SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Online Safety and Security
Prepared by: Arah Louise C. Apostol
Each individual when accessing the
World Wide Web is concerned with the
safety of his or her terminal or computer and
the information that will be transmitted or
received.
Spam
• Refers to the transmission
of unsolicited messages
from various origins
using electronic
messaging systems such
as e-mail and chat
messengers
• A tool for advertisement
• Unsolicited bulk e-mail
(UBE)
Phishing
• Defined as a software or
a program used by an
attacker to obtain
personal information
• Commonly target user
passwords to hack and
take control of a user
account
Malware
• Short term for malicious
software
• A computer software
sent by attackers to
inflict chaos on a
computer’s operation
and processes
How to avoid these threats?
A very effective way of avoiding these threats is
verifying the authenticity and credibility of the Web source.
The methods are similar to the methods of verifying the
authenticity of information from the World Wide Web.
Government Provisions
for Online Courtesy and
Etiquette
The Philippine government ensures the
welfare of its people in their ICT experience by
enacting various laws and regulations. There are
incidents of theft, scam, phishing and other
activities that victimize Filipino people.
Republic Act 10627
or Anti-Bullying Act of 2013
What is Bullying?
• Defined as “severe or repeated use by one or more
students of a written, verbal or electronic expression, or a
physical gesture, or any combination thereof, directed to
another student that has the effect of actually causing or
placing the latter in reasonable fear of physical or
emotional harm or damage to his property.”
This law includes protection of individuals
from bullying through electronic means.
Bullying invades an individual’s privacy by
using photos and other information meant to
disgrace that individual.
Republic Act 10175
or Cybercrime Prevention Act of 2012
This law protects an individual from
various unwanted online and cyber acts that
may harm or evade one’s privacy and
integrity.
Cybercime offenses include, but are not
limited to:
• Integrity and availability of data
• Illegal access of computers through remote means
without permission
• Interception of one’s information from a private
conversation or correspondence
• Acquisition of passwords and other vital information
from an individual
• Computer forgery
• Libel
Online Safety and Security

Weitere ähnliche Inhalte

Was ist angesagt?

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure Grayzon Gonzales, LPT
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJohan Koren
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesJuvywen
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it eraFroilan Cantillo
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxFroilan Cantillo
 

Was ist angesagt? (20)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Lesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposesLesson 4- Developing ict content for specific purposes
Lesson 4- Developing ict content for specific purposes
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
 

Andere mochten auch

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLea Rodriguez
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 

Andere mochten auch (8)

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 

Ähnlich wie Online Safety and Security

Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and SecurityPaulFajardo7
 
ONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYPaulFajardo7
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reportsjcgevana
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 

Ähnlich wie Online Safety and Security (20)

Online Safety and Security
Online Safety and SecurityOnline Safety and Security
Online Safety and Security
 
ONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITY
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Presentation1.ppt
Presentation1.pptPresentation1.ppt
Presentation1.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 

Kürzlich hochgeladen

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Kürzlich hochgeladen (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Online Safety and Security

  • 1. Online Safety and Security Prepared by: Arah Louise C. Apostol
  • 2. Each individual when accessing the World Wide Web is concerned with the safety of his or her terminal or computer and the information that will be transmitted or received.
  • 3. Spam • Refers to the transmission of unsolicited messages from various origins using electronic messaging systems such as e-mail and chat messengers • A tool for advertisement • Unsolicited bulk e-mail (UBE)
  • 4.
  • 5. Phishing • Defined as a software or a program used by an attacker to obtain personal information • Commonly target user passwords to hack and take control of a user account
  • 6.
  • 7. Malware • Short term for malicious software • A computer software sent by attackers to inflict chaos on a computer’s operation and processes
  • 8. How to avoid these threats? A very effective way of avoiding these threats is verifying the authenticity and credibility of the Web source. The methods are similar to the methods of verifying the authenticity of information from the World Wide Web.
  • 9. Government Provisions for Online Courtesy and Etiquette
  • 10. The Philippine government ensures the welfare of its people in their ICT experience by enacting various laws and regulations. There are incidents of theft, scam, phishing and other activities that victimize Filipino people.
  • 11. Republic Act 10627 or Anti-Bullying Act of 2013
  • 12. What is Bullying? • Defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.”
  • 13. This law includes protection of individuals from bullying through electronic means. Bullying invades an individual’s privacy by using photos and other information meant to disgrace that individual.
  • 14. Republic Act 10175 or Cybercrime Prevention Act of 2012
  • 15. This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity.
  • 16. Cybercime offenses include, but are not limited to: • Integrity and availability of data • Illegal access of computers through remote means without permission • Interception of one’s information from a private conversation or correspondence • Acquisition of passwords and other vital information from an individual • Computer forgery • Libel