L2 Rules of Netiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 34

At the end of this lesson, the students should be able to:

1.Identify what constitutes appropriate and inappropriate


online behavior.
2. Apply internet online safety, security ethics and etiquette
standards and practice in the use of ICTs.
3. Discern possible deceptive information and wrongly
evaluated data.
Complete the statement

My media life is like _______________

PS. What security problems have you


encountered while browsing the Internet?
Do you agree?
“Instead of promoting social behavior, social
media promotes disengagement, self-
absorption, loneliness and sadness.”
Online Safety and Security
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
https://www.youtube.com/watch?v=ynuliH_AwxI
Types of malware include the following:
Spyware collects information and data on the device and user, as well as observes
the user's activity without their knowledge.

Ransomware infects a user's system and encrypts its data. Cybercriminals then
demand a ransom payment from the victim in exchange for decrypting the system's
data.

A rootkit obtains administrator-level access to the victim's system. Once installed,


the program gives threat actors root or privileged access to the system.

A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an
infected computer system that enables threat actors to remotely access it without
alerting the user or the system's security programs.

Adware tracks a user's browser and download history with the intent to display pop-
up or banner advertisements that lure the user into making a purchase. For
example, an advertiser might use cookies to track the webpages a user visits to
better target advertising.
Internet Threats:

2. Spam – unwanted email mostly from bots


or advertisers. It can be used to send
malware.

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and
credit card details.
Internet Threats:
What is ‘Rogue security software’?
is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their
computer and aims to convince them to pay for a fake
malware removal tool that actually installs malware on
their computer.

What is a keylogger?
-Keyloggers are software programs that leverage
algorithms that monitor keyboard strokes through
pattern recognition and other techniques
Internet Threats:
What is pharming?
is a type of social engineering
cyberattack in which criminals redirect
internet users trying to reach a specific
website to a different, fake site. These
“spoofed” sites aim to capture a victim’s
personally identifiable information (PII)
and log-in credentials, such as passwords,
social security numbers, account
numbers, and so on, or else they attempt
to install pharming malware on their
computer.
`
TASK this WEEK
Activity 1 (Netiquette Poster-Slogan)
-Create your personal Netiquette by creating
a poster-slogan on how you safeguard
yourself online. Do this on any size of bond
paper.

You might also like