Lesson 2.1: Online Safety, Security and Netiquette

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Republic of the Philippines

Department of Education
Region V Bicol
Division of Masbate Province
Tomas V. Rivera National High School

LEARNING ACTIVITY SHEET NO. 1

Name of Student : ________________________________________


Learning Area-Grade Level : EMPOWERMENT TECHNOLOGIES-12
Reference Module : EMPOWERMENT TECHNOLOGIES MODULE Q2-MODULE1
Date : ________________________________________

I. Introductory Concept:

The internet is the guiding technology of the Information Technology Age just as the
electrical engine was of the Industrial Age. In these times, more and more people are
already engaged in the use of technology. These people who are raised in a digital, media-
saturated world are called digital natives. No doubt, the Internet has been very useful to
us but with the rise of instant messaging, chat rooms, emails and social networking sites,
it can also bring trouble - from cyberbullying to more serious Internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.

II. Learning Skills from the MELCs with code

1. Identify what constitutes appropriate and inappropriate online behavior.


2. Apply internet online safety, security ethics and etiquette standards and practice in
the use of ICTs.
3. Discern possible deceptive information and wrongly evaluated data.

II. Activities

Lesson 2.1: Online Safety, Security and Netiquette


Online safety refers to the practices and precautions that should be observed when using
the internet to ensure that the users as well as their computers and personal information
are safe from crimes associated with using the internet. Below are personal information
that must be kept confidential.
There are numerous delinquencies that can be committed on the internet such as stalking,
identity theft, privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:

1. Never give any personal information out about yourself over the internet.
2. Do not give any banking or sensitive information unless you are sure that it is a
reputable business having a secure service. To make sure that you are in a secured
network, the website address should begin with “https://’ as opposed to “http://”.
3. Never access your accounts by following an email link, instead type your URL by
yourself.

4. Never open messages or attachments from someone you do not know.


5. Regularly review your privacy settings in your online accounts to make sure you are
not sharing important personal information.
6. When using a public computer terminal, be sure to delete your browsing data before
leaving.
7. Keep your software updated to avoid security holes.
8. Do not download or install software or anything on your computer or cell phone that
is unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
Flame war is a series of flame
posts or messages in a thread
that are considered derogatory in
nature or are completely off-
topic. Often these flames are
posted for the sole purpose of
offending or upsetting other users. The
flame becomes a flame war
when other users respond to the
thread with their own flame
message.

Image from: https://twitter.com/Parkster00/status/1246347088625045504

Lesson 2.2: Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over
the years, many internet predators have been playing on vulnerabilities to attack
computers and retrieve sensitive data from individuals. Half the time, we aren’t even aware
it is happening until it is too late.

Online threat is deemed any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners. These are usually done by
computer hacker who uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but
may also employ other protocols and components, such as links in email or Instant
Messaging apps, or any malware attachments on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help absorb infected PCs
into botnets. Web threats pose a broad range of risks, including financial damages,
identity theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-commerce and online
banking.

The following are the top kinds of online threats that you should be aware of:

1. Phishing happens
when an email is
sent from an internet
criminal disguised
as an email from a
legitimate,
trustworthy source.
The message is
meant to lure you into
revealing sensitive or
confidential information.
Image source: https://searchsecurity.techtarget.com/definition/phishing

2. Pharming happens
when a hacker (or
“pharmer”) directs an
internet user to a fake
website instead of a
legitimate one. These
“spoofed” sites can
capture a victim’s
confidential information,
including usernames,
passwords, and credit
card data, or install
malware on their
computer. Pharmers
usually focus on
websites in the financial
sector, including banks,
online payment
platforms, or other e-
commerce destinations.

Image source:https://ed451phishnpharm.weebly.com/how-to-spot-a-fake-website-pharming.html

3. Internet Scam generally refers to someone using internet


services or software to defraud or
take advantage of victims, typically
for financial gain. Cybercriminals
may contact potential victims
through personal or work email
accounts, social networking sites,
dating apps, or other methods in
attempts to obtain financial or other
valuable personal information.
Online scams may come in various
forms such as lottery scam, charity
fraud scams, job offer scams, and
online dating scams to name a few.

