Empowerment
Technologies
Online Safety,
Security and
Netiquette.
Share
d or
Not
Share
d?
Online safety
refers to the practices and precautions
that should be observed when using the
internet to ensure that the users as well
as their computers and personal
information are safe from crimes
associated with using the internet
“How Safe Are You”
Type of
Risks
Information
There is a risk in sharing your first
name.
Chances are, a hacker may already
know
plenty of stuff about you even if you
only give
1.First
name
out your first name. Likewise, you
cannot just
If sharing your first name is small
risk, having
both your first and last is more risky.
You will
be vulnerable to being searched for
Last using
name search engines, which include image
search.
Matching a name with a face is a
modus to
several cybercrimes like identity
Sharing your middle
name alone is
probably
not the most risky of
3. Middle name
these shared
information,
but sharing your full
name would be
Most people who steal identities study
.Current
their
and
subject. They can use this information
previous
for
school(s)
verification purposes
Your cellphone number should never be
posted over the Internet. The Internet is
a
public place. It is the same as posting
your
5.Your
number on a billboard. You would not
cellphone
want
number
random strangers to text or call you, or
worse,
Risky, yet not as risky as posting their
full
names, especially your mother’s
The maiden name.
name In fact, you may have already
of your
mother
encountered
and many websites that require your
father mother’s
maiden name as answer to a secret
question
whenever you lose your password.
7.The Disclosing this is a huge risk. Strangers
Hopefully, you answered “not shared” to
this
one. Giving the internet your number is one
.Your
thing; giving them your address is a whole
address
other level. It would be much easier for
criminal
to find you.
This shared information is more risky than
sharing your personal phone number.
9.Your Scams
home usually use this information to deceive you,
phone one
number of which is when a stranger pretends to
know
Letting people know your
birthday is probably
Your a must if you want to get as
birthd many gifts as
ay possible. But having it in your
profile makes you
vulnerable to identity theft.
THREATS THAT YOU SHOULD BE AWARE
OF WHEN USING THE INTERNETS
stalking, identity theft, privacy violations,
and harassment, SPAM PHISHING AND
MALWARE
To avoid these online crimes,
follow the following online
safety measures:
To avoid these online crimes,
follow the following online
safety measures:
1. Never give any personal
information out about yourself over
the internet.
2.
Do not give any banking or sensitive
information unless you are sure that it is a
reputable business having a secure
service. To make sure that you are in a
secured network, the website address
should begin with “https://’ as opposed to
“http://”. Never access your accounts by
following an email link, instead type your
URL by yourself
2. Never open messages
or attachments from
someone you do not
know.
3. Regularly review your privacy
settings in your online accounts
to make sure you are not
sharing important personal
information.
4. When using a public
computer terminal, be sure to
delete your browsing data
before leaving.
5. Keep your software
updated to avoid security
holes
6. Do not download or install
software or anything on your
computer or cell phone that is
unknown to you.
Dangers on the internet
1. Email spam
2. Email spoofing
3. Phishing
4. Pharming
5. Spyware
6. Computer worm
7. Trojan horse
8. Computer virus
1. Email spam
Email spam, also referred to as junk
email, spam mail, or simply spam, is
unsolicited messages sent in bulk by email (
spamming). The name comes from a
Monty Python sketch in which the name of the
canned pork product Spam is ubiquitous,
unavoidable, and repetitive.[1] Email spam has
steadily grown since the early 1990s, and by
2014 was estimated to account for around 90%
of total email traffic.[2][3]
2. Email spoofing
Email spoofing is the creation of email
messages with a forged sender address.
The term applies to email purporting to be
from an address which is not actually the
sender's; mail sent in reply to that address
may bounce or be delivered to an unrelated
party whose identity has been faked.
Spoofing can take many forms, such
as spoofed emails, IP spoofing, DNS
Spoofing, GPS spoofing, website spoofing,
and spoofed calls.
Email spoofing attacks are conducted by using a
Simple Mail Transfer Protocol or SMTP server
and an email platform, such as Outlook, Gmail,
etc. The scammer changes fields within the
message header, such as the FROM, REPLY-TO,
and RETURN-PATH fields. This is possible because
of the way email has evolved.
3. Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit
card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a
victim into opening an email, instant
message, or text message.
Phishing
Phishing is a form of social engineering
where attackers deceive people into
revealing sensitive information or installing
malware such as ransomware.
An email from PayPal arrives telling the
victim that their account has been
compromised and will be deactivated
unless they confirm their credit card
details. The link in the phishing email takes
the victim to a fake PayPal website, and the
stolen credit card information is used to
commit further crimes
4. Pharming fake website
Pharming, a portmanteau of the words
"phishing" and "farming", is an online
scam similar to phishing, where a
website's traffic is manipulated, and
confidential information is stolen. In
essence, it is the criminal act of
producing a fake website and then
redirecting users to it.
