0% found this document useful (0 votes)
439 views

Lesson 2 - Rules of Netiquette

The document discusses rules of netiquette including being respectful, avoiding bad language, not spreading rumors, using capital letters sparingly, not breaking laws, controlling flame wars, and being forgiving. It also covers internet threats like malware, viruses, worms, Trojans, spyware, and adware. Tips are provided for protecting yourself online such as using security plans, antivirus software, data encryption, port protection, and enabling Windows firewall.

Uploaded by

Lorie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
439 views

Lesson 2 - Rules of Netiquette

The document discusses rules of netiquette including being respectful, avoiding bad language, not spreading rumors, using capital letters sparingly, not breaking laws, controlling flame wars, and being forgiving. It also covers internet threats like malware, viruses, worms, Trojans, spyware, and adware. Tips are provided for protecting yourself online such as using security plans, antivirus software, data encryption, port protection, and enabling Windows firewall.

Uploaded by

Lorie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

LESSON 2:

Rules of
Netiquette
▹ Online security, safety, and
ethics
▹ Internet threats
▹ Protecting reputations online
▹ Copyright
▹ Contextualized online search
and research skills
At the end of this lesson, the students should
be able to:

▹ Understand the safety and danger when


sharing information using the Internet;
▹ Identify and differentiate all 5 types of
Internet threats.
▹ Apply 12 fundamental online safety and
security.
▹ Practice the proper etiquette standards and
the use of Information Communication
Technology as it would relate to the student’s
professional tracks.
How should we
communicate
online?
What is Netiquette?
 “Net” + “Etiquette” = Netiquette
 Netiquette are the manners that
everyone should follow when
communicating online.
Rules of
Netiquette
▹ Be nice and respectful
■ Just because you can’t see
someone, doesn’t mean that
person can’t have his/her
feelings hurt. If you won’t
say it to someone’s face, then
don’t feel free to say it in
writing.
▹ Don’t use bad language.

■ Using bad language


just proves you don’t
know how to say
something well.
▹ Don’t spread rumors or
lies.

■ This is a form of bullying


and is against the law.
■ Words and writing are
powerful.
■ Treat that power with
respect.
▹ DON’T SHOUT.
■ All caps = shouting.
■ Use all caps like you
would a highlighter —
only occasionally.
▹ Don’t break the law.

■ Stealing from others


isn’t just impolite; it’s
illegal. That means
files, movies, music,
etc.
■ If someone else did
the work, don’t take it
without asking.
Control Flame Wars.

■ “Flaming” is when the fires


of gossip get out of control
and rapidly spread.
■ Don’t get caught up in it. If
someone comments in a
discussion in an
emotional way or in a way
that breaks another rule
of netiquette, don’t get
involved.
 Be forgiving

■ Everyone is new at this.


■ Everyone may
occasionally make a
mistake, like a spelling
error.
■ Let the small things
pass.
How Safe Are
You?
Questions:

1. Have you tried


searching your names
using search engine like
Google?

2. Did your picture


appear?
How does the Internet
works?

How did these thing


happen?

How do search engine


work
Type of Information

1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
11. Password
12. Identification number (ID, Passport, Card)
Tips to stay safe
online
Internet threats
What is Malware?
- Malicious Software, is any
program or file that is
harmful to a computer user.

- Attached to a small pieces of


computer
code, software, or documents.

- May transfer through e-mail,


file transfers, and instant
messaging.
Virus

- A malicious program designed to replicate 22

itself and transfer from one computer to


another either through Internet or data
storage

- A virus has a potential to corrupt or


even delete files on your computer, use e-
mail to spread itself to other computers,
or even erase your hard drive.
Worm

- Is a self-replicating
program that is harmful
to networks.
23

- A malicious program that transfer


from one computer network to spread
itself.

- Different from the virus because the


worm does not need to attach to a
program to infect the host.
Trojan Horse

24

- A malicious program designed as a useful


program but once downloaded or installed,
leaves your PC unprotected and allows hackers
to get information.
Spyware

25

- Programs that runs in the background


without you knowing it.
- It has the ability to monitor what you are
currently doing and typing through
keylogger software
Adware

- A program designed to send you advertisement,


mostly as pop-ups.
Protecting
yourselves online
Security Procedures
• Use a security plan to determine what
will be done in critical situation.
• Security plan should be constantly
updated to reflect the latest threats
to a network.
• Conduct tests to determine areas where
security is weak.
Most commonly known anti-virus software
Virus Protection Software
• Known as Antivirus Software
• Antivirus software designed to detect, disable,
and remove viruses, worms, and Trojans before
they infect a computer.
• Becomes outdated quickly, the technician is
responsible for applying the most recent
updates.
Data Encryption
• Encrypting data involves using codes and
ciphers.
• Can help prevent attackers from monitoring
or recording traffic between resources &
computers

VPN – Virtual Private Network is any


encryption system that protects data as
though it resides on a private network.
Port Protection
• Firewall – is a way of protecting a computer
from intrusion through the ports.
• With port connection, the user can control
the type of data sent to a computer by
selecting which ports will be open & which
will be secured.
• Traffic – the data being transported on a
network.
Enabling Windows Firewall
1. The Windows Firewall is a security application
created by Microsoft and built into Windows,
designed to filter network data transmissions to
and from your Windows system and block
harmful communications and/or the programs
that are initiating them.
Copyright
Infringement
1. Understand. Copyright protect
literary works, photographs
paintings, drawings, films, music (and
lyrics), choreography, and sculptures.

2. Be responsible. Even if a material


does not say that it is copyrighted, it
is not a valid defense against
copyright.
3. Be creative. Ask yourself whether
what you are making is something
that came from you or something
made from somebody else’s
creativity.
4. Know the law. There are some
limitations to copyright laws.

Fair use Logo


Online Research

1. Have a question in mind. Focus on a


question you want answered.

2. Narrow it down. Search engines like


Google, Bing, or Yahoo use several
filters to determine the most
appropriate result for you.

3. Advanced Search. The best way to


filter information you get from search
engines is by using the advanced
search.
4. Look for a credible sources.
Some wikis, filled with updated
information, are not a credible
source. When using wikis, check out
the link of the cited text.
5. Give credit. Give credit to the
original author of the page or
information. To properly site a
reference, you may use the format
below.

“Don't promote
negativity online and
expect people to treat
you with positivity in
person.”

You might also like