Lesson 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Online Safety,

Security,
Ethics and
Etiquette
Most Essential
Learning
Competency
Apply online safety, security, ethics and
etiquette standards and practice in the use
of ICTs as it would relate to your specific
professional track
(CS_ICT11/12-ICTPT-Ia-b2).
Specific Learning Objectives:

01 02 03
Illustrate the power of Choose online
Identify the
netiquette by safety and
internet threats
determining which security measures
from the given
internet threats will be for the given
scenario.
avoided. scenario
appropriately.
ANAGRAM

ACTIVITY 1
Drag the letters into their correct position to
unscramble the words or group of words.
EMAIL SCAM

Usually unsolicited commercial email sent from an


unknown source with identical message sent to
multiple recipients
EMAIL SPOOFING

creation of emails with a forged sender address. The


goal of email spoofing is to get recipients to open,
respond and engage with the email message
PISHING

is a deceitful practice of getting your personal


information using email or text messages.
Scammers may try to steal your passwords,
account numbers, or Social Security numbers
PHARMING

is a scamming practice in which malicious code is


installed on a personal computer or server,
misdirecting users to fraudulent Web sites without
their knowledge or consent.
COMPUTER VIRUS

are small programs or scripts that can negatively affect


the health of your computer. These malicious little
programs can create files, move files, erase files,
consume your computer's memory, and cause your
computer not to function correctly
SPYWARE

is software that "spies" on your computer


where it captures information like Web
browsing habits, e-mail messages,
usernames and passwords, and credit card
information
POP-ADS

It can also be used by hackers to steal your


personal information (such as your bank details).
HACKER

a clever or expert programmer who can gain


unauthorized access to other computers. He can
"hack" his way through the security levels of a
computer system or network
Common
Threats to
Personal
Safety
Cyberstalking
is the same as physical stalking by giving unwanted
obsessive attention to a specific person like following, secret
surveillance, persistent and manipulative calling and
texting, and other means of approaching the victim
unexpectedly but cyber stalkers rely on online technology
to do it.
Cyberbullying
is bullying that takes place over digital devices like cell
phones, computers, and tablets. It can occur through SMS,
Text, and apps, or online in social media, forums, or gaming
where people can view, participate in, or share content
Online predation
is the act of engaging an underage minor into inappropriate
sexual relationships through the internet. Online predators
may attempt to initiate and seduce minors into
relationships through the use of chat rooms or internet
forums.
Flaming
is the act of saying mean things online, usually in ALL
CAPS, and often in a public forum with the intention to
humiliate
Online Ethics
and Etiquette
Online ethics focus on the acceptable use of online
resources in an online social environment.

Netiquette is a combination of the words network and


etiquette and is defined as a set of rules for acceptable
online behaviour
10 Basic Rules of Netiquette
1. Make real people a 5. Choose online 9. Update online
priority. friends wisely. information.

2. Use respectful 6. Respect people’s 10. Think before


language. privacy. you click.

3. Share with 7. Fact check before


discretion. reposting.

4. Don’t exclude 8. Respond to emails


others. promptly.
ACTIVITY 2
In the table below, mark with a check ( / ) the internet threats that can be avoided in
doing each netiquette.
Internet Threats

Netiquette a b c d e f g h i j

Make real people a / / / /


priority.
Use respectful language. / /

Share with discretion. / / / / /

Don’t exclude others. / /

Choose online friends / / / /


wisely.
ACTIVITY 2
In the table below, mark with a check ( / ) the internet threats that can be avoided in
doing each netiquette.
Internet Threats

Netiquette a b c d e f g h i j

Respect people’s privacy / / / /


Fact check before
reposting / / / / /

Respond to emails
promptly /
Update online information
/
Think before you click
/ / / / / / /
ACTIVITY 2

a. Computer Virus
b. Cyberbullying
c. Cyberstalking
d. Flaming
e. Hacker
f. Online Predation
g. Pharming
h. Phishing
i. Spam
j. Spyware
ACTIVITY 3

a. Computer Virus
b. Cyberbullying
c. Cyberstalking
d. Flaming
e. Hacker
f. Online Predation
g. Pharming
h. Phishing
i. Spam
j. Spyware
ACTIVITY 4
1. What kind of an
internet threat do
you think is this?
2. Why is this a
threat to you?
3. What can you do
to avoid this?
4. How will you
reconstruct the
message so it will
not be hurtful?

You might also like