2. The Core Rules
of Netiquette
Rule 1: Remember the human
The golden rule must apply even in
the cyberspace. You do not see the
facial expressions of a person.
When communicating with a
person, especially with a stranger,
always ask the question: "Would
you say it to the person's face?
3. The Core Rules
of Netiquette
Rule 2: Adhere to the same
standards of behaviour online
that you follow in real life
You should not change your
persona whenever you are in
front of the screen.
4. The Core Rules
of Netiquette
Rule 3: Know where you are in cyberspace.
There are different areas or domains in the
cyberspace and the type of people also
vary. The culture or self- imposed rules
(on posting) varies on different websites.
This is prevalent in forum boards and on
social media services where anyone can
comment.
5. The Core Rules
of Netiquette
Rule 4: Respect other people's time and
bandwidth.
Rule 5: Make yourself look good online.
You will mostly be judged for your writing, so
read and read in order to make comments and
messages with good spelling and grammar
6. The Core Rules
of Netiquette
Rule 6: Share expert
knowledge.
The internet was founded on the
idea that scientist wanted to share
their knowledge. Do not be afraid
to tell what you know
7. The Core Rules
of Netiquette
Rule 7: Help keep flame wars
under control.
Be a referee and know how
to control other people's
emotions
8. The Core Rules
of Netiquette
Rule 8: Respect other people's
privacy.
Do not snoop into other people's
private accounts, especially their
files and, messages. This is
prevalent when phone has been
stolen or when an account has
been left logged on a public
computer, such as library
9. Online Safety and
Ethics
Keeping yourself safe
online
1. Check for virus and malware.
2. Do an account Security Check
up.
3. Google has a Security Check
up Feature in your account's
page that allows an overall
check-up and for a possible
update of your details.
10. Online Safety and
Ethics
Keeping yourself safe
online
4. Update your account recovery
options.
5. Enroll in 2-step verification.
6. Google allows you to add an
extra layer of security by requiring
you to grab a code sent to your
phone after logging in with your
password.
11. Online Safety and
Ethics
Keeping yourself safe
online
7. Perform regular operating
system and browser updates.
8. Never use your Google Account
Password on another websites.
9. Protect your password.
10. Use a strong password
12. Phishing Scams
Phishing scams are
attempts by scammers to
trick you into giving out
personal information
such as your bank
account numbers,
passwords and credit
13. How does this scam
work?
A scammer contacts you
pretending to be from a legitimate
business such a bank, telephone
or internet service provider. You
may be contacted by email, social
media, phone call, or text
message.
14. How does this scam
work?
The scammer asks you to provide
or confirm your personal details.
For example, the scammer may
say that the bank or organization is
verifying customer records due to
a technical error that wiped out
customer data. Or they may ask
you to fill out a customer survey
and offer a prize for participating.
15. Other types of
Phishing Scams
Whaling and spear
phishing - the scammer
targets a business in an
attempt to get
confidential information
for fraudulent purposes.
16. Other types of
Phishing Scams
Pharming - the scammer
redirects you to a fake version of
a legitimate website you are
trying to visit. This is done by
infecting your computer with
malware which causes you to be
redirected to the fake site, even
if you type the real address or
click on your bookmarked link.
17. Warning Signs in
Phishing
1. You receive an email, text
or phone call claiming to be
from a bank,
telecommunications provider
or other business you regularly
deal with, asking you
to update or verify your details.
18. Warning Signs in
Phishing
2. The email or text
message does not address
you by your proper name
and may contain typing
errors and grammatical
mistakes.
19. Warning Signs in
Phishing
3. The website address
does not look like the
address you usually use
and is requesting details
the legitimate site does
not normally ask for.
20. Warning Signs in
Phishing
4. You notice new icons
on your computer
screen, or your computer
is not as fast as it
normally is.