LESSON-2-Online-Safety-Security-Ethics-and-Etiquette

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Lesson 2: Online

Safety, Security,
Ethics, and Etiquette
Welcome to this presentation on online safety, security,
ethics, and etiquette. This is a crucial topic in today's
digital world, where we spend a significant amount of
time online.

rn
By Rou Ann A. Navarroza
TOPIC OUTLINE
1 Online safety/Internet Safety

2 Online Threats and Types

3 Online Safety Measures

4 Online Ethics and Netiquette


Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be
observed
Type of Information Risks
First Name A big possibility that a hacker may already
know plenty of stuff about you even if you
only give out your first name.
Last Name If sharing your first name is a small risk,
having both your first and last is riskier. You
will be vulnerable to being searched for using
search engines, which include image search.
Matching a name with a face is modus to
several cybercrimes like identity theft.
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be
observed
Type of Information Risks
Middle Name Sharing your middle name alone is probably not the riskiest
of this shared information but sharing your full name would
be.
Current and previous school(s) Most people who steal identities study their subject. They
can use this information for verification purposes.
Your cell phone number This should never be posted because internet is a public
place. It is the same as posting your number on a billboard.
You would not want random strangers to text or call you, or
worse, pretend that they are someone else.
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be
observed
Type of Information Risks
The name of your Risky, yet not as risky as posting their full
mother and father names, esp. your mother’s maiden name. In
fact, you may have already encountered many
websites that require your mother’s maiden
name as an answer to a secret question
whenever you lose your password.
The name of your This is a huge risk. Strangers may pretend or
siblings use their identity to fool you.
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be
observed
Type of Information Risks
Your address Hopefully, you answered “no” to this one. Giving
the internet your number is one thing; giving them
your address is a whole other level. It would be
much easier for criminals to find you.
Your home phone number This shared information is riskier than sharing your
personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends
to be you.
Lesson 2.1: Online Safety, Security and Netiquette
Online safety refers to the practices and precautions that should be
observed

Type of Information Risks


Your birthday Letting people know your birthday is probably a
must if you want to get as many gifts as possible.
But having it in your profile makes you vulnerable to
identity theft.
Internet is defined as the information
superhighway means that anyone has access to
this highway, can place information, and can grab
that information. Therefore, everyone is a prospect
to cybercrime threats. We may not experience it
now but whatever information we share today
could affect our future. With this reason, social
networking sites like Facebook continue to improve
their security features.
There are numerous delinquencies that can be committed on the
internet.
• stalking
• identity theft
• privacy violations
• and harassment.
ONLINE SAFETY MEASURES
 Never give any personal information out about yourself over the
internet.
 Do not give any banking or sensitive information unless you are
sure that it is a reputable business having a secure service. To make
sure that you are in a secured network, the website address should
begin with “https://’ as opposed to “http://”. Never access your
accounts by following an email link, instead type your URL by
yourself.
ONLINE SAFETY MEASURES
 Never open messages or attachments from someone you do
not know.
 Regularly review your privacy settings in your online
accounts to make sure you are not sharing important
personal information.
 When using a public computer terminal, be sure to delete
your browsing data before leaving.
 Keep your software updated to avoid security holes.
 Do not download or install software or anything on your
computer or cell phone that is unknown to you.
ONLINE SAFETY MEASURES
 Be mindful of what you share online and what site you share
it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website to learn how
the website handles the information you share.
 Know the security features of the social networking site you
use.
 Do not share your password with anyone.
 Avoid logging in to public networks/Wi-Fi.
ONLINE SAFETY MEASURES
 Do not talk to strangers whether online or face-to-face.
 Never post anything about a future vacation.
 Add friends you know in real life.
 Avoid visiting untrusted websites.
 Install and update an antivirus software on your computer.
 If you have a Wi-Fi at home, make it a private network by
adding a password.
 Avoid downloading anything from untrusted websites.
 Buy the software; do not use pirated ones.
 Do not reply or click links from suspicious emails.
ONLINE THREATS

Any malicious act that attempts to gain access to a computer


network without authorization or permission from the owners.
These are usually done by computer hackers who uses the
World Wide Web to facilitate cybercrime.
Malware
Malware refers to any malicious software designed to infiltrate and damage
computer systems. It can take various forms, each with its own purpose and
methods of infection.

