Online Safety, Security, Ethics, and Etiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Are you Safe

and Secure
Online?
How Safe and
Secured are
you Online?
Online Safety
and Security
Online Safety, Security,
Ethics, and Etiquette
Prepared by: Sherwin Santos
The Internet, truly, is a powerful
tool. It can be used to promote your
business, gain new friends and stay
in touch with the old ones. It is also
a source of entertainment through
games, online communities, and
everything in between. But like most
things in this world, there is always
the “other side of the coin.”
The Internet is one of the most
dangerous places, especially if you
do not know what are you doing with
it. But there is no need to worry; it is
never the late. Hopefully, by the end
of this lesson, you are able to
consider how you go about your use
of the internet.
Let’s go back to the

How Safe and


Secured are
you Online?
Type of Information with Risk:
• Mother’s and Father’s Name
• Sibling’s name
• Address
• Home Phone Number
• Birthday
• Email
Type of Information with Risk:
• First Name
• Last Name
• Middle Name
• Current and Previous School
• Cellphone Number
The Internet is defined as the
information superhighway. This
means that anyone has access to
this highway, can place information,
and can grap that information.
Any information, even things that
you have set privately, can be
accessed one way or another.
That’s why social networking sites
like Facebook continue to improve
their security features.

The threat of cybercrime is very real.


While you may not experience the
threat now, whatever information we
share today could affect our future.
INTERNET THREATS
1. Malware – stands for
malicious software.

a. Virus – a malicious program


designed to replicate itself and
transfer from one computer to
another either through the internet
and local networks or data storage
like flash drives.
b.Worm – a malicious program that
transfers from one computer to another
by any type of means.
Trojan 
It might appear harmless and even
useful at first, but it leaves your PC
unprotected, enabling hackers to steal
sensitive information.
d. Spyware – a program that runs in
the background without you knowing it
(thus called “spy”). It has the ability to
monitor what you are doing and typing
through keylogging.
 
  e. Adware – a program designed to
send you advertisements, mostly as
pop-ups.
2. Spam – unwanted email mostly from
bots or advertisers. It can be used to
send malware

3. Phishing – Its goal is to acquire


sensitive personal information like
passwords and credit card details.
Keyloggers
Designed to record the user’s
keystrokes. Keylogging allows criminals
to look for particular bits of information
that can be used for identity or
intellectual property theft.
Rogue security software
A special type of threat is
software that claims to be
security software. It tricks
users that have installed it to
pay a sum of money to be
really protected (which they
will not be). Most often it
pretends to be antivirus and
anti spyware programs.
COPYRIGHT INFRINGEMENT
If you create something – an idea,
invention, literary work, or a research, you
have the right as to how it should be used
by others. This is called Intellectual
Property.
In other words, the copyright law
includes your rights over your work, and
anyone who used it without your consent is
punishable by law.
COPYRIGHT INFRINGEMENT
As a responsible user of the internet, you
have to consider that not everything out
there is free for you to use. Just like your own
contents that you see from websites have
their respective copyrights.
There are several instances where
employees or business owners face copyright
infringement and are sentenced to a huge
fine due to reckless copying of materials.
Here are some tips that could help you
avoid copyright infringement.
1. Understand-Copyright protects literary
works, photographs, paintings, drawings,
films, music( and lyrics), but generally
does not protect underlying ideas and
facts. This means that you can express
something using your own words, but you
should give credit to the source.
Here are some tips that could help you
avoid copyright infringement.
2. Be Responsible – Even if a material does
not say that it is copyrighted, it is not a valid
defense against copyright. Be responsible
enough to know if something has a copyright.
3. Be Creative – ask yourself whether what
you are making is something that came from
you or something made from somebody else’s
creativity. It is important to add your own
creative genius in everything that will be
Here are some tips that could help you
avoid copyright infringement.
4. Know the Law - There are some limitations
to copyrights law. Which means an intellectual
property may be used as long as it is used in
commentaries, criticisms, search engines,
parodies news reports, research, teaching and
education.
What is Netiquette?

Using good manners online or in the


internet.

You might also like