lesson2 rules of netiquette · 2018. 10. 1. · objective: 1. consider one’s and others’ safety...
TRANSCRIPT
Lesson2Rules of
Netiquette
HOMAPON HIGH SCHOOLHomapon, Legazpi City
By: ROCHELLE SABDAO-NATOSHS Teacher
Reference: EMPOWERMENT TechnologiesInnovative Training Work, Inc.First Edition
1. Consider one’s and others’ safety when sharing information using the internet.
2. Consider one’s and others’ reputation when using the internet.
3. Know and determined how to avoid the dangers of the internet.
4. Be responsible in the use of social networking sites
Objective:
1. Consider one’s and others’ safety when sharing information using the internet.
2. Consider one’s and others’ reputation when using the internet.
3. Know and determined how to avoid the dangers of the internet
4. Be responsible in the use of social networking sites
Rules of Netiquette
Online Security, safety
and ethics
Internet Threats
Protecting reputations
online
Copyright
Contextualized online search and research
skills
Pre-test
Write YES if you agree with the statement and NO if you disagree.
1. My computer has an antivirus so it is okay to open most e-mail attachments like e-cards and video files.
2. Your friend told you that this college application was rejected due to the fact that you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your friend’s reputation. Can your friend be right that the college found the video?
3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password?
4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?
5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. Is it okay to use the essay from this free essay website?
6. A virus is a malware that multiplies and infects other computers through flash drives.
7. Keyloggers are software that show pop-up ads even if you are not using your browser.
8. Search engines scan websites for search results even if you have set your post to “private”.
9. There is a danger in posting information about a future vacation.
10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identify the theft.
10 best rules of netiquette
The Golden Rule
( Treat others as you would like to be
treated)
No FLAMING
(Flame is a personal insult communicated through the internet
Don’t type in ALL CAPS ( people may misinterpret)
Don’t SPAM (it is any unsolicited e-mail from
unknown sources)
Don’t talk with people you do not know ( do not arrange to meet
anyone you meet online)
Obey Copyright Laws
(Don’t steal someone else’s idea, property
and rights)
Use proper Grammar and Spelling
(errors diminishes the credibility of the
message
BE HONEST / Be yourself
(tell the truth, do not pretend to be someone
else)
Follow the TOS
(TOS- Term of Service)
(Rules and policy of the sites
SHOP SECURE SITES
(These are sites with transport layer security
(TLS or SLS Socket Layer Security
Online Safety and Security
What is internet
Safety?
- It refers to the online security or safety of people and their information when using the internet.
HTTPS - "Hyper-Text Transfer Protocol Secure"
TYPE OF INFORMATION RISKS
1. First Name There is a risk in sharing your first name, Chances are , a hacker may already know plenty of stuff about you even if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your first and last is more risky. Matching a name with a face is a modus to several cybercrimes' like identity theft
3. Middle Name Sharing your middle name is probably not the most risky of these shared information, but sharing your full name would be.
4. Current and previous school/s
Most people who steal identities study their subject. They can use this information for verification purposes.
5. Your cell phone number
You cell phone number should never be posted over the internet.
Internet Threats
1. Malware – Stands
for malicious
software.
- is a set of
instructions that run
on you computer and
make your system do
something that an
attacker wants it to do.
What it is good for?a. Steal personal
informationb. Delete filesc. Click fraudd. Steal software serial
numberse. Use your computer
as relay
Different Kinds of Malware
Virus Worm Trojan Spyware Adware
Rogue
security
software
Keyloggers
Virus
- A computer virus is a piece of maliciouscomputer code that attaches itself to asoftware program, email or computer filewithout your permission.
- It can transfers through the internet andlocal networks or data storage like flashdrives and CD’s
Trojan
A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
Worm
A malicious program that transfers from one computer to another by
any type of means. It uses computer network
to spread itself.
Ex. ILOVEYOU worm
Love Bug Worm created by Filipino
Spread to other
computers
Rogue security software- tricks the user into posting that is a security software. It asks the user to pay to improve hi/her security but in reality that are not protected at all.
Spyware
- A program that runs in the backgroundwithout you knowing it. It has the ability tomonitor what you are currently doing and typingthrough keylogging.
Keyloggers- used to record the keystrokedone by the user. This is done to steal theirpassword or any other sensitive information. Itcan record email, messages or any informationyou type using your keyboard.
Adware
A program designed to send your advertisement, mostly as pop-ups
SPAM- Refers to the transmission of unsolicited messages from various origins using electric messaging systems
EXAMPLE
* Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
Phishing – is a software or a program used by an attacker to obtain personal information.
- It targets the passwords to hack and take control of a user account..
How to avoid these threats?
A very effective way of avoiding these threats is verifying the authenticity and credibility of the WEB source
Think before You Click !
1. Ask yourself? Would you want your parents or grandparents to see it?
Talk to your friends about this serious responsibility.
Set your post to “private”
Avoid using names. Names are easy for search engines to scan
If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate