SlideShare a Scribd company logo
1 of 50
ONLINE
SAFETY,
SECURITY AND
RULES OF
NETIQUETTE
ACTIVITY
In a piece of paper write down your observation on the
following images.
ONLINE SAFETY
ONLINE SAFETY
HOW MANY CHECKS YOU HAVE FOR SHARED?
HOW MANY CHECKS YOU HAVE FOR NOT SHARED?
HOW SAFE ARE YOU WHEN USING THE INTERNET?
ONLINE SAFETY
First Name
Thereisstillariskinsharingyourfirstname.chances
are,hackeralreadyknowsplentyofstuffaboutyouevenif
youonlygiveout yourfirstname.
Last Name
Ifsharingyourfirstnamehasasmallrisk,sharingboth
yourfirst andlastnameismorerisky
.
ONLINE SAFETY
Middle Name
Sharingyourmiddlenameisprobablynotthemostriskyofthese
sharedinformation,butsharingyourentirefullnamewouldbe.
Current and Previous School
Mostpeoplewhostealidentitiesstudytheirsubject.Theycanuse
thisinformationforverificationpurposes.
ONLINE SAFETY
Y
ourCell phoneNumber
Y
ourcellphonenumbershouldneverbepostedoverthe
internet.
Theinternetisapublicplace,itisthesameaspostingyour
numberonabillboard.
WhoyourMotherandFather are
Riskyyetnotasriskyaspostingtheirfullnames,
especiallyyour Mother’
sMaidenN
a
m
e
.
ONLINE SAFETY
Whoyoursiblingsare
Thisisahugeriskespeciallyifyouhaveayoungersiblings.
Strangersmaypretendorusetheiridentitytodupeyou.
Y
ouraddress
Itwouldbemucheasierforcriminalstofindyou.
ONLINE SAFETY
Y
ourHomePhoneNumber
Scamsusuallyusethisinformationtodeceiveyou,oneof
whichis whenastrangerpretendstoknowyourparentsor
pretendstobeyou.
Y
our Birthday
Havingitinyourprofilemakesyoumorevulnerableto
identity theft.
ONLINE SAFETY
-it refers to the safety of people andtheir
information when usinginternet.
-refers to the practices andprecautions
that should be observed when usingthe
internet to ensure that the usersaswellas
their computers and personal information
are safe from crimes associatedusingthe
internet.
ONLINE SAFETY
ONLINE SAFETY MEASURES
1. Never give any personal informationout
about yourself over theinternet.
2. Never give any banking or sensitive
information unlessyouare sure that it isa
reputable businesshaving asecureservice.
3. Never open anymessagesor attachment
from someone youdon’tknow.
ONLINE SAFETY MEASURES
4. Regularly checkyour privacy settings in
your account to make sureyouare notsharing
important personalinformation.
5. When usingapublic computer terminal
make sure to delete your browsing databefore
leaving.
ONLINE SAFETY MEASURES
6. Keepyour software updated toavoid
security holes.
7. Donot download or install software or
anything on your computer or cell phonethat
isunknown to you.
-relatedtonotonlyInternet,ofteninvolvingbrowsersecurityandthe
WorldWideWeb,butalsonetworksecurityasitappliestootherapplications
oroperatingsystemsasawhole.
ONLINE SECURITY
SECURITY REQUIREMENT
TRIAD
Confidentiality
Data confidentiality
Privacy
Integrity
 Data integrity
 System integrity
Availability
Types of System Intruders
Masquerader
- Unauthorized userwho penetrates asystemexploitinga
legitimate user’saccount(outside).
Hackers
- Legitimate userwho makesunauthorized accessesor misuses
hisprivileges (inside).
Clandestine user
- Seizessupervisorycontrol to evade auditing andaccess
controls or suppressaudit collection(inside|outside)
Parts of Virus
Infection mechanism
- The meansby which avirusspreads, enabling it
to replicate. The mechanismisalsoreferred to
asthe infection vector.
- Thisishow the virus spreadsor propagates.A
virus typically hasasearchroutine, which
locates new files or new disksforinfection
Parts of Virus
Trigger
-Alsoknown asalogic bomb, this isthe compiled
version that could be activated any time within
anexecutable file when the virus isrunthat
determines the event or condition for the malicious
"payload" to be activated or delivered suchasa
particular date, aparticular time, particularpresence
of another program, capacityof the diskexceeding
somelimit, or adouble-click that opensaparticular
file.
Parts of Virus
Payload
-The "payload" isthe actual body or data whichcarries
out the malicious purpose of the virus. Payloadactivity
might be noticeable (e.g., becauseit causesthesystem
to slow down or "freeze"), asmost of the time the
"payload" itself isthe harmful activity, or sometimes
non-destructive but distributive, which iscalled virus
hoax.
Virus Stages
Dormant Phase
-The Virusisidle.
Propagation Phase
-Virus placesan identical copyof itself intoother
programs or into certain systemareas on the
disk.
Virus Stages
Triggering Phase
-Virus isactivated to perform the functionfor
which it wasintended.
Execution Phase
-It canbe destructive suchasdeleting files on
disk, crashingthe system, or corrupting files or
relatively harmlesssuchaspopping up humorous
or political messagesonscreen.
Key Terms
1. Cyber Crime
- acrime committed or assistedthrough the
use of theInternet.
a. Cyber Bullying
- canwork in the sameway asbullyingin the
playground; the victim feelsfrightened and
alone, while the bully tries to hide from being
caught.
Key Terms
1. Cyber Crime
b. Cyber Stalking
-Harassment on the internet can be just as
frightening asother forms of stalking.
Key Terms
1. Cyber Crime
c. Identity Theft
-The more informationyou make available online,
the greater the risk of identity theft. It can be very
