SlideShare ist ein Scribd-Unternehmen logo
1 von 42
TVL Building, Goa NHS March 2, 2021
By the end of this lesson, the
students are expected to: 1. Identify what constitutes
appropriate and
inappropriate online
behavior;
2. Apply Internet online
safety, security ethics and
etiquette standards and
practices in the use of
ICTs;
3. Discern possible
deceptive information
and wrongly evaluated
data.
Pick a Pic
DIRECTION:
• The teacher will show some images to
the students related with the
upcoming discussion.
• Each student will be given 1 minute to
write their observation on the
following images.
• After the activity the student will
share their observation about the
image.
Activity 1
Online Safety, Security,
Ethics and Netiquette
The internet is the guiding technology of
the Information Technology Age just as the
electrical engine was of the Industrial Age. In
these times, more and more people are already
engaged in the use of technology. These people
who are raised in a digital, media-saturated
world are called digital natives.
No doubt, the Internet has been very
useful to us but with the rise of instant
messaging, chat rooms, emails and social
networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers,
including exposure to sexual predators. Thus,
internet safety is always our primary concern.
There's almost no limit to what you
can do online. The Internet makes
it possible to access information
quickly, communicate around the
world, and much more.
Unfortunately, the Internet is also
home to certain risks, such as
malware, spam, and phishing. If
you want to stay safe online, you'll
need to understand these risks
and learn how to avoid them.
HOW SAFE
ARE YOU ?
DIRECTIONS:
Read and reflect each item
carefully. Put check in the space
you have shared or not shared
these pieces of information in all
your social media accounts.
Activity 2
1. How many of these information have you SHARED?
2. How many of these information have you NOT SHARED?
3. Based from your answers, do you think you are safe
when using the internet? Why?
Lesson 2.1:
Online Safety, Security,
Ethics and Netiquette
Online safety refers to
the practices and
precautions that should
be observed when using
the internet to ensure that
the users as well as their
computers and personal
information are safe from
crimes associated with
using the internet.
Online Safety
Numerous delinquencies/minor
crime that can be committed
on the internet:
•Stalking
•Identity theft
•Privacy violations
•Harassment
Online Safety Measures
• Never give any personal
information out about
yourself over the
internet.
• Do not give any banking
or sensitive information
unless you are sure that
it is a reputable business
having a secure service.
To make sure that you
are in a secured
network, the website
address should begin
with “https://’ as
opposed to “http://”.
Never access your
accounts by following an
email link, instead type
your URL by yourself.
Online Safety Measures
• Never open messages or attachments
from someone you do not know.
• Regularly review your privacy settings in
your online accounts to make sure you
are not sharing important personal
information.
• When using a public computer terminal,
be sure to delete your browsing data
before leaving.
• Keep your software updated to
avoid security holes.
• Do not download or install
software or anything on
your computer or cell phone
that is unknown to you.
Online Threats
Is deemed any malicious act that
attempts to gain access to a
computer network without
authorization or permission from
the owners. These are usually
done by computer hackers who
uses World Wide Web to facilitate
cybercrime.
Types of Online Threats • Phishing
• Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Phishing
Phishing happens when an
email is sent from an internet
criminal disguised as an
email from a legitimate,
trustworthy source. The
message is meant to lure
you into revealing sensitive
or confidential information.
Pharming
Pharming happens when a
hacker (or “pharmer”) directs an
internet user to a fake website
instead of a legitimate one.
These “spoofed” sites can
capture a victim’s confidential
information, including
usernames, passwords, and
credit card data, or install
malware on their computer.
Pharmers usually focus on
websites in the financial sector,
including banks, online payment
platforms, or other e-commerce
destinations.
Internet Scam
Internet Scam generally refers to
someone using internet services or
software to defraud or take advantage
of victims, typically for financial gain.
Cybercriminals may contact potential
victims through personal or work email
accounts, social networking sites,
dating apps, or other methods in
