ET-APW-Week-1B

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Department of Education

SCHOOLS DIVISION OF CITY OF MEYCAUAYAN


Pag-asa St., Malhacan, City of Meycauayan, Bulacan

Senior High School

Activity Performance 11/12


Worksheet in
EMPOWERMENT TECHNOLOGY
Third Quarter – Week 1B
Apply Online Safety, Security, Ethics,
and Etiquette Standards and Practice in
the Use of ICTs as it Would Relate to
their Specific Professional Track
CS_ICT11/12-ICTPT-Ia-b-2
ONLINE SECURITY, SAFETY AND ETHICS

I. Introduction
The internet is a great tool. It can be used to endorse your business, have new
friends, and even be in contact with the elderly. It could also be a source of
entertainment through games, online servers and networks, and everything in
between. But like the majority of things in this world, there is always that “dark side.”
The Internet is one of those most hazardous places, particularly if you are not familiar
with what you’re doing with it. However, don’t worry, for it is never too late. Hopefully,
by the end of this lesson, you can think through how you go about your use of the
Internet.

II. Learning Competency/ Unit of Competency


Lesson 2 MELC 1: Apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific professional track
(CS_ICT11/12-ICTPT-Ia-b-2)

III. Nominal Duration


2 Days

IV. Objectives/ Learning Outcomes


1. Discuss the dangers of the Internet.
2. Identify the safety and security when sharing information using the internet.
3. Promote responsible ways of using social networking sites.

V. Content/ Lesson
Online Security, Safety and Ethics

Materials:
PowerPoint Presentation
Information Sheets
URL reference

2
VI. Procedure (Knowledge)

Online Safety and Security

Online safety is the practice of securing yourself from any online threats that
may endanger your personal information or even the device that you are using from
any harmful dangers.

Online security offers you online safety. These are the actions that are used to
make sure that online user data and privacy are not compromised by cybercriminals.

The Internet is dubbed as the


information superhighway. This means that
anyone who has access to this highway can get
that information. Any information, even things
that you have set privately, can be scanned in
any means. This is why social networking sites
such as Facebook continue to improve their
security features. The danger of cybercrime is
real. While you may not experience it now,
whatever information we share today could
https://images.app.goo.gl/5FG2MZa
affect our future.
NkFZChAyD8

INTERNET SAFETY- it pertains to the online


security or safety of users and their information when using the Internet.

Key Terms:
Cyberspace – A conceptual place that doesn’t actually physically exist but you
can roam around in it, visit places, meet other people there, chat to them, and
go shopping

Netizen / Digital Citizenship – A person who actively uses the internet especially
in a proper and responsible way

Ethics – rules of behavior based on ideas about what is morally good and bad

Etiquette – rules indicating the proper and polite way to behave security and
responsibility

Netiquette- is network etiquette, the dos and don’ts of online communication.


Rules about the proper and polite way to communicate with other people when
you are using the internet.

TEN RULES OF NETIQUETTE


1. Remember the human (Memento humani)
2. Follow the same rules online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people’s time and bandwidth.
5. Make yourself pleasant online.
6. Share your knowledge.
7. Help keep fights under control.

3
8. Respect the privacy of other people.
9. Don’t abuse your power.
10. Be forgiving of other people’s mistakes.

INTERNET THREATS

1. Malware – stands for malicious software


A. Virus – a malicious program
designed to multiply and infect
other computers.

B. Worm – a malicious program that


transfers from one computer to
another by any type of method.
Often, it uses a computer network
to spread itself.

C. Trojan horses – a malicious program pretending as a useful program but


once downloaded or installed, leaves your PC vulnerable and lets hackers
get your information.

D. Rogue security software – tricks the user into pretending that it is a type of
security software. It requests the user to pay to improve his/her security
but actually, they are not protected at all.

E. Spyware – a program that works in the background without you knowing it


(therefore called “spy”). It can track what you are currently doing and
typing through keylogging.

F. Key loggers – used to take note of the keystroke done by the users. This is
done to steal their password or any sensitive information. It can record
messages, emails, or any information you type done on your keyboard.

G. Adware – a program designed to send you unwanted pop-up


advertisements.

2. Spam – unwanted email mostly from bots or advertisers that might be used to send
malware. These are mass sharing of unwanted messages on the internet.

3. Phishing –acquires sensitive personal information like passwords and credit card
details by sending you an email that will direct the user to visit a website and be
asked to update his/ her username, password, credit card, or personal
information.

