Anzeige
Anzeige

Más contenido relacionado

Anzeige

EMT 11_12 Q1 0201 PF LED.pptx

  1. Empowerment Technologies Senior High School Applied - Academic Unit 2: Online Safety and Ethics Lesson 1 Making One’s Self Safe in the Cyber World
  2. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT How would you describe the features of the app and platform that help protect its users from Internet dangers and threats? 2
  3. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT What are the possible ways that you can think of to protect yourself from different online threats? 3
  4. Learning Objectives At the end of the lesson, you should be able to do the following: ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 4 ● Define the cyber world and its features. ● Identify and examine different online threats and dangers. ● Practice various ways to be safe in the cyber world.
  5. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Are you familiar with these images? What do these images mean? 5
  6. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT What is a password? ● a combination of texts, numbers, and/or special characters to secure accounts ● can be weak (e.g. names, common words, birthdates, etc.) or strong (combination of all characters) 6
  7. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 1. Study the passwords in the succeeding slides. 2. Classify each password as either a weak password or a strong password. 3. Write your answer in the table. Classifying the Password 7
  8. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Classifying the Password 8 Weak Password Strong Password
  9. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Classifying the Password 9 vince15 alp@c@Pet2020 password_1 _paramore_for3ver_ StrongPassword 12345678ABC juandelacruz1994 Hola_amigo! Beautiful G!v3_m3_Sunsh!n3 helloWorld123 Els@+AnN@_uWu 09_09_2001 erica_sanchez 67a12b90c_me l!v3_l@ugh_l0v3
  10. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 1.Among all the words included in the activity, which password(s) was the hardest to classify? Which was the easiest? Classifying the Password 10
  11. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 1.What suggestions can you give to protect online accounts aside from creating a strong password? Classifying the Password 11
  12. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 1.x 2.What would be the effect of not having strong security and password for your online accounts? Classifying the Password 12
  13. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT What is the Cyber World? 13
  14. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT The Cyber World, also known as Cyberspace, is virtual in nature and unbounded unlike our physical environment. 14
  15. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT What are the features of the Cyber World? 15
  16. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Virtual Self ● a digital representation of humans to interact in virtual world 16 16
  17. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Source of Information ● data that are available to anyone as long as they have an internet connection 17 17
  18. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Social Interaction ● digital socialization using chat, blogs, vlogs, online games, etc. 18
  19. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Tools for Social Interaction ● Facebook ● Twitter ● Tumblr ● Instagram ● Online games (Mobile Legends, COL, etc.) 19
  20. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Dangers and Threats on the Internet 20
  21. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Hacking ● stealing and accessing private information of organizations such as government systems, business systems, etc. 21
  22. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Identity Theft ● the act of stealing important information from the target user by accessing online accounts such as bank accounts, etc. 22
  23. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Internet Predators ● individuals who lure children or teenagers to engage in sexual acts or relationships online 23 23
  24. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Cyberbullying ● an online act of humiliation and/or threats that is done with and by children and teenagers 24 24
  25. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Malicious Software ● also known as malware, is created to invade and destroy computer systems 25
  26. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Types of Malware ● virus ● worms ● trojan ● spyware ● adware ● ransomware ● fileless malware 26
  27. 27 About the dangers and threats you may encounter in cyberspace, can you think of any ways to avoid these threats?
  28. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Stay Safe Online How can you safeguard your virtual identity? 28
  29. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 29 1. Think before you click. 2. Do not share personal information. 3. Beware of phishing and scam.
  30. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 30 4. Keep your device secure. 5. Never share passwords. 6. Never agree to meet anyone you just met online.
  31. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 31 7. Tell your guardian if something goes wrong online. 8. Cover your webcam when not in used. 9. Use a strong password. 10.Make sure to logout your account in public devices.
  32. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Practice 1 Listed on the next slide are different dangers and threats on the Internet. Classify the following items as: unsuitable content, crime-related, privacy- related, or malicious software- related. 32
