Lesson2
Rules of
Netiquette
By: ROCHELLE SABDAO-NATO
SHS Teacher
Reference: EMPOWERMENT
Technologies
Innovative Training Work, Inc.
First Edition
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determined how to avoid the
dangers of the internet.
4. Be responsible in the use of social
networking sites
Objective:
1. Consider one’s and others’ safety when
sharing information using the internet.
2. Consider one’s and others’ reputation when
using the internet.
3. Know and determined how to avoid the
dangers of the internet
4. Be responsible in the use of social
networking sites
Protecting
reputations
online
Internet
Copyright
Threats
Contextualized
Online
Rules of online search
Security, safety
Netiquette and research
and ethics
skills
Pre-test
Write YES if you agree with the statement and NO if you
disagree.
1. My computer has an antivirus so it is okay to open
most e-mail attachments like e-cards and video files.
2. Your friend told you that this college application was
rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video
several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that
the college found the video?
3. You and your best friend play a lot of video
games. One time, she asks you for your
password so she can help you level up and get
in-game money. She promises to keep your
password a secret. Is it okay to give away your
password?
4. You received an email stating that your
mother’s bank account is going to be forfeited if
you do not respond to the email. Is it safe to
reply?
5. You forgot that your essay for English
class is due tomorrow. While doing your
research, you found a website offering free
essays. Is it okay to use the essay from this
free essay website?
6. A virus is a malware that multiplies and
infects other computers through flash
drives.
7. Keyloggers are software that show pop-
up ads even if you are not using your
browser.
8. Search engines scan websites for search
results even if you have set your post to
“private”.
9. There is a danger in posting information
about a future vacation.
10. Letting people know your birthday is
probably a must if you want to get as many gifts
as possible. But having it in your profile makes
you vulnerable to identify the theft.
10 best rules of netiquette
What is internet
Safety?
-It refers to the
online security or
safety of people and
their information
when using the
internet.
HTTPS - "Hyper-Text Transfer Protocol
Secure"
TYPE OF INFORMATION RISKS
1. First Name There is a risk in sharing your first name, Chances are , a
hacker may already know plenty of stuff about you even
if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your
first and last is more risky. Matching a name with a face
is a modus to several cybercrimes' like identity theft
3. Middle Name Sharing your middle name is probably not the most risky
of these shared information, but sharing your full name
would be.
4. Current and Most people who steal identities study their subject.
previous school/s They can use this information for verification purposes.
5. Your cell phone You cell phone number should never be posted over the
number internet.
Internet Threats
Keyloggers
Rogue
security
software
Virus
Worm
Trojan
A malicious program
A malicious program Spread to that transfers from one
that is disguised as a other
computer to another by
useful program but computers
any type of means. It
once downloaded or uses computer network
installed, leaves your to spread itself.
PC unprotected and
Ex. ILOVEYOU worm
allows hackers to get
your information. Love Bug Worm created
by Filipino
Spyware
Phishing – is a software or a
program used by an attacker to
obtain personal information.
- It targets the
passwords to hack and take
control of a user account..
How to avoid these threats?
A very effective way of avoiding these threats is
verifying the authenticity and credibility of the
WEB source
Think before You Click !
1. Ask yourself? Would you want your parents or
grandparents to see it?