4. Pharming – a more complex way of phishing where it manipulates the DNS


(Domain Name Service) system. Pharming is a method cybercriminal might use to
improve their odds of tricking online users with phishing websites.

5. Scams- scamming is the dishonest way of making money through getting sensitive
information from online users.

4
Protecting Reputations Online

When you post something over the Internet, search engines save them in their
archives for search results. This makes everything you post to stay forever even if
you remove it on your page. Something you and your friends find hilarious today
may be something that could harm someone’s reputation later.

Think Before You Click


Here are things you might be considering before posting something on the Internet:

1. Before you post something on the web, ask these questions to yourself:
a) Would you want your parents or grandparents to see it?
b) Would you want your future boss to see it?
c) Once you post something on the web, you have no control over who sees
your posts.

2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.

3. Set your post to “private” in this way, search engines will not be able to scan that
post.

4. Avoid using names. Names are easy for search engines to scan.’’

5. If you feel that a post can affect you or other’s reputation, ask the one who posted
it to pull it down or report it as inappropriate.

Copyright Infringement
If you make something – a form of literary work, an invention, an idea, or
research, you have the advantage as to how it ought to be used by others. This is
known as Intellectual Property. Simply put, the copyright law comprises your rights
over your work, and anybody who uses it without your permission is indictable by
law.

Here are some pieces of advice that could help you avoid copyright infringement:
1. Understand. Copyright defends paintings, photographs, literary work, films,
drawings, choreography, music (and lyrics), and sculptures, but it commonly does
NOT cover fundamental concepts and facts. This means that you can convey
something using your own words, but you must give recognition to the source.

2. Be responsible. Even if a piece of material doesn’t say that it is copyrighted, it’s


not an effective defense contrary to copyright. Be accountable enough to
distinguish if something has copyright.

3. Be creative. Ask yourself whether what you are creating is something that
originated from you or something made from somebody else’s ideas. It is necessary
to add your imaginative genius in everything that will be attributed to you.

4. Know the law. There are some boundaries to copyright laws. For example, in the
Philippines, copyrights only remain for a lifetime (of the author) plus 50 years.
There are also requirements for “fair use” which means that intellectual property

5
may be used without permission given that it is used in criticisms, library
archiving, commentaries, parodies, search engines, teaching, news reports,
research, and education. If you have worries that what you are doing does not fall
in the policy of fair use, seek consent first.

VII. Assessment

Activity 1 (Knowledge)
TRUE or FALSE.
Directions: Write the word TRUE if the statement is correct and FALSE if it is not. Put
your answer on a separate answer sheet.
_____ 1. Trojan is a technique used to take note of keystrokes done by the user.
_____ 2. Spam is undesirable email mostly from bots.
_____ 3. Spyware are designed to send you unwanted advertisements.
_____ 4. Copyright states that anyone who uses your work without your consent is
punishable by law.
_____ 5. Key loggers are programs disguised as useful but are actually not.
_____ 6. Malware is short for malicious software.
_____ 7. Copyright states that anyone who uses your work without your consent is
punishable by law.
_____ 8. Spyware are kinds of malware designed to send you unwanted
advertisements.
_____ 9. Virus is a kind of malware that replicates and transfers from one computer
to another.
_____10. The internet is dubbed as the information superhighway.

Activity 2 (Understanding)
Directions: In one paragraph, explain the importance of protecting your reputation
online.
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________

Activity 3 (Performance)
Directions: Create a slogan that promotes the responsible ways of using social
networking sites.

6
References
Mocan, Tim. “What Is Online Security? (Your Guide to Internet Safety).” CactusVPN, August
31, 2020. https://www.cactusvpn.com/beginners-guide-online-security/what-is-
online-security/.
Regis, Joyce. “Empowerment Technologies LESSONS 1-15.” Empowerment Technology,
April 1, 2018. https://ictcom444251764.wordpress.com/2018/03/31/empowerment-
technologies-lessons-1-
15/?fbclid=IwAR2pOrRyGiNKKB0IZRPXMYJXZCO9L8cdPwGWWfZIqD.

All Rights Reserved


2020

ACKNOWLEDGEMENT
CAROLINA S. VIOLETA EdD
Schools Division Superintendent

JERRY DIMLA CRUZ, PhD, CESE


Asst. Schools Division Superintendent

DOMINADOR M. CABRERA EdD


Chief, Curriculum Implementation Division

EDWARD C. JIMENEZ PhD


Education Program Supervisor- LR Manager

RAMILO C. CRUZ PhD


Education Program Supervisor-EPP/TLE/TVL

MA. LEONORA S. CHOU


Developer/Writer

You might also like