0% found this document useful (0 votes)
19 views79 pages

Lesson 5 - Online Safety, Security, Ethics and Etiquette

The document discusses online safety, security, ethics, and etiquette, emphasizing the importance of protecting personal information and being aware of various internet threats such as malware, phishing, and hacking. It provides tips for staying safe online, including being cautious about sharing information, using antivirus software, and avoiding untrusted websites. Additionally, it covers copyright infringement and the importance of respecting intellectual property rights.

Uploaded by

Aura Lee Carisma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views79 pages

Lesson 5 - Online Safety, Security, Ethics and Etiquette

The document discusses online safety, security, ethics, and etiquette, emphasizing the importance of protecting personal information and being aware of various internet threats such as malware, phishing, and hacking. It provides tips for staying safe online, including being cautious about sharing information, using antivirus software, and avoiding untrusted websites. Additionally, it covers copyright infringement and the importance of respecting intellectual property rights.

Uploaded by

Aura Lee Carisma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 79

Online Safety,

Security, Ethics and


Etiquette
EMPOWERMENT TECHNOLOGIES
Are you Safe
and Secured
online?
How Safe and
Secured are you
online?
Internet is defined as the
information superhighway. This
means that anyone has access to
this highway, can place info, and
can grab that info.
Types of Information
with Risk:
 Mother’s and Father’s name
 Sibling’s Name
 Address
 Home Phone Number
 Birthday
 Email Address
Types of Information with
Risk:
First Name
Last Name
Middle Name
Current and Previous School
Cellphone Number
Some Tips to Stay Safe
Online:
Be mindful on what you share
online.
Do not just accept terms and conditions,
read it.
Do not share your password with
anyone.
Some Tips to Stay Safe
Online:
Do not talk to strangers whether online
or face-to- face.
Never post anything about a future vacation.
Add friends you know in real life.
Some Tips to Stay Safe
Online:
Avoid visiting untrusted websites.
If you have WiFi at home, make it private
by adding a password.
Some Tips to Stay Safe
Online:
Install and update an antivirus software
on your computer.
Some
Antivirus:
BitDefender
Some
Antivirus:
ESET NOD32
Some
Antivirus:
F-Secure
Some
Antivirus:
Kaspersky
Some
Antivirus:
Norton
Some
Antivirus:
AVAST
Some
Antivirus:
SMADA
V
Some Tips to Stay Safe
Online:
Avoid downloading anything from untrusted
websites.
Buy the software, do not use pirated ones.
Do not reply or click links from
suspicious emails.
Internet Threats
Internet Threats:

Malware – stands for malicious software.


– collective name for a number
of malicious software
variants,
including viruses, ransomware
and spyware
Internet Threats:

Virus – a malicious program designed to


replicate itself and transfer from one computer
to another (internet, local networks, FDs, CDs,
etc.)
DANGERS ON THE INTERNET

Computer Virus
• It is a program that duplicates itself and then infects the
computer. It spreads like a biological virus.
• It can be transferred by the use of removable storage media devices.
• Damages may be mild to severe.
SITUATIONAL ANALYSIS

How do we know it is a virus-


infected file?
Internet Threats:

Worm – a malicious program that transfers from


one computer to another by any types of means.
Ex. ILOVEYOU Worm
DANGERS ON THE INTERNET

Computer Worm
• It is a dangerous computer program that replicates itself through
a network.
• Some worms delete files, others disrupt the network function.
• It is usually spread through email and running of attachments from
suspicious sources.
• It spreads by exploiting weaknesses in operating systems (but
BLESS OS updates!)
SITUATIONAL ANALYSIS

How do we know it is a worm-


infected file?
Internet Threats:

Trojan – a malicious program that disguises


as a useful program but once downloaded or
installed, leaves your PC unprotected and
allows hackers to get your information.
DANGERS ON THE INTERNET

Trojan Horse
• A malware fronting to perform a good task, but covertly performs
undesirable function with the intention of entering the computer
without the user’s consent.
• It can disable the computer’s defenses, opening it to unauthorized
entry. It can erase data, can corrupt files, allow access to computer,
and
SITUATIONAL ANALYSIS

How do we know it is a trojan


horse-infected file?
Internet Threats:

Spyware – a program that runs in the


background without you knowing it (thus called
“spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
DANGERS ON THE INTERNET

