Anda di halaman 1dari 25

HOMAPON HIGH SCHOOL

Homapon, Legazpi City

Lesson2
Rules of
Netiquette
By: ROCHELLE SABDAO-NATO
SHS Teacher
Reference: EMPOWERMENT
Technologies
Innovative Training Work, Inc.
First Edition
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determined how to avoid the
dangers of the internet.
4. Be responsible in the use of social
networking sites
Objective:
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation when
using the internet.
3. Know and determined how to avoid the
dangers of the internet
4. Be responsible in the use of social
networking sites
Protecting
reputations
online
Internet
Copyright
Threats

Contextualized
Online
Rules of online search
Security, safety
Netiquette and research
and ethics
skills
Pre-test
Write YES if you agree with the statement and NO if you
disagree.
1. My computer has an antivirus so it is okay to open
most e-mail attachments like e-cards and video files.
2. Your friend told you that this college application was
rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video
several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that
the college found the video?
3. You and your best friend play a lot of video
games. One time, she asks you for your
password so she can help you level up and get
in-game money. She promises to keep your
password a secret. Is it okay to give away your
password?
4. You received an email stating that your
mother’s bank account is going to be forfeited if
you do not respond to the email. Is it safe to
reply?
5. You forgot that your essay for English
class is due tomorrow. While doing your
research, you found a website offering free
essays. Is it okay to use the essay from this
free essay website?
6. A virus is a malware that multiplies and
infects other computers through flash
drives.
7. Keyloggers are software that show pop-
up ads even if you are not using your
browser.
8. Search engines scan websites for search
results even if you have set your post to
“private”.
9. There is a danger in posting information
about a future vacation.
10. Letting people know your birthday is
probably a must if you want to get as many gifts
as possible. But having it in your profile makes
you vulnerable to identify the theft.
10 best rules of netiquette

The Golden Rule No FLAMING


Don’t type in ALL CAPS Don’t SPAM (it is any
( Treat others as you (Flame is a personal ( people may unsolicited e-mail from
would like to be insult communicated misinterpret) unknown sources)
treated) through the internet

Don’t talk with people Use proper Grammar BE HONEST / Be


Obey Copyright Laws
you do not know ( do and Spelling yourself
not arrange to meet (Don’t steal someone
(errors diminishes the (tell the truth, do not
anyone you meet else’s idea, property
credibility of the pretend to be someone
online) and rights)
message else)

Follow the TOS SHOP SECURE SITES


(TOS- Term of Service) (These are sites with
transport layer security
(Rules and policy of (TLS or SLS Socket
the sites Layer Security
Online Safety and Security

What is internet
Safety?
-It refers to the
online security or
safety of people and
their information
when using the
internet.
HTTPS - "Hyper-Text Transfer Protocol
Secure"
TYPE OF INFORMATION RISKS

1. First Name There is a risk in sharing your first name, Chances are , a
hacker may already know plenty of stuff about you even
if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your
first and last is more risky. Matching a name with a face
is a modus to several cybercrimes' like identity theft
3. Middle Name Sharing your middle name is probably not the most risky
of these shared information, but sharing your full name
would be.
4. Current and Most people who steal identities study their subject.
previous school/s They can use this information for verification purposes.
5. Your cell phone You cell phone number should never be posted over the
number internet.
Internet Threats

1. Malware – Stands What it is good for?


for malicious a. Steal personal
software. information
- is a set of b. Delete files
instructions that run c. Click fraud
on you computer and d. Steal software serial
make your system do numbers
something that an e. Use your computer
attacker wants it to do. as relay
Different Kinds of Malware

Keyloggers

Virus Worm Trojan Spyware Adware

Rogue
security
software
Virus

- A computer virus is a piece of malicious


computer code that attaches itself to a
software program, email or computer file
without your permission.
- It can transfers through the internet and
local networks or data storage like flash
drives and CD’s
Rogue security software- tricks
the user into posting that is a
security software. It asks the user to
pay to improve hi/her security but in
reality that are not protected at all.

Worm
Trojan
A malicious program
A malicious program Spread to that transfers from one
that is disguised as a other
computer to another by
useful program but computers
any type of means. It
once downloaded or uses computer network
installed, leaves your to spread itself.
PC unprotected and
Ex. ILOVEYOU worm
allows hackers to get
your information. Love Bug Worm created
by Filipino
Spyware

- A program that runs in the background


without you knowing it. It has the ability to
monitor what you are currently doing and typing
through keylogging.
Keyloggers- used to record the keystroke
done by the user. This is done to steal their
password or any other sensitive information. It
can record email, messages or any information
you type using your keyboard.
Adware
A program designed to send your
advertisement, mostly as pop-ups

SPAM- Refers to the


transmission of unsolicited
messages from various origins
using electric messaging
systems
EXAMPLE
* Pharming – a more complicated way of
phishing where it exploits the DNS (Domain
Name Service) system

Phishing – is a software or a
program used by an attacker to
obtain personal information.
- It targets the
passwords to hack and take
control of a user account..
How to avoid these threats?
A very effective way of avoiding these threats is
verifying the authenticity and credibility of the
WEB source
Think before You Click !
1. Ask yourself? Would you want your parents or
grandparents to see it?

Talk to your friends about this serious responsibility.

Set your post to “private”

Avoid using names. Names are easy for search engines to


scan

If you feel that a post can affect you or other’s reputation,


ask the one who posted it to pull it down or report it as
inappropriate

Anda mungkin juga menyukai