Pharming
Pharming is a cyberattack intended to
redirect a website's traffic to another,
fake site by installing a malicious
program on the computer. Pharming
can be conducted either by changing
the hosts file on a victim's computer or
by exploitation of a vulnerability in DNS
server software.
Pharming is a type of
cyberattack involving the redirection
of web traffic from a legitimate site to
a fake site for the purpose of
stealing usernames, passwords,
financial data, and other personal
information.
An example of pharming would be if a user
would open their browser and enter the
web address of their bank in order to
complete a transaction in online banking.
However, the user is redirected to a
fraudulent site that looks like the bank's
website
Malware or malicious
software,
is any program or file that is
harmful to a computer user. :
Here are the most common
offenders in the rogues’
gallery of 1. Adware
malware
2. Spyware
3. Virus and Worms
4. Trojan, or Trojan horse
Adware (advertising
supported software) is
unwanted software designed
to throw advertisements up
on your screen. Example,
pop-up ads and banner ads
secretly observes the computer user’s activities
Spyware
Spyware is any software that installs
itself on your computer and starts
covertly monitoring your online
behavior without your knowledge or
permission. Spyware is a kind of
malware that secretly gathers
information about a person or
organization and relays this data to
other parties.
- this aims to gather information
about a person or organization and
send it to another entity in a way
that harms the user—for example,
by violating their privacy or
endangering their device's security.
Example is a keylogger
Virus and Worms
are malwares that attach to another
program and, when executed—
unintentionally by the user—replicates
itself by modifying other computer
programs and infecting them with its
own bits of code
computer worm
A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers. It
often uses a computer network to spread
itself, relying on security failures on the
target computer to access it. It will use this
machine as a host to scan and infect other
computers.
. Typically, a worm spreads across a network
through your Internet or LAN (Local Area
Network) connection.
What causes?
Worms can be transmitted via software
vulnerabilities. Or computer worms could
arrive as attachments in spam emails or
instant messages (IMs). Once opened,
these files could provide a link to a
malicious website or automatically
download the computer worm
Trojan Horse most dangerous malware types
is it is a type of malware that typically gets
hidden as an attachment in an email or a free-
to-download file, then transfers onto the user’s
device. Once downloaded, the malicious code
will execute the task the attacker designed it for,
such as gain backdoor access to corporate
systems, spy on users’ online activity, or
steal sensitive data.
Trojans can be used to
steal financial information
or install threats like
viruses and ransomware
How do trojan works?
Unlike computer viruses, a Trojan horse
cannot manifest by itself, so it needs a user
to download the server side of the application
for it to work. This means the executable
(.exe) file should be implemented and the
program installed for the Trojan to attack a
device’s system.
Trojans may be packaged in downloads for games, tools,
apps or even software patches. Many Trojan attacks also
leverage social engineering tactics, as well as spoofing and
phishing, to prompt the desired action in the user.
10 Types of Trojan Malware
Exploit Trojan Trojan GameThief
Downloader Trojan Rootkit Trojan
Ransom Trojan Fake AV Trojan
Backdoor Trojan SMS Trojan
Distributed Denial of Service (DDoS)
attack Trojan
Banking Trojan or Trojan Banker
Computer Virus
A computer virus is a type of computer
program that, when executed, replicates
itself by modifying other computer
programs and inserting its own code into
those programs.
10 greatest virus/ malware
1. Melissa 6. Mydoom
2. ILOVEYOU 7. Sasser
3. Code Red 8. Zeus
4. Klez 9. Stuxnet
5. Sobig 10. WannaCry
Assignment : research on this greatest
virus write it on your notebook.
1. Melissa
The Melissa virus was first spotted in March 1999,
spreading to the public via internet forums and emails
offering free login credentials to adult websites. The
virus was delivered through a Microsoft Word
document with an embedded macro that, when
opened, would run a malicious code. If macros were
enabled, Melissa spread itself to the first 50 contacts
in a user’s Outlook address book. Infected devices
experienced mass mailings and slowdowns
Ransomware
is a form of malware that
locks you out of your device
and/or encrypts your files,
then forces you to pay a
ransom to get them back.
Hacker
A hacker is an individual who uses
computer, networking or other
skills to overcome a technical
problem. The term also may refer to
anyone who uses their abilities to
gain unauthorized access to
systems or networks in order to
commit crimes.
