Q1-Module-2-Empowerment
Q1-Module-2-Empowerment
Q1-Module-2-Empowerment
EMPOWERMENT
TECHNOLOGIES
_____ Semester, SY _____________
QUARTER 1, MODULE 2
1
Empowerment Technologies
Self-Learning Module
___Sem-Quarter 1 – Module 2 Online Safety, Security, Ethics and Etiquette
First Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalty.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright
owners. The publisher and authors do not represent nor claim ownership over them.
Division
Printed Management
in the Team:
Philippines by
Department of Education-Region IVB, School Division of Romblon
Office Address : Brgy. Capacian, Romblon, Romblon
Email Address : deped.sdoromblon@deped.gov.ph
2
Lesson 1 INTERNET THREATS
INTRODUCTION
• apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.
The internet is defined as the information superhighway. This means that anyone has
access to this highway, can place information, and can grab that information. Any information,
even things that you have set privately, can be accessed one way or another. This is why social
networking sites like Facebook continues to improve their security features. The threat of
cybercrimes is very real. While you may not experience the threat now, whatever information we
share today could affect our future.
Consider the illustration below. What are your thoughts on the image? What do you
believe the man is up to? Do you know someone or have you been a victim of someone acting
inappropriately on the internet?
3
What is an Internet Threat?
Web-based threats, or online threats, are a subset of cybersecurity risks that involve the
potential for an unpleasant event or action to occur through the internet.
There is no doubt that you must exercise caution online. With the evolution of the World
Wide Web, some internet nasties have exploited weaknesses to attack computers and steal
sensitive data from individuals. The majority of the time, we are unaware it is occurring until it is
too late. While the internet is an excellent medium for communication and information, there are
numerous dangerous hazards to avoid.
1. Spam – Simply as unwanted messages, the majority of our email accounts have a 'Spam'
or 'Junk' category implies that spam emails are a significant concern, accounting for more
than 50% of all emails. Apart from being bothersome, spam emails do not pose a direct
threat. Many, however, may contain malware.
2. Malware. Short for malicious software, is a blanket term for viruses, worms, trojans and
other harmful computer programs hackers use to wreak destruction and gain access to
sensitive information. The following are some types of malwares:
d. Worms - typically infect computers via a malicious email attachment or USB flash
drive. Once a worm has invaded your computer, it will very certainly send itself to
4
every email address stored on your system. Your email will appear innocent to the
recipient until they open it and become infected with the same worm.
3. Predators and Hackers. Computer security dangers and malware are created by people,
not machines. Hackers and predators are programmers who prey on others for their
personal advantage by hacking into computer systems in order to steal, alter, or destroy
data. This is a sort of cyber-terrorism. These online predators are capable of
compromising credit card information, preventing you from accessing your data, and
stealing your identity.
4. Phishing. A type of deception. Frequently, official-looking emails are sent in the name of
a reputable supplier, such as a bank. These emails are sent in an attempt to obtain
people's passwords and payment card information.
5. Pharming. A more sophisticated form of phishing that makes use of the DNS system.
Pharmers frequently design web pages that look exactly like those of a reputable
organization, such as an online banking log-in page. Users will then submit their
credentials, believing they are entering into their usual service, and the pharmer will steal
their credentials.
5
With so many risks lurking or concealing themselves on the internet, how can we ensure
our online safety? The following are some examples of how we might protect ourselves from
internet threats:
2. Read Terms and Conditions - While many users will object, reading terms and
conditions can help you have a better knowledge of how your online behavior is tracked.
Naturally, if a firm you are unfamiliar with advertises a bargain that appears to be too good
to be true, make sure you have an internet security solution in place and proceed with
care.
3. Protect Yourself - Using online security products that include identity theft protection is
one of the most effective ways to safeguard yourself against this type of cybercriminal.
Antivirus systems that include identity theft protection may be "taught" in fractions of a
second to spot phishing threats.
“Safety” and “Security” are used interchangeably in many books and articles because
both words are related to one another. But to put a strict sense to their meaning, here’s the
difference:
Online Safety. The main concern is the protection of computer machine, software systems,
files, data, and user’s health and life from threat, damage, and harm.
Online Security. The measure applied to safeguard the ICT system and block the entrance
of malicious software such as virus or to refrain from suspicious incoming files from unknown
sources.
6
User’s Health • Limit the amount of time Apply Web and Video Filter
you spend on the
internet and allow
adequate time for
physical activity.
• Leave the sites that
pollutes mind.
User’s Life • Do not give out all your Reset your password
personal information in regularly (but be sure to
social media. remember it)
• Unwanted internet
behavior should be
reported.
Netiquette is a term coined from the words network and etiquette that refers to a set of
rules governing acceptable online behavior. Internet ethics, likewise, is concerned with the
appropriate use of online resources in an online social setting.