  33. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 33 ● gender discrimination ● hate speech ● trojan horse ● DNSMessenger ● Computer worm ● computer virus ● pornography ● violence on games ● adware ● unauthorized access to private files ● phishing ● distribution of private photos ● spyware ● identity theft ● ransomware ● unauthorized location tracking ● pedophiles ● hackers ● adware ● racism
  34. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 34 Unsuitable Content Crime-Related Privacy- Related Malicious Software- Related
  35. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Practice 2 Study the situations on the next slide. Choose two (2) situations and describe what you would do in each in order to be safe. 35
  36. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT ● A stranger added you on Facebook. He claimed that you are schoolmates. Upon checking his profile, you saw that you knew that person and that he was a year older than you. He then asked to meet you and added that you should wear a pretty short dress when the two of you meet. ● Your bank emailed you to reset your password as soon as possible because there was a breach in their system. The email seemed legit but the link was shortened and the email address was not the name of your bank. ● You got blocked from your bank account. As you talked to the customer support to unblock your account, the person on the other line asked for your name, account number, and pin to be able to unblock you on their system. ● One of your classmates was spreading rumors that you had a bad attitude and that you called her a liar in front of her friends. She even edited your awkward photo to become funny and shared it on Facebook. People started calling you funny names in school and online since she posted the photo. ● An advertisement just popped up on your browser saying that you won a flat screen TV, and you just need to confirm your identity on the link provided to claim the prize. 36
  37. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT 37 Situation Your Response
  38. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Answer the following completely in your own words: 1. What is the cyber world? 2. What are the main features of the cyber world and how can we use these features? 38
  39. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Answer the following completely in your own words: Give three (3) dangers on the Internet and explain how each one can harm you. 39
  40. ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT ENGAGE EXPLORE EXPLAIN EXTEND EVALUAT Answer the following comprehensively: How useful is the Internet in your daily life? Does it always benefit you? 40
  41. Wrap Up The cyber world allows us to navigate through a virtual world, interact with other people through the use of the internet, and retrieve data from the vast information available online. The Internet is very powerful but along with these advancements, we can encounter risks such as exposure to unsuitable content, crime-related dangers, privacy-related dangers, and malicious software. 41
  42. Wrap Up Being a generation of technology-dependent human beings, we need to be more careful on the internet to avoid risks. We protect ourselves by simply creating strong passwords, and by avoiding sharing personal information with others, especially with strangers. 42
  43. Bibliography 43 “About the Cyber World.” ICT Connection. https://ictconnection.moe.edu.sg/cyber-wellness/cyber-wellness-101/about- the-cyber-world (accessed February 21, 2020). Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?” Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen College, 16 May 2018. https://www.rasmussen.edu/student- experience/college-life/what-is-digital-footprint/ “Guidelines for Strong Passwords.” Information Technology Services Guidelines for Strong Passwords Comments. https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21, 2020). “How to Stay Safe Online.” Bullying UK. https://www.bullying.co.uk/cyberbullying/how-to-stay-safe-online/ (accessed February 22, 2020).
  44. Bibliography 44 Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads. Goodreads. Accessed February 22, 2020. https://www.goodreads.com/work/quotes/45331179-you-are-what-you- tweet-harness-the-power-of-twitter-to-create-a-happier Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of Cyberspace and Analysis of Cyber Educational Institutions”. Accessed February 21, 2020. https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71 ef076.pdf Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity Magazine, 3 Aug. 2018. https://www.uscybersecurity.net/malware/ “Staying Safe Online.” Childline. Accessed February 22, 2020. https://www.childline.org.uk/info-advice/bullying-abuse-safety/online- mobile-safety/staying-safe-online/ Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21, 2020. https://wiki.uiowa.edu/display/edtech/Internet+Dangers
  45. Bibliography 45 “What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020. https://www.cisco.com/c/en/us/products/security/advanced-malware- protection/what-is-malware.html#~related-topics

Hinweis der Redaktion

  1. note to teacher:
  2. Sample answers: 1. The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other. 2. The main features of the Cyber World are virtual world, interaction, and information source. We can use the virtual world as a “second life space” where we can make a digital representation of ourselves. The interaction feature on the other hand lets us have social interactions such as chatting, sharing ideas on an online community, teaming up with players on an online-game, or finding people with similar interests. Lastly, the cyber world contains a lot of information that is readily available for us making it a major information source.
  3. Students answer may vary.
  4. Answers may vary but you may expect them to apply examples from the discussed lesson.
Anzeige