E-Tech - Lesson 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

Rules of Netiquette

Lesson Objectives:

 At the end of the lesson, the students should be able
to:
 1. consider one’s and others safety when sharing
information using the internet;
 2. consider one’s and others reputation when using
the internet;
 3. determine and avoid the dangers of the internet;
 4. be responsible in the use of social networking sites;
 5. browse the internet efficiently and properly
through proper referencing.
Motivation

 Most of us use the internet everyday. Sometimes we
do not pay attention on how much information we
share online. Below is a questionnaire about how
much information you have shared so far. Put a
check (/) under the Shared or Not Shared.
How safe are you?
Type of Information  Shared Not Shared
1. First name
2. Last name
3. Middle name
4. Current and previous schools
5. Your cellphone number
6. The name of your father and mother
7. The name of your siblings
8. Your address
9. You home phone number
10. You birthday
Online Safety and Security

 The internet truly is a powerful tool. It can be used to
promote your business gain, new friends, and stay in
touch with the loved ones. It is also a source of
entertainment through games, online communities, and
everything in between. But like most things in this world,
there is always the “the other side of the coin”. The
internet is one of the most dangerous places, especially if
you do not know what you are doing with it. But there is
no need to worry; it is never that late. Hopefully, by the
end of this lesson, you are able to consider how you go
about your use of the internet.
Let us go back to the “How Safe are You?” Let us visit
each item and see how risky it is to share them.
Type of Information

Risks

1. First Name Hacker may already know plenty of stuff


about you even if you only give out your
first name
2. Last Name You will be vulnerable to be searched for
using search engine, which include image
search .
3. Middle Name Sharing your middle name alone is
probably not the most risky of these
shared information, but sharing your full
name would be.
4. Current and Previous Schools Most people who steal identities study
their subject. They can use this
information for verification purposes.
Type of Information Risks
5. Your cellphone number Random strangers may text or call you
pretending that they are someone else.
6. The name of your father Risky, not yet risky as posting their full
and mother

names, especially their mother’s maiden
name.
7. The name of your Strangers may pretend or use their identity
siblings to deceive you.
8. Your address It would be much easier for the criminals to
find you.
9. Your home phone This shared information is more risky than
number sharing your personal phone number .
Scams usually use this information to
deceive , one of which is when stranger
pretends to know your parents or pretends
to be you.
10. Your birthday Letting people know your birthday is
probably a must if you want to get as many
gifts as possible. But having it in your profile
makes you vulnerable to identity theft.
Tips to Stay Safe Online

 The internet is a public place and its up to you to protect
yourself. Here are some tips to help you stay safe when
using the internet.
 1. Be mindful of what you share online and what site you
share it.
 2. Do not just accept terms and conditions; read it
 3. Check out privacy policy page of a website to learn
how the website handles the information you share.
 4. Know the security features of the social networking
sites you use. By keeping your profile private, search
engines will not able to scan your profile.
Tips to Stay Safe Online

 5. Do not share your password to anyone.
 6. Avoid logging in to public networks / Wi-Fi.
Browsing in “incognito (or private mode), a feature
of the browser will not protect you from hackers.
 7. Do not talk to strangers whether online or face-to
face.
 8. Never post anything about a future vacation. It is
similar to posting “Rob my house at this date.”
Tips to Stay Safe Online

 9. Add friends you know in real life.
 10. Avoid visiting untrusted websites.
 11. Install and update an anti-virus software on your
computer. Use only one anti-virus software to avoid
conflicts.
 12. If you have Wi-Fi at home, make it a private network
by adding a password.
 13. Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads (torrents) as the download is most likely not
monitored by the by the site owner.
Tips to Stay Online

 14. Buy the software; do not use pirated one.
 15. Do not reply or click links from suspicious
emails.
Internet Threats

 Here are some of the threats you should be aware of
when using the Internet.
 1. Malware- stands for malicious software.
 a. Virus – a malicious program designed to replicate
itself and transfer from one computer to another
either through the internet and local networks or
data storage like flash drives and CDs.
 b. Worm- a malicious program that transfers from
one computer to another by any type of means.
Internet Threats

 c. Trojan- a malicious program that is disguised as a
useful but once downloaded or installed, leaves your
PC unprotected and allows hackers to get
information.
 *Rogue security software- tricks the user into posing
that it is a security software. It asks the user to pay to
improve his/her security but in reality they are not
protected at all.
Internet Threats

 d. Spyware- a program that runs in the background
without you knowing it (thus called “spy”). It has
the ability to monitor what you are currently doing
and typing through key logging.