Internet Scam
generally refers to someone using
internet services or software to
defraud or take advantage of
victims, typically for financial gain
Cybercriminals may contact potential victims
through personal or work email accounts,
social networking sites, dating apps, or other
methods in attempts to obtain financial or
other valuable personal information. Online
scams may come in various forms such as
lottery scam, charity fraud scams, job offer
scams, and online dating scams to name a
few
Cyberstalking
refers to the use of the internet or
other electronic device to harass or
stalk individuals or organizations
Cyberbullying
refers to the act of tormenting, harassing,
or embarrassing another person using
the internet.
Online threats
The above dangers are the
top kinds of online threats
that you should be aware of.
Give the following online
threats?
Online threats
Online threat is deemed any malicious act that attempts to gain
access to a computer network without authorization or
permission from the owners.
These are usually done by computer hackers who uses the
World Wide Web to facilitate cybercrime.
Web threats use multiple types of malware and fraud, all of
which utilize HTTP or HTTPS protocols, but may also employ
other protocols and components, such as links in email or
Instant Messaging apps, or any malware attachments on
servers that access the Web.
They benefit cybercriminals by stealing information
for subsequent sale and help absorb infected PCs
into botnets. Web threats pose a broad range of
risks, including financial damages, identity theft, loss
of confidential information/data, theft of network
resources, damaged brand/personal reputation, and
erosion of consumer confidence in e-commerce and
online banking.
Netiquette
Netiquette is a combination of the
words network and etiquette. It is a
set of rules for behaving properly
online.
The Core Rules of Netiquette
The Core Rules of Netiquette
Flame
war
Flame war
• Flame war is a series of flame posts or
messages in a thread that are considered
derogatory in nature or are completely off-topic.
Often these flames are posted for the sole
purpose of offending or upsetting other users.
The flame becomes a flame war when other
users respond to the thread with their own flame
message
1. What type of malicious program is designed to replicate
itself and transfer from one computer to another either
through the internet or local networks or data storage like
flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomware
2. What harmful online programs are designed to send you
advertisements, mostly pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record
keystrokes done by users to steal passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
4. What is ransomware based on?
B. Fear of hackers C. Fear of spyware
C. B. Fear of the Internet D. Fear of losing important
files
5. Which of the following is an example of a “phishing”
attack?
A. Sending someone an email that contains a malicious
link that is disguised to look like an email from someone
reliable.
B. Creating a fake website that looks nearly identical to a
real website in order to trick users into entering their login
information.
C. Sending someone a text message looks like a
notification that the person has won a contest.
D. Sending someone an email that records their keystroke
activities while using their computers.
6. Which of the following must NOT be done if you
received an embarrassing picture from your friend?
A. Tell your parents or teachers
B. Send the picture on to other friend
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like
that.
7. What is a flame in cyberspace?
A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong
opinion or criticism
8. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a
sentence
D. . Not answering a friend request on Facebook.
9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who
asks.
B. Strike first - post mean things about other people
on your Wall on Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend
online.
10.How are you judged in
cyberspace?
• A. No one can see you, so no one can judge you.
• B. You are judged by what you do on the Internet and
how it looks - by your spelling, grammar, and netiquette.
• C. You are judged by your intent - if you didn't mean to
hurt someone's feelings, then it's okay.
• D. You are judged by how you look - your profile picture
is important.
ACTIVITY 2.2: Can You Keep It
Private?
1. Your family is going out on a vacation. What
should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently
checking in hotels or places.
D. Tell no one. Vacations are for getting away
2. Do you have the same
passwords for all your
A. Yes. That is how I remember all my
accounts?
passwords.
B. I have different passwords for all different
accounts.
C. I keep it simple. I don’t have any
passwords.
D.I have two similar passwords that I
alternately use for all my accounts.
3. Choose which image below describes how
you feel about sharing your password with
your boyfriend/ girlfriend?
4. Your parents bought you your first
cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number to anyone
B. Post your cellphone number in your social
media account.
C. Share your cellphone number only in person.
D. Post your cellphone number in your group chat
Your social media friends list should
only be composed of ______________
.A. Your favorite brands.
B. Family and friends
C. Anyone who sends you a
friend request
D. Foreigners
As a responsible internet
user, think of the things
you should do/should not
do online. Give at least
five things
Be an advocate! As a Filipino
citizen, what are the things
you can do to improve
awareness of doing the right
things online (Minimum of
two sentences)
PT 2
Create a poster showing the Netiquette
rules with examples of how you can
use them in your daily life, primarily online.
The poster should use an interactive
online tool like Canva, Glogster, Piktochart,
etc.
Pt 3
create a slogan or campaign
regarding proper and
responsible use of internet. Use
the tag,
“#ThinkBeforeYouClick!”.