attempts to obtain financial or other
valuable personal information. Online
scams may come in various forms such
as lottery scam, charity fraud scams,
job offer scams, and online dating
scams to name a few.
Internet Robots
Internet robots are also known as spiders, crawlers, and web
bots. It is a software application that is programmed to do certain
tasks. Bots are automated, which means they run according to
their instructions without a human user. Some bots are useful,
such as search engine bots that index content for search or
customer service bots that help users. Other bots are "bad" and
are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious
activities.
Captcha Technology is used to
avoid this type of security
threat.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Adware
Adware (advertising supported software) is
unwanted software designed to throw
advertisements up on your screen. Example, pop-
up ads and banner ads.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spyware
Spyware is malware that secretly observes
the computer user’s activities without
permission and reports it to the software’s
author. Example is a keylogger.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Virus and Worms
Virus and Worms are malwares
that attach to another program
and, when executed—
unintentionally by the user—
replicates itself by modifying
other computer programs and
infecting them with its own bits of
code.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Trojan or Trojan Horse
Trojan, or Trojan horse, is one of
the most dangerous malware types.
It usually represents itself as
something useful in order to trick
you. Once it’s on your system, the
attackers behind the Trojan gain
unauthorized access to the affected
computer. From there, Trojans can
be used to steal financial information
or install threats like viruses and
ransomware.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Ransomware
Ransomware is a form of malware that locks you out of your
device and/or encrypts your files, then forces you to pay a
ransom to get them back.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spams
Spams are unsolicited emails, instant messages coming
from recipients that are not granted verifiable permission
for the message to be sent. Spam messages can be
damaging if you open or respond to it.
Cyberstalking
Cyberstalking refers to the
use of the internet or other
electronic device to harass
or stalk individuals or
organizations.
Cyberbullying
Cyberbullying
The Act of tormenting,
threatening, harassing or
embarrassing another person using
the internet or other technologies.
Spoofing
Spoofing happens when
someone or something
pretends to be something
else to gain our
confidence, get access to
our systems, steal data,
steal money, or spread
malware.
-Describe a criminal; who
impersonates another
individual or organization,
with the intent to gather
personal or business
information.
Types of Online Threats • Phishing
• Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Online Ethics and
Netiquette
• Comes from the word
Network and Etiquette
• Is a set of rules and
norms for acceptable
conduct or behavior
online.
Online Ethics and Netiquette
https://www.youtube.com/watch?v=FWMk_Zv7nB8 - by Angel Rivera
Can You Keep it Private?
1. Your family is going out on a
vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone
online.
C. Post updates of where you are
currently checking in hotels or places.
D. Tell no one. Vacations are for getting
away.
• Activity 3
2. Do you have the same passwords for all your
accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different
accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use
for all my accounts.
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
Can You Keep it Private?
3. Choose which image below
describes how you feel about
sharing your password with your
boyfriend/ girlfriend?
• Activity 3
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
Can You Keep it Private?
4. Your parents bought you your first
cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number
to anyone.
B. Post your cellphone number in your
social media account.
C. Share your cellphone number only in
person.
D. Post your cellphone number in your
group chat.
• Activity 3
5. Your social media friends list should only be
composed of ______________.
A. Your favorite brands.
B. Family and friends
C. Anyone who sends you a friend request
D. Foreigners
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
What have you Learned?
Direction: Reflect on
this and write your
answer in a Âź sheet of
Paper
Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
Online Safety, Security, and Netiquette

