Online Safety, Security, Ethics, and Etiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

Online Safety,

Security,
Ethics, and
Etiquette
Are you Safe
and
Secured
How Safe
and Secured
are you
online?
Internet is defined as the
information superhighway.
This means that anyone
has access to this
highway, can place info,
and can grab that info.
Types of Information with Risk:
 Mother’s and Father’s name
 Sibling’s Name
 Address
 Home Phone Number
 Birthday
 Email Address
Types of Information with Risk:
First Name
Last Name
Middle Name
Current and Previous
School
Cellphone Number
Some Tips to Stay Safe Online:
Be mindful on what you
share online.
Do not just accept terms and
conditions, read it.
Do not share your password
with anyone.
Some Tips to Stay Safe Online:
Do not talk to strangers
whether online or face-to-
face.
Never post anything about a
future vacation.
Add friends you know in real
life.
Some Tips to Stay Safe Online:
Avoid visiting untrusted
websites.
If you have WiFi at home,
make it private by adding a
password.
Some Tips to Stay Safe Online:
Install and update an
antivirus software on your
computer.
Some
Antivirus:
BitDefender
Some
Antivirus:
ESET NOD32
Some
Antivirus:
F-Secure
Some
Antivirus:
Kaspersky
Some
Antivirus:
Norton
Some
Antivirus:
AVAST
Some
Antivirus:
SMADA
V
Some Tips to Stay Safe Online:
Avoid downloading anything
from untrusted websites.
Buy the software, do not use
pirated ones.
Do not reply or click links
from suspicious emails.
Internet
Threats
Internet Threats:
1. Malware – stands for
malicious software.

5 Types of Malware:

a. Computer Virus – a malicious


program designed to replicate itself
and transfer from one computer to
another (internet, local networks, FDs,
CDs, etc.)
Internet Threats:
5 Types of Malware:

b. COMPUTER Worm – a
malicious program that
transfers from one
computer to another by
any types of means.
Internet Threats:
5 Types of Malware:

c. Trojan Horse – a malicious


program that disguises as a
useful program but once
downloaded or installed, leaves
your PC unprotected and allows
hackers to get your information.
Internet Threats:
5 Types of Malware:

d. Spyware – a program that


runs in the background without
you knowing it (thus called
“spy”). It has the ability to
monitor what you are currently
doing and typing through
keylogging.
Internet Threats:
5 Types of Malware:

e. Adware – a program
designed to send you
advertisements, mostly as
pop-ups.
Internet Threats:
2. Email Spam – also known as
junk email an unwanted email
mostly from bots or advertisers. It
can be used to send malware.
Email Spoofing – sender
address is changed so that it would
appear to have come from a
different source
TIPS FOR RECOGNIZING EMAIL SCAMS

To identify them, look for:


• bad grammar, typo, unnatural syntax
• lack of or improper use of official letterhead and logos
• missing approval footers
• broken or badly formatted images
• empty threats
• instructions to click a link or verify/reactivate accounts
• demands for passwords or other sensitive information
• suspicious links outside of a Drexel or affiliate domain
(hover over them, but DON'T CLICK)
Internet Threats:
3. Phishing – deceitful practice of trying
to get confidential information such as
passwords and usernames, and credit card
details by making it appear as if it comes from
a trustworthy source.
Internet Threats:
4. Pharming – a dangerous hacker
attack on a website which directs all
traffic to that web site to another
fictitious web site. The main object of
pharming is to obtain username and
passwords, as well as credit card and
financial information.
Internet Threats:
5. Hacker - a person who is
able to enter and control other
people’s computer without
authorization. Can obtain
personal information, intellectual
property and performs credit
card fraud.
Windows Security
Security Center
- it is a place in Windows where you can set
additional protection from threat to your
computer, especially when using the internet.
Three important security settings available;
1. Firewall – helps in protecting your computer
from unauthorized entries, viruses, or
worms from the internet or network.
2. Automatic Updates – when turned on will
automatically download updates from
Microsoft Windows Website.
Security Center
3. Virus Protection – usually about the current
antivirus installed in your computer; this option
is recommended to be turned on always.
Online Ethics and Etiquette
- Guidelines and rules in the appropriate use of
computer technology.
- There are ten commandments of
computer ethics written by Dr. Ramon C.
Barquin in 1992 for the Computer Ethics
Institute.
Ten Commandments for Computer Ethics
1. Thou shalt not use a computer to harm other
people. 
2. Thou shalt not interfere with other people’s
computer work.
3. Thou shalt not snoop around in other people’s
computer files. 
4. Thou shalt not use a computer to steal. 

5. Thou shalt not use a computer to bear false


witness. 
Ten Commandments for Computer Ethics
6. Thou shalt not use or copy software for which you have
not paid. 
7. Thou shalt not use other people’s computer resources
without authorization. 
8. Thou shalt not appropriate other people’s intellectual
output. 
9. Thou shalt think about the social consequences of the
program you are write
10. Thou shalt use a computer in ways that show
consideration and respect.
Think
before
you click!

You might also like