 *Keyloggers- used to record the keystrokes done by


the users. This is done to steal their password or any
other sensitive information. It can record email,
messages, or any information you type using your
keyboard.
Internet Threats
 e. Adware- a program designed to send your

advertisements, mostly as pop-ups

 2. Spam- unwanted email mostly from bots or


advertisers. It can be used to send malware.
 3. Phishing- It’s a goal to acquire sensitive personal
information like password and credit cad details.
This is done by sending you an email that will direct
 the user to visit a website and be asked to update
his/her username, password, credit card, or personal
information.
 *Pharming- a more complicated way of phishing
where it exploits the DNS (Domain Name System)
system
Protecting Reputations
Online

 Once you post something over the Internet, search
engines keep them in their archives for search
results. This makes anything you post to last forever
even if you delete it in your page. Something you
and your friends find funny today may be something
that could harm someone’s reputation later.
Before hiring, companies do a background check
on the applicant, and the easiest way to check your
background is to visit pages that are related to you.
Thus, if they find disreputable information about you,
it may harm your reputation even if this information
has been discarded.
Think Before You Click

 Here are the things you might want to consider
before posting something over the Internet.
 1. Before you post something on the web, ask thee
questions to yourself : Would you want your parents
or grandparents to see it? Would you want your
future boss to see it? Once you post something on the
web, you have no control of who sees your posts.
Think Before You Click

 2. Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
 3. Set your post to “private”. In this way, search
engines will not be able to scan that post.
 4. Avoid using names. Names are easy for search
engines to scan.
 5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it down
or report it as inappropriate.
Copyright Infringement

 If you create something- an idea, an invention, a
form of literary work , or a research, you have the
right as to how it should be used by others. This is
called Intellectual Property. In other words, the
copyright law includes your rights over your work,
and anyone who uses it without your consent is
punishable by law. Try grabbing any book then
browse its first few pages and you will find a page
with a disclaimer with the words “No part of this
book may be copied, reproduced...” That is a
copyright page.

 As a responsible user of the Internet, you have to
consider that not everything out there is free for you
to use. Just like your own, contents that you see from
websites have their respective copyrights. There are
several instances where employees or business
owners face copyright infringement and are
sentenced to a huge fine due to reckless copying of
materials.
Here are some tips that could help
you avoid copyright infringement:

1. Understand. Copyright protects
literary works, photographs, paintings,
drawings, films, music (and lyrics),
choreography, and sculptures, but it
generally does not protect underlying
ideas and facts. This means that you
can express something using your own
words, but you should give credit to
the source.

2. Be responsible- Even if a
material does not say that it is
copyrighted, it is not a valid
defense against copyright. Be
responsible enough to know if
something has a copyright.

3. Be creative- Ask yourself
whether what you are making is
something that came from you or
something made from somebody
else’s creativity. It is important to
add your own creative genius in
everything that will be credited to
you.
4. Know the law- There are some limitations
to copyright laws. For instance, in the

Philippines, copyrights only last a lifetime (of
the author) plus 50 years. There are also
provisions for “fair use” which mean that an
intellectual property may be used without a
consent as long as it is used in commentaries,
criticisms, search engines, parodies, news
reports, research, library archiving, teaching,
and education. If you have doubts that what
you are doing does not fall under the policy
of fair use, seek permission first.
Online Research

 The information that we need is more likely already
in the Internet. It is just a matter of how to look for it
and how to use information from the most credible
source. Here are some tips in conducting online
research.
 1. Have a question in mind. Focus on a question you
want answered. If it is a series of questions, start
with one. Never search everything on one go.
Online Research

2. Narrow it down- Search engines like
Google, Bing, or Yahoo use several filters to
determine the most appropriate result for
you. These search engines use your previous
search history and your geographical
location. Try to search “weather” and most
search engines would return the weather
conditions of where you are.
Online Research

3. Advanced Search. The best way to
filter information you get from search
engines is by using the advanced
search. This will allow you to filter out
information you do not need.
Online Research

 4. Look for a Credible Source. Some Wikis, though
filled with updated information, are not credible
source. This is due to the fact that anyone can edit its
content.
Online research

 5. Give Credit- If you are going to use the
information from the source for educational
purposes, give credit to the original author of the
page or information.

 Name of person or organization (the author of the


information). Title of the home page in italics (Title is
shown in the title bar but is sometimes missing or
unrelated). URL. Date last seen.

You might also like