tempting to reply to an email or open an
attachment or post information about yourself on
social networking sites, but you should never do
it.
Key Terms
1. Cyber Crime
d. Sexting
- usually refers to sending and receiving rude
messages or videosof:
 naked pictures
 'underwear shots'
 anysexual texts, imagesor videos
Key Terms
1. Cyber Crime
d. Sexting
-These images or videos can be sent from a
boyfriend or girlfriend or afriend or someone
you've met online. You also may have sent a
sexual photo, video or text to someone else.
Key Terms
1. Cyber Crime
d. Sexting
Remember:
 There isno turning backonceyoupresssend.
 Evenif youuseappslike Snapchattheperson
cantake ascreenshot
 Yourisk being seenassomeone youare not.
Key Terms
2. Privacy Policy /Terms of Service
- tells the user how the website will handle its
data.
3. Malware
-stands for malicious software variants,including
viruses, ransom ware andspyware.
Key Terms
3. Malware
a. Virus
- amalicious program designed to transfer from one
computer to another in any means possible.
b. Worms
- amalicious program designed to replicate itself and
transfer from one file folder to another and also
transfer toother computers.
Key Terms
3. Malware
c. Trojan
- a malicious program designed that is disguised as a
useful program but once downloaded or installed,
leaves your PCunprotected and allows hackerto
get yourinformation.
Key Terms
3. Malware
d. Spyware
- aprogram that runs in the background without you
knowing it. It has the ability to monitor what you
are currently doing and typing through key logging.
e. Adware
- aprogram designed to send you advertisement,
mostly pop-ups.
Key Terms
4. Spam
- unwanted email mostly from botsor
advertisers.
5. Phishing
-acquires sensitive personal information like
passwords and credits card details.
Key Terms
6. Pharming
- amore complicated way of phishing whereit
exploits the DNSsystem.
7. Copyright
- apart oflaw, wherein you have the rights to
work, anyone who usesit w/o your consentis
punishable by law.
Key Terms
8. Fair use
- meansthat anintellectual property maybe
usedw/o consent aslong asit isusedin
commentaries, criticism, parodies, researchand
etc.
9. Key Loggers
- usedto record the keystrokes done byuser.
Thisisdone to steal passwordsor anyother
sensitive information.
Key Terms
10. Rogue Security Software
- isaform of malicious software and internet
fraud that misleadsusersinto believing there isa
virus on their computer, andmanipulatesthem
into paying money for afake malwareremoval
tool.
-isnetworketiquette,thed
o
’
sanddon’tsof
onlinecommunication.
NETIQUETTE
10 Rules of Netiquette
Rule 1: Remember the Human
 You need to remember that you are talking to a
real person when you are online.
 The internet brings people together who would
otherwise nevermeet.
 Remember this saying when sending an email:
Would I say this to the person’s face.
10 Rules of Netiquette
Rule 2: Adhere to the same standard online
that you follow in real life
You need to behave the same way online that you
do in reallife.
You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
You are still talking to areal person with feelings
even though you can’tsee them.
10 Rules of Netiquette
Rule 3: Knowwhere you are in cyber space
 Always take a look around when you enter anew
domain when surfing the web.
Get asense of what the discussion group is about
before you joinit.
10 Rules of Netiquette
Rule 4: Respect other people’s time and
bandwidth
Remember people have other things to do besides
read your email. You are not the center of their
world.
Keep your post and emails to minimum by saying
what you want to say.
Remember everyone won’tanswer your
questions.
10 Rules of Netiquette
Rule 5: Make yourself look good online
Bepolite and pleasant toeveryone.
Always check your spelling and grammar before
posting.
Know what you are talking about and make sense
saying it.
10 Rules of Netiquette
Rule 6: Share expert knowledge
Ask questions online
Share what you knowonline.
Post the answers to your questions online because
someone may have the same question you do.
10 Rules of Netiquette
Rule 7: Helps keep flame wars under control
Netiquette does not forgive flaming.
Netiquette does however forbid people who are
flaming to hurt discussion groups by putting the
group down.
10 Rules of Netiquette
Rule 8: Respect other people’s privacy
Do not read other people’s mail without their
permission.
Going through other people’s things could cost
you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad
netiquette
10 Rules of Netiquette
Rule 9: Don’t abuse your power
Do not take advantage of other people just
because you have more knowledge or power than
them.
Treat others asyou would want them to treat you
if the roles were reversed.
10 Rules of Netiquette
Rule 10: Be forgiving of other people’s
mistake
Do not point out mistakes to people online.
Remember that you were once the new kid on the
block.
You still need to have agood manners even
though you are online and cannot see the person
face to face.
ACTIVITY 2.
Makeanad/posteronlineabout
“ThinkBeforeY
o
uClick”campaign.
PostittoyourF
B
timeline.Usethe
hashtags
#spartansEmpowermentT
echnology2

