Lesson 2
Lesson 2
Lesson 2
RULES OF NETIQUETTE
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online
just like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
Remember people have other things to do besides read your email. You are not the center of
their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
Do not take advantage of other people just because you have more knowledge or power than
them.
Treat others as you would want them to treat you if the roles were reversed.
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another
and also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
NOT – searches for the first term and excludes sites that have the second term.