Week 3 - Empowerment Technology

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

EMPOWERMENT TECHNOLOGY

Online Safety, Security,


Ethics and Etiquette
Week 3 Lesson

MOST ESSENTIAL LEARNING COMPETENCY

● Apply online safety, security, ethics, and etiquette standards


and practice in the use of ICts as it would relate to their
specific professional tracks

Eric M. Marilag
EMPOWERMENT TECHNOLOGY

Week 3 Lesson

OBJECTIVES
➢Identify the online safety measures
➢ Define online ethics and netiquette
➢ Apply online safety, security, ethics and etiquette standards
and practice in the sue of ICTs.
Online Safety
•refers to the practices and precautions that should be
observed when using the Internet to ensure that the users
as well as their computers and personal information are
safe from crimes associated with using the internet.

Tips on how to be safe online
❏ Do not share your password with anyone.
❏ Add friends you know in real life.
❏ Do not visit untrusted websites.
❏ Add password to your WIFI at home to make it
private.
❏ Install and update antivirus in your computer.
❏ Do not give your personal information to anyone
.
❏ Think before you click.
❏ Never post about your future vacation
Common Online Risk
★ Cyberbullying It happens when someone intentionally
abused, harass, and mistreated by other person using
electronic communication.
★ Identity Theft It is a crime of stealing personal information for
the purpose of assuming that person’s name or identity to
make any form of transactions.
★ Cyber Stalking A criminal practice where electronic
communication is used to stalk or harass individual or group.
★ Sexting The act of sending sexually explicit text messages,
images, and videos.
Common Internet Threats
Malware – also known as Malicious Software.

Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take
control of your computer
3. Worm – malicious program that copy’s itself and spreads to other
computers.
Common Internet Threats
Malware – also known as Malicious Software.

Types of Malware
4. Spyware – A malicious program that gathers information from
victim’s computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several
times on victim’s computer then behave abnormally and
tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to
hack by recording every keystroke that a user makes on
their computer or device.
Common Internet Threats
Malware – also known as Malicious Software.

Types of Malware
7. Botnet – A collection of infected internet–connected devices such as
PC and mobile phone that are controlled by a common type
of malware.

8. Rootkit – A software tools used by hackers to gain control over a


computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom
through online method for the removal of the virus.
Common Internet Threats
Spam
known as junk email or unwanted email send by advertiser or bot. It
can be used to send malware.
Phishing
A cyberattack method using deceptive emails and websites to
acquiring sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in committing a
crime such hacking, phishing, spamming, child pornography, libel,
hate crimes, identity thief and others.
Cybercrime Law
A law that deals with all forms of cybercrime.
Common Internet Threats
Internet scam
is a type of scam that misleads the user in many ways attempting to
take lead of them. The purpose of this scam is to cheat the target of
their personal property directly rather than private information through
fabricated promises, confidence tricks and many more.
Netiquette
It is a word that came from the two words “net” and “etiquette”. It is an
etiquette applied online that shows proper manner and behavior. If
you are a member of an online society through social media you are
called netizen. And in interacting with other netizen online, we need to
maintain good behavior which is acceptable to others in online
community
The Core Rules of Netiquette by Seth T. Ross
1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in
real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
EMPOWERMENT TECHNOLOGY

THANK YOU!

You might also like