More Related Content

Similar to online safety, security and rules of netiquette

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 

Similar to online safety, security and rules of netiquette (20)

Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
L1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptxL1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Users guide
Users guideUsers guide
Users guide
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Internet threats
Internet threatsInternet threats
Internet threats
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

online safety, security and rules of netiquette

  • 2. ACTIVITY In a piece of paper write down your observation on the following images.
  • 4. ONLINE SAFETY HOW MANY CHECKS YOU HAVE FOR SHARED? HOW MANY CHECKS YOU HAVE FOR NOT SHARED? HOW SAFE ARE YOU WHEN USING THE INTERNET?
  • 5. ONLINE SAFETY First Name Thereisstillariskinsharingyourfirstname.chances are,hackeralreadyknowsplentyofstuffaboutyouevenif youonlygiveout yourfirstname. Last Name Ifsharingyourfirstnamehasasmallrisk,sharingboth yourfirst andlastnameismorerisky .
  • 6. ONLINE SAFETY Middle Name Sharingyourmiddlenameisprobablynotthemostriskyofthese sharedinformation,butsharingyourentirefullnamewouldbe. Current and Previous School Mostpeoplewhostealidentitiesstudytheirsubject.Theycanuse thisinformationforverificationpurposes.
  • 10. ONLINE SAFETY -it refers to the safety of people andtheir information when usinginternet.
  • 11. -refers to the practices andprecautions that should be observed when usingthe internet to ensure that the usersaswellas their computers and personal information are safe from crimes associatedusingthe internet. ONLINE SAFETY
  • 12. ONLINE SAFETY MEASURES 1. Never give any personal informationout about yourself over theinternet. 2. Never give any banking or sensitive information unlessyouare sure that it isa reputable businesshaving asecureservice. 3. Never open anymessagesor attachment from someone youdon’tknow.
  • 13. ONLINE SAFETY MEASURES 4. Regularly checkyour privacy settings in your account to make sureyouare notsharing important personalinformation. 5. When usingapublic computer terminal make sure to delete your browsing databefore leaving.
  • 14. ONLINE SAFETY MEASURES 6. Keepyour software updated toavoid security holes. 7. Donot download or install software or anything on your computer or cell phonethat isunknown to you.
  • 17. Types of System Intruders Masquerader - Unauthorized userwho penetrates asystemexploitinga legitimate user’saccount(outside). Hackers - Legitimate userwho makesunauthorized accessesor misuses hisprivileges (inside). Clandestine user - Seizessupervisorycontrol to evade auditing andaccess controls or suppressaudit collection(inside|outside)
  • 18.
  • 19. Parts of Virus Infection mechanism - The meansby which avirusspreads, enabling it to replicate. The mechanismisalsoreferred to asthe infection vector. - Thisishow the virus spreadsor propagates.A virus typically hasasearchroutine, which locates new files or new disksforinfection
  • 20. Parts of Virus Trigger -Alsoknown asalogic bomb, this isthe compiled version that could be activated any time within anexecutable file when the virus isrunthat determines the event or condition for the malicious "payload" to be activated or delivered suchasa particular date, aparticular time, particularpresence of another program, capacityof the diskexceeding somelimit, or adouble-click that opensaparticular file.
  • 21. Parts of Virus Payload -The "payload" isthe actual body or data whichcarries out the malicious purpose of the virus. Payloadactivity might be noticeable (e.g., becauseit causesthesystem to slow down or "freeze"), asmost of the time the "payload" itself isthe harmful activity, or sometimes non-destructive but distributive, which iscalled virus hoax.
  • 22. Virus Stages Dormant Phase -The Virusisidle. Propagation Phase -Virus placesan identical copyof itself intoother programs or into certain systemareas on the disk.
  • 23. Virus Stages Triggering Phase -Virus isactivated to perform the functionfor which it wasintended. Execution Phase -It canbe destructive suchasdeleting files on disk, crashingthe system, or corrupting files or relatively harmlesssuchaspopping up humorous or political messagesonscreen.
  • 24. Key Terms 1. Cyber Crime - acrime committed or assistedthrough the use of theInternet. a. Cyber Bullying - canwork in the sameway asbullyingin the playground; the victim feelsfrightened and alone, while the bully tries to hide from being caught.
  • 25. Key Terms 1. Cyber Crime b. Cyber Stalking -Harassment on the internet can be just as frightening asother forms of stalking.
