0% found this document useful (0 votes)
99 views24 pages

Grade 11 Lesson 3

This document discusses internet safety, security, and ethics. It warns about sharing personal information online like one's name, school, phone number, address, or birthday as this can increase risks of identity theft, scams, and cybercrimes. It also outlines various internet threats like email spam, phishing, pharming, spyware, computer worms, Trojan horses, viruses, and hackers that people should be aware of when online. Protecting one's privacy and practicing safe internet usage is important.

Uploaded by

Riel Fernandez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views24 pages

Grade 11 Lesson 3

This document discusses internet safety, security, and ethics. It warns about sharing personal information online like one's name, school, phone number, address, or birthday as this can increase risks of identity theft, scams, and cybercrimes. It also outlines various internet threats like email spam, phishing, pharming, spyware, computer worms, Trojan horses, viruses, and hackers that people should be aware of when online. Protecting one's privacy and practicing safe internet usage is important.

Uploaded by

Riel Fernandez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

SAFETY, SECURITY, AND

ETHICS
RULES OF NETIQUETTE
• Online Security, safety, and ethics
• Internet threats
• Protecting reputations
• Copyright
• Contextualized online search and research skills
HOW SAFE ARE YOU?
• First name
• Last name
• Middle name
• Current and previous school(s)
• Your cellphone number
• The name of your mother and father
• Then name of you siblings
• Your address
• Your home phone number
• Your birthday
FIRST NAME
• There is risk in sharing your first name. chances are a hacker may
already know plenty of stuff about you even if you only give out your
first name. Likewise, you cannot just walk in room and start introducing
yourself to everyone. You do not know whom you can come across with.
LAST NAME
• If sharing your first name is small risk, having both your first and last is
more risky. You will be vulnerable to being searched for using search
engines, which include image search. Matching a name with face is a
modus to several cybercrimes like identity theft.
MIDDLE NAME
• Sharing your middle name alone is probably not the most risky of these
shared information, but sharing your full name would be.
CURRENT AND PREVIOUS
SCHOOL(S)
• Most people who steal identities study their subject their subject. They
can use this information for verification purposes.
YOUR CELLPHONE NUMBER
• Your cellphone number should never be posted over the internet. The
internet is a public place. It is the same as posting your number on a
billboard. You would not want random strangers to text or call you, or
worse, pretend that they are someone else.
THE NAME OF YOUR MOTHER AND
FATHER

• Risky, yet not as risky as posting their full names, especially your
mother’s maiden name. in fact, you may have already encountered many
websites that require your mother’s maiden name as an answer to a
secret question whenever you lose your password.
THE NAME OF YOUR SIBLINGS
• Disclosing this is a huge risk. Strangers may pretend or use their identity
to dupe you.
YOUR ADDRESS
• Giving the internet your number is one thing; giving them your address
is a whole other level. It would be much easier for criminals to find you.
YOUR HOME PHONE NUMBER
• This shared information is more risky than sharing your personal phone
number. Scams usually use this information to deceive you, one which is
when a stranger pretends to know your parents or pretends to be you.
YOUR BIRTHDAY
• Letting people know your birthday is probably a must if you want to get
as many gifts as possible. But having it in your profiles makes you
vulnerable to identity theft.
ONLINE SAFETY AND SECURITY
• The internet is a powerful tool for learning and communicating with
people. However, there are many dangers that you must watch out for.
DANGERS ON THE INTERNET
• Email spam
• Email Spoofing
• Phishing
• Pharming
• Spyware
• Computer worm
• Trojan horse
• Computer virus
• Hacker
EMAIL SPAM

• Also known as junk email, it is usually unsolicited commercial email sent


from one source with identical message sent to multiple recipients. Although
some of are not harmful, deleting them one by one will eat up your time and
can clog your email. Dangerous spams carry virus like Trojan horse and other
malicious software (malware). Spammer is term used to refer a person who
creates electronic spam. Spamming is projected to continue because it is a
cheap means of advertising. In addition, many countries do not have laws to
punish spammers.
EMAIL SPOOFING
• Email spoofing is the creation of email messages with a forged sender
address. The core email protocols do not have any mechanism for
authentication, making it common for spam and phishing emails to use
such spoofing to mislead or even prank the recipient about the origin of
the message.
PHISHING
• Phishing is a cybercrime in which a target or targets are contacted by
email, telephone or text message by someone posing as a legitimate
institution to lure individuals into providing sensitive data such as
personally identifiable information, banking and credit card details, and
passwords. Internet users may think they are accessing a genuine
website and through this way, a phisher would be able to gather sensitive
information from internet account user.
PHARMING
• Pharming is a cyber attack intended to redirect a website's traffic to
another, fake site. Pharming can be conducted either by changing the
hosts file on a victim's computer or by exploitation of a vulnerability in
DNS server software. The main object of pharming is to obtain
username and passwords, as well as credit card and financial
information, and use these to steal their money electronically or use the
credit card of the victims. Antivirus and anti-spyware software cannot
prevent and protect one from pharming.
SPYWARE
• Spyware is unwanted software that infiltrates and installed covertly on
your computing device, stealing your internet usage data and sensitive
information. Spyware is classified as a type of malware — malicious
software designed to gain access to or damage your computer, often
without your knowledge.
COMPUTER WORM
• A computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers. It often uses a
computer network to spread itself, relying on security failures on the
target computer to access it. It will use this machine as a host to scan and
infect other computers
TROJAN HORSE
• A Trojan horse or Trojan is a type of malware that is often disguised as
legitimate software. Trojans can be employed by cyber-thieves and
hackers trying to gain access to users' systems. Users are typically
tricked by some form of social engineering into loading and executing
Trojans on their systems.
COMPUTER VIRUS
• A computer virus is a type of computer program that, when executed,
replicates itself by modifying other computer programs and inserting its
own code. When this replication succeeds, the affected areas are then
said to be "infected" with a computer virus.
HACKER
• A person who is able to enter and control other people’s computer
without authorization. A hacker is able to enter other’s computer, usually
vandalizes the victim’s website, steals personal information, obtains
intellectual property, and perform credit card fraud. Firewalls are able to
prevent entry by hackers.

You might also like