Weitere ähnliche Inhalte

Was ist angesagt?

2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Maria Eloisa Blanza
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT ProjectTeodoro Llanes II
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesRufa Laguit
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxluvvprems5
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information LiteracyChristopherEsteban2
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesJuvy Novicio
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxErvinJhonPatrickBina1
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication TechnologyTeodoro Llanes II
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 

Was ist angesagt? (20)

2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
Responsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptxResponsible Use of Media and Information.pptx
Responsible Use of Media and Information.pptx
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication Technology
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 

Ähnlich wie Online Safety, Security, Ethics and Netiquette.pptx

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Ähnlich wie Online Safety, Security, Ethics and Netiquette.pptx (20)

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

KĂźrzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

KĂźrzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Online Safety, Security, Ethics and Netiquette.pptx

  • 1. TVL Building, Goa NHS March 2, 2021
  • 2. By the end of this lesson, the students are expected to: 1. Identify what constitutes appropriate and inappropriate online behavior; 2. Apply Internet online safety, security ethics and etiquette standards and practices in the use of ICTs; 3. Discern possible deceptive information and wrongly evaluated data.
  • 3. Pick a Pic DIRECTION: • The teacher will show some images to the students related with the upcoming discussion. • Each student will be given 1 minute to write their observation on the following images. • After the activity the student will share their observation about the image. Activity 1
  • 4.
  • 5. Online Safety, Security, Ethics and Netiquette The internet is the guiding technology of the Information Technology Age just as the electrical engine was of the Industrial Age. In these times, more and more people are already engaged in the use of technology. These people who are raised in a digital, media-saturated world are called digital natives. No doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always our primary concern.
  • 6. There's almost no limit to what you can do online. The Internet makes it possible to access information quickly, communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks, such as malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn how to avoid them.
  • 8. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts. Activity 2
  • 9. 1. How many of these information have you SHARED? 2. How many of these information have you NOT SHARED? 3. Based from your answers, do you think you are safe when using the internet? Why?
  • 10. Lesson 2.1: Online Safety, Security, Ethics and Netiquette Online safety refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet.
  • 11. Online Safety Numerous delinquencies/minor crime that can be committed on the internet: •Stalking •Identity theft •Privacy violations •Harassment
  • 12. Online Safety Measures • Never give any personal information out about yourself over the internet. • Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your URL by yourself.
  • 13. Online Safety Measures • Never open messages or attachments from someone you do not know. • Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. • When using a public computer terminal, be sure to delete your browsing data before leaving. • Keep your software updated to avoid security holes. • Do not download or install software or anything on your computer or cell phone that is unknown to you.
  • 14. Online Threats Is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. These are usually done by computer hackers who uses World Wide Web to facilitate cybercrime.
  • 15. Types of Online Threats • Phishing • Pharming • Internet Scam • Internet robots • Malware • Spams • Cyberstalking • Cyberbullying • Spoofing
  • 16. Phishing Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
  • 17. Pharming Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations.
  • 18. Internet Scam Internet Scam generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal information. Online scams may come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few.
  • 19. Internet Robots Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user. Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities. Captcha Technology is used to avoid this type of security threat.
  • 20. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 21. Adware Adware (advertising supported software) is unwanted software designed to throw advertisements up on your screen. Example, pop- up ads and banner ads.
  • 22. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 23. Spyware Spyware is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger.
  • 24. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 25. Virus and Worms Virus and Worms are malwares that attach to another program and, when executed— unintentionally by the user— replicates itself by modifying other computer programs and infecting them with its own bits of code.
  • 26. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 27. Trojan or Trojan Horse Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware.
  • 28. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 29. Ransomware Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
  • 30. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 31. Spams Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it.
  • 32. Cyberstalking Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
  • 33. Cyberbullying Cyberbullying The Act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies.
  • 34. Spoofing Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware. -Describe a criminal; who impersonates another individual or organization, with the intent to gather personal or business information.
  • 35. Types of Online Threats • Phishing • Pharming • Internet Scam • Internet robots • Malware • Spams • Cyberstalking • Cyberbullying • Spoofing
  • 36. Online Ethics and Netiquette • Comes from the word Network and Etiquette • Is a set of rules and norms for acceptable conduct or behavior online.
  • 37. Online Ethics and Netiquette https://www.youtube.com/watch?v=FWMk_Zv7nB8 - by Angel Rivera
  • 38. Can You Keep it Private? 1. Your family is going out on a vacation. What should you do? A. Post pictures when you return home. B. Post the dates you will be gone online. C. Post updates of where you are currently checking in hotels or places. D. Tell no one. Vacations are for getting away. • Activity 3 2. Do you have the same passwords for all your accounts? A. Yes. That is how I remember all my passwords. B. I have different passwords for all different accounts. C. I keep it simple. I don’t have any passwords. D. I have two similar passwords that I alternately use for all my accounts. DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 39. Can You Keep it Private? 3. Choose which image below describes how you feel about sharing your password with your boyfriend/ girlfriend? • Activity 3 DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 40. Can You Keep it Private? 4. Your parents bought you your first cellphone. How will you share your cellphone number? A. Do not share your cellphone number to anyone. B. Post your cellphone number in your social media account. C. Share your cellphone number only in person. D. Post your cellphone number in your group chat. • Activity 3 5. Your social media friends list should only be composed of ______________. A. Your favorite brands. B. Family and friends C. Anyone who sends you a friend request D. Foreigners DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 41. What have you Learned? Direction: Reflect on this and write your answer in a Âź sheet of Paper Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
  • 42. Online Safety, Security, and Netiquette

Hinweis der Redaktion

  1. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts.
  2. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts.