Week 3 - Empowerment Technology
Week 3 - Empowerment Technology
Week 3 - Empowerment Technology
Eric M. Marilag
EMPOWERMENT TECHNOLOGY
Week 3 Lesson
OBJECTIVES
➢Identify the online safety measures
➢ Define online ethics and netiquette
➢ Apply online safety, security, ethics and etiquette standards
and practice in the sue of ICTs.
Online Safety
•refers to the practices and precautions that should be
observed when using the Internet to ensure that the users
as well as their computers and personal information are
safe from crimes associated with using the internet.
•
Tips on how to be safe online
❏ Do not share your password with anyone.
❏ Add friends you know in real life.
❏ Do not visit untrusted websites.
❏ Add password to your WIFI at home to make it
private.
❏ Install and update antivirus in your computer.
❏ Do not give your personal information to anyone
.
❏ Think before you click.
❏ Never post about your future vacation
Common Online Risk
★ Cyberbullying It happens when someone intentionally
abused, harass, and mistreated by other person using
electronic communication.
★ Identity Theft It is a crime of stealing personal information for
the purpose of assuming that person’s name or identity to
make any form of transactions.
★ Cyber Stalking A criminal practice where electronic
communication is used to stalk or harass individual or group.
★ Sexting The act of sending sexually explicit text messages,
images, and videos.
Common Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take
control of your computer
3. Worm – malicious program that copy’s itself and spreads to other
computers.
Common Internet Threats
Malware – also known as Malicious Software.
Types of Malware
4. Spyware – A malicious program that gathers information from
victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several
times on victim’s computer then behave abnormally and
tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to
hack by recording every keystroke that a user makes on
their computer or device.
Common Internet Threats
Malware – also known as Malicious Software.
Types of Malware
7. Botnet – A collection of infected internet–connected devices such as
PC and mobile phone that are controlled by a common type
of malware.
THANK YOU!