Lesson 2 Online Safety, Security, Ethics, and Etiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30
At a glance
Powered by AI
The key takeaways are to be cautious about sharing personal information online and to protect your online reputation and avoid copyright infringement.

Personal information like your full name, address, phone number, birthday, family members' names, and school details should be avoided sharing online as they increase risks of identity theft and privacy violations.

To properly cite online sources, you should include the author's name, title of the page, URL, and date accessed. Standard citation formats should be followed to avoid plagiarism.

Online Safety,

Security, Ethics,
and Etiquette
Contextualized
Online Search
and Research
Skills
Activity
Below is a questionnaire about how much
information you have shared so far. Put a check ( )
under Shared or Not Shared.
Types of Information Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous
school (s)
5. Your cellphone number
6. The name of your
mother and father
7. The name of your
siblings
Activity
Below is a questionnaire about how much
information you have shared so far. Put a check ( )
under Shared or Not Shared.

Types of Information Shared Not Shared


8. Your address
9. Your home phone
number
10. Your birthday
Analysis:
• How many checks did you have for
shared?
• Why did you share your full name?
• Why did you share your birthday?
• How many hours do you spend on
the Internet per day?
• Can you live without the Internet
for a week?
• How many aspects of your life
depend on the Internet?
Online Safety and Security
Let us go back to the “How Safe Are You? “ test. Let
us visit each item and see how risky is to share them.

Type of Information Risks


1. First name There is a risk sharing your first name. Chances are,
a “hacker” may already know plenty of stuff about
you even if you give out your first name

2. Last name If sharing your first is a small risk, having both your
first and last name is more risky. You will be
vulnerable to being searched for using search
engines, which include image search. Matching a
name with a face is a modus to several cybercrimes
like “Identity Theft”
Online Safety and Security
Type of Information Risks
3. Middle name Sharing your middle name alone is probably not the
most risky of these shared information, but sharing
your full name would be.
4. Current and previous Most people who steal identities study their
schools subject. They can use this information for
verification purposes.

5. Your cellphone number Your cellphone number should never be posted


over the Internet. The Internet is a public place.

6. The name of your mother Risky, yet not as risky as posting their full names,
and father especially your mother’s maiden name.

7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend
or use their identity to dupe you.
Online Safety and Security
Type of Information Risks
8. Your address Giving the Internet your number is one thing; giving
them your address is a whole other level. It will be
much easier for criminals to find you.
9. Your home phone number This shared information is more risky than sharing
your personal phone number. Scams usually use this
information to deceive you, one of which is when
stranger pretends to know your parents or pretends
to be you.
10. Your birthday Letting people know your birthday is probably a
must if you want to get as many gifts as possible.
Nut having it in profile makes you vulnerable to
identity theft.

The Internet is defined as the “Information Superhighway.”


Netiquette
The term “netiquette” is a coined or portmanteau
term of network and etiquette.
A netiquette is a set of ideal rules and conduct
that a netizen should observe in communicating
and/or publishing information and materials over the
World Wide Web and in ICT in general.
Tips to Stay Safe Online
• Be mindful of what you share online and what
site you share it to.
• Do not just accept terms and conditions; read
it.
• Check out the privacy policy page of a website
to learn how the website handles the
information you share.
• Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be able
to scan your profile
Tips to Stay Safe Online
• Do not share your password with anyone.
• Avoid logging in to public networks/Wi-Fi.
Browsing in “incognito (or private) mode,” a
feature of the browser, will not protect you
from hackers.
• Do not talk to strangers whether online or
face-to-face.
• Never post anything about a future vacation.
It is similar to posting, “Rob my house at this
date.”
Tips to Stay Safe Online
• Add friends you know in real life.
• Avoid using untrusted websites.
• Install and update an antivirus software on your
computer. Use only one anti-virus software to
avoid conflicts.
• If you have a Wi-Fi at home, make it private
network by adding a password.
• Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-
peer downloads (torrents) as the download is
most likely not monitored by the site owner.
Tips to Stay Safe Online

• Buy the software; do not use pirated ones.


