Lesson 2 - Rules of Netiquette

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

RULES OF

NETIQUETTE
LESSON 2
Lesson Objectives
Consider one’s and other’s safety when
sharing information using the Internet;
Consider one’s and other’s reputation when
using the Internet;
Determine and avoid the dangers of the
Internet
Lesson Objectives
Be responsible in the use of social networking
site; and
Browse the Internet efficiency and properly
through referencing.
ACTIVITY
Guide Questions:
How many hours do you spend on the Internet
per day?
Can you live without the internet for a week?
How many aspects of your life depend on the
internet?
How many times have you complained about
your internet connection speed?
Guide Questions:
How many hours do you spend on the Internet
per day?
Can you live without the internet for a week?
How many aspects of your life depend on the
internet?
How many times have you complained about
your internet connection speed?
Discussion
As teenagers, you are all exposed to many
things powered by the Internet.
Whether it is socializing, playing games,
reading sports news, shopping, etc., the Internet
has given you one of the most powerful tools
that your parents, during their teenage years,
did not have.
ONLINE SAFETY AND
SECURITY
The internet, truly, is a powerful tool. It can be
used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a
source of entertainment though games, online
communities, and everything in between. But like
most things in this world, there is always the
“other side of the coin”.
ONLINE SAFETY AND
SECURITY
The internet is one of the most dangerous
places, especially if you do not know what you are
doing with it.
The internet is defined as the information
superhighway. This means that anyone has access
to this highway, can place information, and can
grab that information.
TIPS TO STAY SAFE ONLINE
The Internet is a public place and it is up to you
to protect yourself.
There are some tips to help you stay safe when
sing the Internet.
TIPS TO STAY SAFE ONLINE
1. Be mindful of what you share online and what
site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to
learn how the website handles the information
you share.
TIPS TO STAY SAFE ONLINE
4. Know the security features of the social
networking site you use. By keeping your profile
private, search engines will not be able to scan
your profile.

5. Do not share your password with anyone.


TIPS TO STAY SAFE ONLINE
6. Avoid logging in to public networks/Wi-Fi.
Browsing in “incognito (or private) mode,” a feature
of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-
to-face.
8. Never post anything about a future vacation. It
is similar to posting, “Rob my house at this date.”
TIPS TO STAY SAFE ONLINE
9. Add friends you know in real life
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer. Use only one antivirus software to avoid
conflicts.
12. If you have a Wi-Fi at home, make it private
network by adding a password.
TIPS TO STAY SAFE ONLINE
13. Avoid downloading anything from untrusted
websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or clicks from suspicious emails.
INTERNET THREATS
Here are some of the threats you should be aware
of using the Internet:
1. Malware
2. Spam
3. Phishing
INTERNET THREATS
1. Malware - stands for malicious software
a. Virus – a malicious program designed to
replicate itself and transfer from one
computer to another either through
the
internet and local networks or data
storage like flash drives and CDs.
INTERNET THREATS
b. Worm – a malicious program that transfers from
one computer to another by any type of means.
Often, it uses a computer network to spread itself.
For example, the ILOVEYOU worm (Love Bug
Worm) created by Filipino.
INTERNET THREATS
c. Trojan – a malicious program that is disguised as
a useful program but once downloaded or
installed, leaves your PC unprotected and allows
hackers to get information.
Rogue security software – tricks the user into
posing that it is a security software. It asks the user
to pay to improve his/her security but in reality, they
are not protected at all.
INTERNET THREATS
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy). It has the ability to monitor what you are
currently doing and typing through keylogging.
Keyloggers – used to record the keystroke done by the
users. This is done to steal their password or any other
sensitive information. It can record email, messages, or
any information you type using your keyboard
INTERNET THREATS
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy). It has the ability to monitor what you are
currently doing and typing through keylogging.
Keyloggers – used to record the keystroke done by the
users. This is done to steal their password or any other
sensitive information. It can record email, messages, or
any information you type using your keyboard
INTERNET THREATS
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.

2. Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware.
INTERNET THREATS
3. Phishing – Its goal is to acquire sensitive
information like passwords and credit card details.
This is done by sending you an email that will direct
the user to visit a website and be asked to update
his/her username, password, credit card, or
personal information.
Pharming – a more complicated way of phishing where it
exploits the DNS (Domain Name Service) system.
PROTECTING REPUTATION
ONLINE
In the past, doing something embarrassing was
not much of a big deal. It happened; people would
laugh at it, and they would move on.
Nowadays, embarrassing moments are captured
using any device you could imagine. What is worse
is that people can easily upload it to the internet,
where it can be stored forever.
PROTECTING REPUTATION
ONLINE
Once you post something over the Internet,
search engines keep them in their archives for
search results.
Something you and your friends and your friends
find funny today may be something that could harm
someone’s reputation later.
PROTECTING REPUTATION
ONLINE
Before hiring, companies do a background check
on the applicant, and the easiest way to check your
background us to visit pages that are related to you.
THINK BEFORE YOU CLICK

Here are things you might want to consider before


posting something over the internet:
1. Before you oust something on the web, ask these
questions to yourself: Would you want your
parents or grandparents to see it? Would you want
your future boss see it? Once you post something
on the web, you have no control of who sees your
photos.
THINK BEFORE YOU CLICK

2. Your friends depend on you to protect their


reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private”. In this way, search
engines will not be able to scan that post.
THINK BEFORE YOU CLICK

4. Avoid using names. Names are easy for search


engines to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
down or report it as inappropriate.

You might also like