becomes a flame war when other users respond to the thread
with their own flame message
Image from: https://twitter.com/Parkster00/status/1246347088625045504

Can You Keep It Private?

DIRECTIONS: Choose the most appropriate thing to do in the following situation. Write the letter of the correct answer before the number.
1. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
2. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.
3. Choose which image below describes how you feel about sharing your password with your boyfriend/ girlfriend?
Image source: https://www.nku.edu/~rkdrury/experiment/netiquette_quiz.htm.

A C B C D
4. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number to anyone.
B. Post your cellphone number in your social media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of ______________.
A. Your favorite brands. C. Anyone who sends you a friend request
B. Family and friends D. Foreigners

Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years, many internet predators have been
playing on vulnerabilities to attack computers and retrieve sensitive data from individuals. Half the time, we aren’t even aware it is happening until it
is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the
owners. These are usually done by computer hackers who uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of
malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email or
Instant Messaging apps, or any malware attachments on servers that access the Web. They benefit cybercriminals by stealing information for
subsequent sale and help absorb infected PCs into botnets. Web threats pose a broad range of risks, including financial damages, identity theft,loss
of confidential information/data, theft of network resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce
and online banking.
The following are the top kinds of online threats that you should be aware of:

Phishing happens when an email is sent from an internet criminal disguised as an email
from a legitimate, trustworthy source. The message is meant to lure you into revealing
sensitive or confidential information.

Image source: https://searchsecurity.techtarget.com/definition/phishing

Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website
instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential
information, including usernames, passwords, and credit card data, or install malware on their
computer. Pharmers usually focus on websites in the financial sector, including banks, online
payment platforms, or other e-commerce destinations.

Image source: https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-


pharming.html

Internet Scam generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain. Cybercriminals may contact potential victims
through personal or work email accounts, social networking sites, dating apps, or other methods
in attempts to obtain financial or other valuable personal information. Online scams may come in
various forms such as lottery scam, charity fraud scams, job offer scams, and online dating
scams to name a few.

Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is programmed to do certain tasks. Bots are
automated, which means they run according to their instructions without a human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious activities. If it's connected to the Internet, a bot will have an associated IP address.

Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery
of malware:
 Adware (advertising supported software) is unwanted software designed to throw advertisements up on your screen. Example,
pop-up ads and banner ads.
 Spyware is malware that secretly observes the computer user’s activities without permission and reports it to the software’s
author. Example is a keylogger.
 Virus and Worms are malwares that attach to another program and, when executed—unintentionally by the user—replicates
itself by modifying other computer programs and infecting them with its own bits of code.
 Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as something useful in order to
trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From
there, Trojans can be used to steal financial information or install threats like viruses and ransomware.
 Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom
to get them back.

Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam
messages can be damaging if you open or respond to it.
Cyberstalking refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.

Cyberbullying refers to the act of tormenting, harassing, or embarrassing another


person using the internet.
Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal
money, or spread malware.

ACTIVITY: Show Me How You Hashtag

Direction: Look at the following images and create a hashtag based on the type of online threat represented by each image. Write your answers on
the space provided.
Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/ Image source: https://dlpng.com/png/6702600

1. # 2. # 3. #

Image source: https://dlpng.com/png/6702600 Image source:https://www.gtmaritime.com/free-phishing-

1. # 2. #

WHAT I HAVE LEARNED

Reflect on this and write your answers in the space provided.


Why is there a need to “think before you click?” Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer. Write your answers before the number.
1. What type of malicious program is designed to replicate itself and transfer from one computer to another either through the internet or local
networks or data storage like flash drives and CDs
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
4. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet C. Fear of spyware D.Fear of losing important files
5. Which of the following is an example of a “phishing” attack?
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
6. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
7. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
8. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
10. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You are judged by how you look - your profile picture is important.

You might also like