Spyware
• A computer program that is installed covertly on a personal
computer to collect information or even take control over the
computer without the knowledge of the user.
• It can monitor and collect information about the user’s internet habits
and practices.
• It can also affect the performance and setting of the computer.
SITUATIONAL ANALYSIS

What can we do to prevent


installing a spyware?
Internet Threats:

Adware – a program designed to send


you advertisements, mostly as pop-ups.
Internet Threats:
Botnet – group of compromised computer
connected to a network ("zombie")
Internet Threats:

Denial of Service Attack - disrupts computer


access to internet services
Internet Threats:
Ransomware
Also known as scareware, ransomware
comes with a heavy price. Able to
lockdown networks and lock out users
until a ransom is paid, ransomware has
targeted some of the biggest
organizations in the world today — with
expensive results.
Internet Threats:
•Spam – an unwanted email mostly from bots or
advertisers. It can be used to send malware.
DANGERS ON THE INTERNET

Email Spam
• AKA Junk mail
• Usually unsolicited commercial email sent from an unknown
source with identical message sent to multiple recipients.
• Usually not dangerous but can be time and space consuming.
• Dangerous ones can carry viruses and other malicious software
(Malware)
SITUATIONAL ANALYSIS

What is the best way to get rid


of JUNK MAILS?
Internet Threats:

Phishing – an unwanted
acquisition of sensitive personal
information like passwords and
credit card details.
DANGERS ON THE INTERNET

Phishing
• It is a deceitful practice of trying to get confidential information
such as passwords and usernames, and credit card details by
making it appear as if it comes from a trustworthy source.
• It is usually done through emails or using popular entity such as
Microsoft, Yahoo, Google, Amazon, and financial institutions.
SITUATIONAL ANALYSIS

How would you know if


someone is phishing you?
DANGERS ON THE INTERNET

Email Spoofing
• It is a deceitful email practice in which the sender address is
changed, so that it would appear to have come from a different
source which is usually someone you know.
• Email spoofing is usually used by spammers to hide the origin of the
spam.
SITUATIONAL ANALYSIS

How would you know if


someone is spoofing you?
DANGERS ON THE INTERNET

Pharming
• This is a dangerous hacker attack on a website which directs all
traffic to that website to another fictitious website.
• The main objective is to obtain username and passwords, as
well as credit cards ad financial information, and use these to
steal their money electronically or use the credit cards of the victims.
• It is a major concern of many online banking and electronic
commerce transactions.
SITUATIONAL ANALYSIS

How would you know if


someone is trying to pharm
you?
DANGERS ON THE INTERNET

Hacker
• This is a person who is able to enter and control other people’s
computer without authorization.
• Usually vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
• Firewalls are able to prevent entry by hackers.
SITUATIONAL ANALYSIS

How do we know you are being


hacked?
SITUATIONAL ANALYSIS

What other dangers can we


encounter in the internet?
Protecting
Reputations Online
DISCUSSION
• Nowadays, embarrassing moments are captured using
any device you could imagine.
• Once you post something over the internet, search
engines keep them in their archives for search results
THINK BEFORE YOU CLICK
• Before you post something on the web, ask these
questions to yourself:
• Would you want your parents or grandparents to see it?
• Would you want your future boss to see it?
THINK BEFORE YOU CLICK
• Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
• Avoid using names. Names are easy for search
engines to scan
THINK BEFORE YOU CLICK
• If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
down or report it as inappropriate
COPYRIGHT
INFRINGEMENT
INTELLECTUAL
PROPERTY
• A right to how your creations should be used by
others
• idea, invention, form of literary work, or a research
COPYRIGHT LAW
• Includes your rights over your work, and
anyone who uses it without your consent
is punishable by law
TIPS TO AVOID
COPYRIGHT
INFRINGEMENT
• Understand
• Be Responsible
• Be creative
• Know the Law
UNDERSTAND
• Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but generally does
not protect underlying ideas and facts.
• You should give credit to the source
BE RESPONSIBLE
• Even if a material does not say that it is
copyrighted, it is not a valid defense against
copyright. Be responsible enough to know if
something has a copyright
BE CREATIVE
• Add your own creative genius in everything that will be credited
to you
KNOW THE LAW
• Philippines, copyrights only last a lifetime of the author plus 50
years.
FAIR USE
• Intellectual property may be used without a consent as
long as it is used in commentaries, criticisms, search
engines, parodies, news report, research, library
archiving, teaching and education
THANK YOU

You might also like