Etech Q1M2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

1

PRINCE OF PEACE COLLEGE, INC.


Balete, Poblacion, Puerto Galera, Oriental Mindoro

EMPOWERMENT TECHNOLOGIES
12
Quarter 1 – Module 2
Online Safety, Security, Ethics
and Etiquette Standards

i
Knowledge Bank

Online Safety, Security, and Etiquette Standards


The Internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and can
grab that information. The more information you share online, the higher
the risk. Risk such as identity theft, phishing, malware infections, and the
likes. That is why Facebook continues to improve their security features.
Tips to Stay Safe Online
Here are some tips to help you stay safe when using the Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone. Treat your password like a toothbrush.
Don’t let anybody use it and get a new one every six months.
6. Avoid logging in to public networks/Wi-Fi. One of the biggest threats with
free WiFi is the ability for hackers to position themselves between you and
the connection point. So, instead of talking directly with the hotspot, you
end up sending your information to the hacker Any
7. information you share or access on these networks is as good as gone.
8. Do not talk to strangers whether online or face-to-face.
9. Never post anything about future vacation. You are inviting the burglar to
rob your house at that date.
10. Add friends you know in real life.
11. Avoid visiting untrusted websites.
12. Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflict.
13. If you have a Wi-Fi at home, make it a private network by adding a
password.
14. Avoid downloading anything from untrusted websites. Some websites carry
malwares that can infect your computer.
15. Buy the software; do not use pirated ones.
16. Do not reply or click links from suspicious emails.
It is your responsibility to secure your information online because
there are hackers who can find a backdoor even if your profile is already
set to private. A hacker may steal information to hurt people via identity
theft, damage or bring down systems and, often, hold those systems
hostage to collect ransom.
Internet
Threats Whilst the internet is a fantastic place
for communication and information,
there are many malicious threats you
need to dodge along the way. Here
soare me of the threats you should
a be are of when using the Internet.
w 1. Spam
https://www.cybersecurity-insiders.com/every-minute-over-
Most of our email accounts
504-new-cyber-threats-are-being-populated-on-the-internet/ come with a ‘Spam’ or ‘Junk’
folder. Spam emails are a huge
issue, with more than 50% of emails being syphoned into these folders.
Aside from being an annoyance, spam emails are not a direct threat, but,
many can contain malware.

2. Adware
Adware is a type of malware software that displays unwanted ads
when a user is surfing the internet. It is often included in many shareware
or freeware downloads as a legitimate way of generating advertising
revenues that help fund development. However, some websites are
infected with malicious adware that are automatically downloaded to your
computer.

3. Trojan
Trojans leave your computer completely unprotected, which can mean
that hackers can steal any data from your system. Trojans often present
themselves as harmless computer programs so that hackers can
penetrate your computer without being detected.

4. Virus
One of the most talked about internet threats is a virus. Viruses
usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate. Viruses are often attached to files for
download, shared via CDs, DVDs, and USB sticks, or loaded on to
computers by opening infected email attachments.

5. Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a
worm, it will likely send itself to every email address logged in your
system. To the receiver, your email will appear harmless, until they open
it and are infected by the same worm.

6. Phishing
In its simplest terms, phishing is a form of fraudulent activity. More
often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank. These emails are sent to acquire people’s
passwords and credit card details.
7. Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files.
Once installed on your computer, spyware can monitor your keystrokes,
read and delete your files, reformat your hard drive, and access your
applications. Whoever is controlling the spyware has access to your
personal details without you even knowing.

8. Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries,
such as bank card details and passwords. Keylogging is often linked to
identity and intellectual property theft.

9. Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their
details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.

10.Rogue Security Software


This is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer and aims to
convince them to pay for a fake malware removal tool that
actually installs malware on their computer.

Netiquette
Netiquette is short for "Internet
etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good
behavior on the Internet. This includes several
aspects of the Internet, such as
email, social media, online chat, https://www.eu-in-the-
media.eu/index.php/meetings/item/15-
web forums, website comments, multiplayer
netiquette-and-online-awareness
gaming, and other types of online
communication.

While there is no official list of netiquette


rules
or guidelines, the general idea is to respect others online. Below are ten
examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online


(a.k.a flaming).
2. Respect others' privacy by not sharing personal information,
photos, or videos that another person may not want published
online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether
you win or lose.
5. Don't troll people in web forums or website comments by
repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when
commenting on photos or videos, such as YouTube or Facebook
comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative
comments. Instead, break the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
The Internet provides a sense of anonymity since you often do not see
or hear the people with whom you are communicating online. But that is
not an excuse for having poor manners or posting incendiary comments.
While some users may feel like they can hide behind their keyboard or
smartphone when posting online, the fact is they are still the ones
publishing the content. Remember – if you post offensive remarks online
and the veil of anonymity is lifted, you will have to answer for the
comments you made.

In summary, good netiquette benefits both you and others on the


Internet. Posting a positive comment rather than a negative one just
might make someone's day.

You might also like