Both terms are frequently used interchangeably and are frequently combined with the
concept of a 'netizen,' which is a contraction of the words internet and citizen and refers to both
an individual who uses the internet to participate in society and an individual who has accepted
the responsibility of using the internet productively and responsibly.
The norms of etiquette apply equally in cyberspace as they do in the real world—and the
evidence of poor netiquette can follow you for much longer. Follow to these basic netiquette
guidelines to avoid harming your online and offline interactions.
A. Speak Respectfully. If you wouldn't do it to the face of someone who might read what
you write, don't write it. This includes any social networking site, forum, chat room, or
email message, even if you think it's anonymous. Yes. It's not simply what you say, but
also how. Use the shift key for capital characters, or write in lower case, but not caps lock.
All capitals text is viewed as yelling. Please and thank you are required.
B. Share with Care. Avoid sending naked sexts, intoxicated photos, or unedited home
videos. If you don't want your boss, parents, or kids to see it, don't post it online. Phone
calls in public are also prohibited. Invisible to one person does not mean invisible to all
others.
C. Exclude No One. Send a private message to a single individual or a small group of people
you want to share an inside joke with. No obscure comments on your Facebook status,
forum, or Instagram story should make others feel left out. Laughing at text or email jokes
in front of others is also inappropriate. If you don't want to share it, save it.
7
D. Respect Privacy. Never forward information without first checking with the sender. You
may assume we are all online buddies, but your friends may not want their names or email
addresses made public. The same goes for posting or sending images or videos of other
people. Remember that tagging someone on Facebook allows others to view their photos
unless they have set their privacy settings. Sign up for newsletters and other
communications with your own email address.
E. Reposting Fact Checked. That cancer cure may seem fantastic, but if it is a scam, it will
cause confusion. And urban myths add to the internet's noise and waste time. If you are
unsure of the facts, email them to someone who does. Or use Google or Snopes.com.
Remember that many viruses are spread via chain letters and requests to share
information to ten friends or everyone in your address book. Don't be fooled. Sending the
message will bring you bad luck and karma.
F. Answer Emails Quickly. Accept and eliminate spam, unwanted messages, and other
nonsense. If you have provided someone your email address or are in a position where
people might fairly expect to contact you by email, please respond within a few days. If it
will take longer to respond, inform them via email. Don't just disregard a question if you
don't want to answer it. Reply that it is a challenging question and they should look
elsewhere for answers.
G. Form Good Connection Physically. When utilizing technology, it's easy to lose track of
what's going on around you, but connecting with others is more vital than ever. Remember
the great influence you can make by putting down your phone and talking to someone.
We are all aware that God ordered us to be good and do the right thing at all times. That
is why he gave His ten commandments for us to follow. But do you know that there are also ten
things we need to follow in using computers or ICT in general? Here are the Ten
Commandments of Computer Ethics:
I. Thou shalt not use a computer to harm other people. Don't use the computer to harm
others. It is unethical to use a computer to hurt another user. It's not just about pain. It
involves modifying or deleting other users' data.
II. Thou shalt not interfere with other people’s computer work. Use computer
technologies to disrupt other users' work. Computer software can be used to annoy or
interrupt other users.
III. Thou shalt not snoop around in other people’s computer files. Do not spy on
someone else's computer info. We realize it's wrong to read private letters. It's also illegal
to read someone's emails or files. Getting info from someone's personal files is like
breaking into their room.
IV. Thou shalt not use a computer to steal. Don't utilize computers to steal data. Stealing
or releasing sensitive information constitutes robbery.
V. Thou shalt not use a computer to bear false witness. Don't use computers to
propagate disinformation. The Internet has made information viral today. This implies that
8
incorrect information can spread quickly via social media or email. It's unethical to help
spread false information.
VI. Thou shalt not copy or use proprietary software for which you have not paid. Do
not copy or use proprietary software without permission (without permission). Avoid
pirating software or buying it. Unless the program is free. Software, like any other creative
work, is copyrighted. A line of code is the creator's own effort. It is his/her copyright.
VII. Thou shalt not use other people’s computer resources without authorization or
proper compensation. Unless approved, do not use another's computer. Multi-user
systems have unique passwords. Invading another user's password is immoral. Ethically,
breaking passwords is not a good idea.
VIII. Thou shalt not appropriate other people’s intellectual output. Do not steal other
people's ideas. It's wrong to claim ownership of someone else's work. A software
developer's programs are hers. If he works for an organization, they are its property. It's
unethical to copy and spread them in one's own name.
IX. Thou shalt think about the social consequences of the program you are writing or
the system you are designing. Consider the societal impact of software before building
it. Looking at the social implications of a program is a larger view of technology.