Viruses Worms Trojan Horses


Replicate and spread to Self-replicating Disguised as legitimate
other files, corrupting programs that spread software, they grant
data and causing through networks, malicious actors
system instability. consuming bandwidth unauthorized access to
and overloading systems, potentially
resources. leading to data theft.
Malware
Malware refers to any malicious software designed to infiltrate and damage
computer systems. It can take various forms, each with its own purpose and
methods of infection.

SPYWARE Adware
A programs that runs A program designed to send
in the background you advertisement mostly as pop-ups.
without you knowing
it. It can monitor what
you are currently doing
and typing through key
logging.
EFFECT OF COMPUTER VIRUS

• It can slow down your computer.


• It might corrupt your system files.
• It might make some programs faulty or corrupt.
• It might damage your boot into the windows.
• It might steal important information from your computer and
send to some other person.
• It might change the power ratings of your computer and could
blast the system.
2. Spam – unwanted email mostly from
bots or advertisers. It can be used to send
malware.
3. Phishing – its goal is to acquire
sensitive personal information like
passwords and credit card details.
Pharming – a more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system.

Ex.
Email phishing
SMS phishing
Voice Phishing
Social Media Phishing
Cybercrime
Cybercrime encompasses any illegal activity that utilizes
computers or networks. It's a broad category,
encompassing various types of attacks that can have
severe consequences for individuals, businesses, and
even governments.
Financial Crimes Data Breaches
1 Cybercriminals can exploit 2 Hackers can infiltrate
vulnerabilities in financial systems to steal sensitive
systems to steal money or personal information,
defraud individuals. leading to identity theft and
other serious problems.
Intellectual Property Theft
4 Disruption of Services
3 Attacks can disrupt critical
Cybercriminals can steal
valuable intellectual services, like power grids,
property like trade secrets, communication networks,
patents, or copyrighted or healthcare systems,
materials. causing widespread
chaos.
Protecting Yourself Online
Staying safe online requires awareness and proactive measures. By
taking precautions and using common sense, you can significantly reduce
your risk of becoming a victim of cybercrime.

Strong Passwords Secure Browsing


Use unique, complex passwords Use a reputable web browser with
for all your online accounts and up-to-date security settings, and
avoid reusing passwords across be wary of suspicious links or
multiple sites. websites.

Regular Updates Antivirus Protection


Install software updates promptly Use a reliable antivirus program to
to patch vulnerabilities that detect and remove malware from
cybercriminals can exploit. your devices.
Think Before You Click Things
1. Once you post something on the web, you have no
control of who sees your posts.
2. Your friends depend on you to protect their reputation
online.
3. Set your post to “private”.
4. Avoid using names. Names are easy for search engines
to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it down or
report it as inappropriate.
Digital Citizenship: Responsible
Online Behavior
Being a responsible digital citizen involves adhering to ethical principles and
contributing to a positive online environment. This includes being respectful,
truthful, and mindful of others.
Respect for Others
Treating others online with the same respect and kindness you would offline.

Truthfulness
Avoiding spreading misinformation or engaging in deceptive practices.

Privacy Awareness
Respecting others' privacy and not sharing personal
information without permission.
Ethical Considerations in the Digital Realm
Ethical considerations are essential in the digital realm. Understanding the impact of our online actions and respecting others' rights is crucial for
responsible online behavior.

Digital Copyright Respecting intellectual property rights and obtaining proper


permissions before using copyrighted material.

Data Privacy Protecting sensitive information and being transparent about how data
is collected, used, and stored.

Online Deception Avoiding spreading misinformation or engaging in deceptive practices,


such as fake accounts or misleading content.
Copyright Infringement If you create
something like an idea, an invention, a form of
literary work, or a research, you have the right
as to how it should be used by others. This is
called “intellectual property. The copyright
law includes your rights over your work, and
anyone who uses it without your consent is
punishable by law.
Tips to avoid copyright infringement
1. Understand.
2. Be responsible enough to know if something has a
copyright.
3. Be creative.
4. Know the law.
Conclusion and Key Takeaways
Online safety, security, ethics, and etiquette are crucial aspects of responsible digital citizenship. By understanding these concepts and
implementing best practices, we can navigate the digital world safely and responsibly.

Protect Your Information Practice Good Etiquette


Use strong passwords, secure connections, and be cautious of Treat others with respect, avoid offensive language, and be mindful
phishing attempts. of what you share.

You might also like