4. Internet robots are also known as spiders, crawlers, and web bots. It is a software
application that is programmed to do certain tasks. Bots are automated, which
means they run according to their instructions without a human user. Some bots
are useful, such as search engine bots that index content for search or customer
service bots that help users. Other bots are "bad" and are programmed to break into
user accounts, scan the web for contact information for sending spam, or perform
other malicious activities. If it's connected to the Internet, a bot will have an
associated IP address.

5. Malware or malicious software is any program or file that is harmful to a computer


user. Here are the most common offenders in the rogues’ gallery of malware:
a. Adware (advertising supported software) is unwanted software designed to
throw advertisements up on your screen. Example, pop-up ads and banner
ads.

b. Spyware is malware that secretly observes the computer user’s activities


without permission and reports it to the software’s author. Example is a
keylogger.

c. Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
computer programs and infecting them with its own bits of code.

d. Trojan, or Trojan horse, is one of the most dangerous malware types. It


usually represents itself as something useful in order to trick you. Once it’s
on your system, the attackers behind the Trojan gain unauthorized access to
the affected computer. From there, Trojans can be used to steal financial
information or install threats like viruses and ransomware.

e. Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to get them back.

6. Spams are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be
damaging if you open or respond to it.

7. Cyberstalking refers to the use of the internet or other electronic device to harass
or stalk individuals or organizations.

8. Cyberbullying refers to the act of tormenting, harassing, or embarrassing another


person using the internet.
9. Spoofing happens when someone or something pretends to be something else to
gain our confidence, get access to our systems, steal data, steal money, or spread
malware.

Activity 2.1: Show Me How You Hashtag

Direction: Look at the following images and create a hashtag based on the type of online
threat represented by each image. Write your answers in your activity notebook.

Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/

1. #______________________________ 2. #______________________________
Image source:https://www.gtmaritime.com/free-phishing-penetration-test
Image source:
4.
#__ _____

_______________________
https://dlpng.com/png/6702600

3. #______________________________
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-telco-player-to-benefit-consumers-says-globe-telecom/

5.#_________________________________

IV. Reflection
Reflect on this and write your answers in your notebook.

Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/

From all you have learned in Lesson 2, why is there a need to “think before you
click?”
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
V. Rubrics

Criteria Score
Completeness (5 points) 5 4 3 2 1
Does your response directly answer each part of the question(s)?
Knowledge (10 points) 10 - 8 - 6 - 4 - 2 -
Does your response clearly show you have read and understand the lesson 9 7 5 3 1
content by correctly defining key terms, key persons and summarizing
concepts?
Have you made inferences based on this knowledge to personal or
modern-day applications?
Writing Skills (5 points) 5 4 3 2 1
Do you write clearly, in complete sentences, with minimal errors in
grammar and spelling?

VI. References
Penaso, S.R.(2020) EMPOWERMENT TECHNOLOGIES (Q1-Module 1). Department of Education – Region X –
Northern Mindanao

QUIZ Lesson 2
Directions: Read each item carefully and choose the letter of the correct answer. Write your
answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from one computer
to another either through the internet or local networks or data storage like flash drives and
CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

2. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware

4. What is ransomware based on?


A. Fear of hackers C. Fear of spyware
B. Fear of the Internet D. Fear of losing important files

5. Which of the following is an example of a “phishing” attack?


A. Sending someone an email that contains a malicious link that is disguised to look like an
email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into
entering their login information.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.

6. Which of the following must NOT be done if you received an embarrassing picture from your
friend?
A. Tell your parents or teachers
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.

7. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.

8. What is considered shouting over the Internet?


A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.

9. To avoid being cyber-bullied you should always...


A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.

10. How are you judged in cyberspace?


A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar,
and netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You

You might also like