• Do not reply or click links from suspicious
emails.
Activity: Privacy Policies
Visit a social networking site and look for the
site’s privacy policy. The link is typically found at the
bottom of the page and sometimes labeled only as
“Privacy.” Write a summary on how the website
handles both your private and public information.
Internet Threats

1. MALWARE - stand for malicious software.


a. Virus – a malicious program designed to
replicate itself and transfer one computer to
another either through the Internet and local
networks or data storage like flash drives and CDs.
b. Worm – a malicious program that transfers
from one computer to another by any type of
means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.
Internet Threats
c. Trojan – a malicious program that is
disguised as a useful program but once
downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.
*Rogue Security Software – tricks the user
into posing that it is a security software. It asks
the user to pay to improve his/her security but
in reality, they are not protected at all.
Internet Threats
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke
done by the user. This is done to steal their
password or any other sensitive information. It can
record email, messages, or any information you
type using your keyboard.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.
Internet Threats
2. SPAM – unwanted email mostly from bots
or advertisements. It can be used to send
malware.
3. PHISHING – its goal is to acquire sensitive
personal information like passwords and
credit card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit card, or
personal information.
*Pharming – a more complicated way of
phishing where it exploits the DNS (Domain
Name Service) System.
Phishing
- the illegal act of sending emails or
messages that appear to come from authentic
sources, but really come from spammers.
Phishers often try to get people to send them
their personal information, everything from
account numbers to passwords.
Protecting Reputations Online
1. Before you post something on the web, ask these
questions to yourself: Would you want your
parents or grandparents to see it? Would you
want your future boss to see it? Once you post
something on the web, you have no control of
who sees your posts.
2. Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
Protecting Reputations Online
3. Set your post to “private.” In this way, search
engines will not be able to scan that post.

4. Avoid using names. Names are easy for search


engines to scan.

5. If you feel that a post can affect you or other’s


reputation, ask the one who posted it to pull it down
or report as inappropriate.
Copyright Infringement

If you create something – an idea, an


invention, a form of literary work, or a research,
you have the right as to how it should be used by
others. This is called Intellectual Property.
In other words, the copyright law includes
your rights over your work, and anyone who uses
it without your consent is punishable by the law.
Copyright Infringement
Tips that could help avoid copyright infringement:

1. UNDERSTAND – express something using your own


words. You should give credit to the source.
2. BE RESPONSIBLE – know if something has
copyright.
3. BE CREATIVE – add your own creative genius.
4. KNOW THE LAW
Online Research
Tips on conducting online research

1. Have a question in mind.


2. Narrow it down.
3. Advanced search.
4. Look for credible source.
5. Give credit.
To properly cite a reference, you may use the format below:

Name of the person or organization (the author of the information).


Title of the home page in italics (title is shown in title bar but is
sometimes missing or unrelated). URL. Date last seen.

Examples:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”


http://oleader.penz.com/random/bananalove.htm. Viewed on
September 7, 2015.

“Accounting: What you should know.” Jargon Online Network.


http://www.jargononline.com/accounting101.html. Viewed on April 12,
2015.
Google Techniques
• Find the Hidden calculator – a gray, calculator-like
tool pops up as the search result.
• Definitions and more – simply add the word
“define” before a search term.
• Age-Appropriate Results – Google SafeSearch and
YouTube’s Safety Mode.
• Time-Zone Challenged – “time” and a city’s name
into the search bar.
Google Techniques
• The Perfect Search – URL of the website followed
by your query.
• Photo Magic – upload any photo to Google Images
and hit “search.”
• Just for Fun
http://www.google.com/doodles#archives
http://www.google.com/#q=do+a+barrel+roll
Activity: Cyber News Report
Form groups with 5 members each. Research for
several news and events related to cybercrime.
Using your cellphone or any video-recording device,
report it as if you were a newscaster. Present in 3-5
minutes.

You might also like