X. Thou shalt always use a computer in ways that shows consideration and respect
for others. Respect your fellow members when using computers to communicate. The
same rules apply to computer communication as they do in the physical world.
PRACTICE EXERCISE
MULTIPLE CHOICE
DIRECTIONS: Read each statement carefully and identify the word or group of words that best
describe the statement. Select from the given choices after each question and WRITE THE
LETTER OF YOUR ANSWER AT THE SPACE PROVIDED.
_____1. A type of malware software that displays unwanted ads when a user is surfing the
internet.
A. Adware B. Trojans C. Viruses D. Worms
_____2. A form of fraudulent activity wherein emails are sent to acquire people’s passwords and
credit card details.
A. Malware B. Hackers C. Phishing D. Pharming
_____3. Individuals capable of compromising credit card information, lock you out of your data,
and steal your identity.
A. Malware B. Hackers C. Phishing D. Pharming
9
_____4. A malware that usually attach themselves covertly to downloads as they are designed
to spread at an alarming rate.
A. Adware B. Trojans C. Viruses D. Worms
_____5. This malware can monitor your keystrokes, read and delete your files, reformat your
hard drive, and access your applications.
A. Keyloggers B. Spyware C. Adware D. Spam
DIRECTION: Please write your learning from the above discussion in your notebook or answer sheet.
WRITTEN WORKS
Directions: Read each statement carefully and identify if the statement is correct or not. Write T
if the statement is true and F if false. WRITE THE LETTER OF YOUR ANSWER AT THE SPACE
PROVIDED.
_____1. Be mindful of what you share online and what site you share it to.
_____2. Just accept terms and conditions to reduce the time in creating accounts online.
_____3. Keep your profile to public to have more friends.
_____4. We can share our passwords to our boyfriend or girlfriend to show love and trust.
_____5. Avoid downloading anything form untrusted websites.
_____6. We can use two or more antivirus software to ensure that our computer is safe.
_____7. Add friends you know in real life.
_____8. Do not reply or click links from suspicious emails.
_____9. Virus Protection is recommended to be turned on always.
_____10. Know the security features of the social networking site you use.
10
Part II. Multiple Choice
Directions: Read the situation and encircle the letter of the correct answer.
1. Sharon received an email from an unknown sender threatened to harm her if she will not
give all her personal information including her siblings’. What is the best thing that she
must do?
A. Do not give any personal information B. Blotter the incident to the authority
C. Do not keep it in secret. D. Turn-on Network Protection
2. Your father won't let you use a USB flash drive in his laptop because he is afraid about
viruses. There is no other method to send the crucial data but via USB. How will he be
able to protect himself from the virus threat?
A. Do not entrust your File password B. Use Antivirus and Perform USB Scan
C. Apply File Password D. Turn-on Network Protection
3. Your brother is enrolled in Science program. Their class are required to research in the
internet. His body is visibly slimming. His eyebags are becoming larger. One of the
possible causes is his regular, compulsive use of his smartphone. What is the best advise
would you give him?
A. Stop using and staring at the smartphone
B. Use the smartphone but do not connect to the internet anymore.
C. Do not take a bath after staring at the smartphone
D. Limit the number of hours in using smartphone
PERFORMANCE TASK
1. Share an experience that you've always done when using the internet but later discovered
that it violates ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE standards.
_________________________________________________________________________
_________________________________________________________________________
11
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
2. What are the steps that you will do in order not to repeat these actions?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Note: Your teacher will provide rubric on how your output will be rated.
12
Fruhlinger, J. (2019, May 17). Malware explained: How to prevent, detect and recover from it.
Retrieved from CSO: https://www.csoonline.com/article/3295877/what-is-malware-
viruses-worms-trojans-and-beyond.html
Hartney, E. (2020, January 13). 10 Basic Rules of Netiquette or Internet Etiquette. Retrieved from
Verywell Mind: https://www.verywellmind.com/ten-rules-of-netiquette-22285
Innovative Training Works, Inc. (2016). Empowerment Technologies. Manila: REX Book Store.
Landler, M. (2020, October 21). A Filipino Linked to 'Love Bug' Talks About His License to Hack.
Retrieved from The New York Times: https://www.nytimes.com/2000/10/21/business/a-
filipino-linked-to-love-bug-talks-about-his-license-to-hack.html
Luminet. (2016, December 14). The Top 10 Most Common Internet Threats. Retrieved from
Luminet: https://luminet.co.uk/top-10-common-internet-threats/
Webroot. (n.d.). Types of Computer Security Threats and How to Avoid Them. Retrieved from
WebRoot: https://www.webroot.com/us/en/resources/tips-articles/computer-security-
threats
Wikipedia. (n.d.). Ten Commandments of Computer Ethics. Retrieved from Wikipedia:
https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
D 5.
C 4.
D 3.
B 2.
B 1.
Written Work
Key to Correction
13