Lesson 2.1: Online Safety, Security and Netiquette
Lesson 2.1: Online Safety, Security and Netiquette
Lesson 2.1: Online Safety, Security and Netiquette
Department of Education
Region V Bicol
Division of Masbate Province
Tomas V. Rivera National High School
I. Introductory Concept:
The internet is the guiding technology of the Information Technology Age just as the
electrical engine was of the Industrial Age. In these times, more and more people are
already engaged in the use of technology. These people who are raised in a digital, media-
saturated world are called digital natives. No doubt, the Internet has been very useful to
us but with the rise of instant messaging, chat rooms, emails and social networking sites,
it can also bring trouble - from cyberbullying to more serious Internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.
II. Activities
To avoid these online crimes, follow the following online safety measures:
1. Never give any personal information out about yourself over the internet.
2. Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service. To make sure that you are in a secured
network, the website address should begin with “https://’ as opposed to “http://”.
3. Never access your accounts by following an email link, instead type your URL by
yourself.
Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
Flame war is a series of flame
posts or messages in a thread
that are considered derogatory in
nature or are completely off-
topic. Often these flames are
posted for the sole purpose of
offending or upsetting other users. The
flame becomes a flame war
when other users respond to the
thread with their own flame
message.
Online threat is deemed any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners. These are usually done by
computer hacker who uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but
may also employ other protocols and components, such as links in email or Instant
Messaging apps, or any malware attachments on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help absorb infected PCs
into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online
banking.
The following are the top kinds of online threats that you should be aware of:
1. Phishing happens
when an email is
sent from an internet
criminal disguised
as an email from a
legitimate,
trustworthy source.
The message is
meant to lure you into
revealing sensitive or
confidential information.
Image source: https://searchsecurity.techtarget.com/definition/phishing
2. Pharming happens
when a hacker (or
“pharmer”) directs an
internet user to a fake
website instead of a
legitimate one. These
“spoofed” sites can
capture a victim’s
confidential information,
including usernames,
passwords, and credit
card data, or install
malware on their
computer. Pharmers
usually focus on
websites in the financial
sector, including banks,
online payment
platforms, or other e-
commerce destinations.
Image source:https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html
4. Internet robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which
means they run according to their instructions without a human user. Some bots
are useful, such as search engine bots that index content for search or customer
service bots that help users. Other bots are "bad" and are programmed to break into
user accounts, scan the web for contact information for sending spam, or perform
other malicious activities. If it's connected to the Internet, a bot will have an
associated IP address.
c. Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code.
e. Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.
6. Spams are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be
damaging if you open or respond to it.
7. Cyberstalking refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.
Direction: Look at the following images and create a hashtag based on the type of online
threat represented by each image. Write your answers in your activity notebook.
1. #______________________________ 2. #______________________________
Image source:https://www.gtmaritime.com/free-phishing-penetration-test
Image source:
4.
#__ _____
_______________________
https://dlpng.com/png/6702600
3. #______________________________
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-benefit-consumers-says-globe-telecom/
5.#_________________________________
IV. Reflection
Reflect on this and write your answers in your notebook.
From all you have learned in Lesson 2, why is there a need to “think before you
click?”
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
V. Rubrics
Criteria Score
Completeness (5 points) 5 4 3 2 1
Does your response directly answer each part of the question(s)?
Knowledge (10 points) 10 - 8 - 6 - 4 - 2 -
Does your response clearly show you have read and understand the lesson 9 7 5 3 1
content by correctly defining key terms, key persons and summarizing
concepts?
Have you made inferences based on this knowledge to personal or
modern-day applications?
Writing Skills (5 points) 5 4 3 2 1
Do you write clearly, in complete sentences, with minimal errors in
grammar and spelling?
VI. References
Penaso, S.R.(2020) EMPOWERMENT TECHNOLOGIES (Q1-Module 1). Department of Education – Region X –
Northern Mindanao
QUIZ Lesson 2
Directions: Read each item carefully and choose the letter of the correct answer. Write your
answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from one computer
to another either through the internet or local networks or data storage like flash drives and
CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
6. Which of the following must NOT be done if you received an embarrassing picture from your
friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.