  • 26. Key Terms 1. Cyber Crime c. Identity Theft -The more informationyou make available online, the greater the risk of identity theft. It can be very tempting to reply to an email or open an attachment or post information about yourself on social networking sites, but you should never do it.
  • 27. Key Terms 1. Cyber Crime d. Sexting - usually refers to sending and receiving rude messages or videosof:  naked pictures  'underwear shots'  anysexual texts, imagesor videos
  • 28. Key Terms 1. Cyber Crime d. Sexting -These images or videos can be sent from a boyfriend or girlfriend or afriend or someone you've met online. You also may have sent a sexual photo, video or text to someone else.
  • 29. Key Terms 1. Cyber Crime d. Sexting Remember:  There isno turning backonceyoupresssend.  Evenif youuseappslike Snapchattheperson cantake ascreenshot  Yourisk being seenassomeone youare not.
  • 30. Key Terms 2. Privacy Policy /Terms of Service - tells the user how the website will handle its data. 3. Malware -stands for malicious software variants,including viruses, ransom ware andspyware.
  • 31. Key Terms 3. Malware a. Virus - amalicious program designed to transfer from one computer to another in any means possible. b. Worms - amalicious program designed to replicate itself and transfer from one file folder to another and also transfer toother computers.
  • 32. Key Terms 3. Malware c. Trojan - a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PCunprotected and allows hackerto get yourinformation.
  • 33. Key Terms 3. Malware d. Spyware - aprogram that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging. e. Adware - aprogram designed to send you advertisement, mostly pop-ups.
  • 34. Key Terms 4. Spam - unwanted email mostly from botsor advertisers. 5. Phishing -acquires sensitive personal information like passwords and credits card details.
  • 35. Key Terms 6. Pharming - amore complicated way of phishing whereit exploits the DNSsystem. 7. Copyright - apart oflaw, wherein you have the rights to work, anyone who usesit w/o your consentis punishable by law.
  • 36. Key Terms 8. Fair use - meansthat anintellectual property maybe usedw/o consent aslong asit isusedin commentaries, criticism, parodies, researchand etc. 9. Key Loggers - usedto record the keystrokes done byuser. Thisisdone to steal passwordsor anyother sensitive information.
  • 37. Key Terms 10. Rogue Security Software - isaform of malicious software and internet fraud that misleadsusersinto believing there isa virus on their computer, andmanipulatesthem into paying money for afake malwareremoval tool.
  • 39. 10 Rules of Netiquette Rule 1: Remember the Human  You need to remember that you are talking to a real person when you are online.  The internet brings people together who would otherwise nevermeet.  Remember this saying when sending an email: Would I say this to the person’s face.
  • 40. 10 Rules of Netiquette Rule 2: Adhere to the same standard online that you follow in real life You need to behave the same way online that you do in reallife. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to areal person with feelings even though you can’tsee them.
  • 41. 10 Rules of Netiquette Rule 3: Knowwhere you are in cyber space  Always take a look around when you enter anew domain when surfing the web. Get asense of what the discussion group is about before you joinit.
  • 42. 10 Rules of Netiquette Rule 4: Respect other people’s time and bandwidth Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to minimum by saying what you want to say. Remember everyone won’tanswer your questions.
  • 43. 10 Rules of Netiquette Rule 5: Make yourself look good online Bepolite and pleasant toeveryone. Always check your spelling and grammar before posting. Know what you are talking about and make sense saying it.
  • 44. 10 Rules of Netiquette Rule 6: Share expert knowledge Ask questions online Share what you knowonline. Post the answers to your questions online because someone may have the same question you do.
  • 45. 10 Rules of Netiquette Rule 7: Helps keep flame wars under control Netiquette does not forgive flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • 46. 10 Rules of Netiquette Rule 8: Respect other people’s privacy Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or you could even go to jail. Not respecting other people’s privacy is a bad netiquette
  • 47. 10 Rules of Netiquette Rule 9: Don’t abuse your power Do not take advantage of other people just because you have more knowledge or power than them. Treat others asyou would want them to treat you if the roles were reversed.
  • 48. 10 Rules of Netiquette Rule 10: Be forgiving of other people’s mistake Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have agood manners even though you are online and cannot see the person face to face.
  • 49.