This document discusses safety when using the internet and social media. The key points are:
1. Students should consider everyone's safety and reputation when sharing information online.
2. The lesson aims to make students aware of dangers on the internet and how to avoid them.
3. Students need to take responsibility for their actions online, especially on social media, by protecting their privacy and personal information.
2. SPSHS1 SHARES
What I need to know?
At the end of the lesson, you are expected to:
1. consider everyone’s safety when sharing information
using the Internet;
2. consider everyone’s reputation when using the
Internet;
3. determine and avoid the dangers of the Internet; and
4. be responsible in using online social networking
sites
5. SPSHS1 SHARES
What is new?
Guide Questions
What is the video all about?
Can you give your reflection based from the
video?
6. SPSHS1 SHARES
What is new?
Think and Check
Directions: Put a
check under shared
or not shared to show
information you have
shared.
7. SPSHS1 SHARES
THINK
• If that is the case, have you experienced searching your
first and last name using search engine like Google?
• Did you get links to your profile page?
• How about switching to image search. Did your pictures
appear?
• How do you feel?
• Is there any danger of being found by search engines?
• How will you protect yourself from or while using the
internet?
8. SPSHS1 SHARES
Tips on how to be safe online
Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
10. SPSHS1 SHARES
Identity Theft
It is a crime of stealing
personal information for
the purpose of assuming
that person’s name or
identity to make any
form of transactions.
11. SPSHS1 SHARES
Cyber Stalking
A criminal practice
where electronic
communication is
used to stalk or
harass individual
or group.
14. SPSHS1 SHARES
Types of Malware
1. Virus – a malicious program that replicate
itself by copying itself to another program.
15. SPSHS1 SHARES
2. Trojan Horse – a malicious program that
disguised as legitimate program that user will
accept and use but take control of your
computer.
16. SPSHS1 SHARES
3. Worm – malicious program that copy’s itself
and spreads to other computers.
17. SPSHS1 SHARES
4. Spyware – A malicious program that gathers
information from victim’s computer and send it back
to the hacker.
18. SPSHS1 SHARES
5. Adware – An unwanted advertisement that
will pop-up several times on victim’s computer
then behave abnormally and tedious to close
them.
19. SPSHS1 SHARES
6. Keylogger – A program that runs in the background
and steals user credentials and confidential information
and send back to hack by recording every keystroke that a
user makes on their computer or device.
20. SPSHS1 SHARES
7. Botnet – A collection of infected internet–connected
devices such as PC and mobile phone that are controlled by
a common type of malware.
21. SPSHS1 SHARES
8. Rootkit – A software tools used by hackers
to gain control over a computer on a network
without being exposed.
22. SPSHS1 SHARES
9. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the
ransom through online method for the removal of the virus.
23. SPSHS1 SHARES
Spam
Also known as junk email or unwanted email send
by advertiser or bot. It can be used to send
malware.
25. SPSHS1 SHARES
Cybercrime
A crime in which computer is
used as object and tool in
committing a crime such hacking,
phishing, spamming, child
pornography, libel, hate crimes,
identity thief and
others.
28. SPSHS1 SHARES
Netiquette
It is a word that came from the two words “net” and
“etiquette”. It is an etiquette applied online that shows
proper manner and behavior. If you are a member of an
online society through social media you are called
netizen. And in interacting with other netizen online, we
need to maintain good behavior which is acceptable to
others in online community
29. SPSHS1 SHARES
THE CORE RULES OF NETIQUTTE
BY SETH T. ROSS
1. Remember the Human.
2. Adhere the same standards of behavior online that
you follow in a real life.
3. Know where you are in cyberspace
4. Respect other peoples’ time and bandwith
5. Make yourself look good online.
30. SPSHS1 SHARES
THE CORE RULES OF NETIQUTTE
BY SETH T. ROSS
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving in other people’s mistake.
31. SPSHS1 SHARES
What's More? Let us Try
1. Get your mobile phones, open
your data and check how long
will hackers can hack your
account with your passwords.
https://www.security.org/how-
secure-is-my-password/
33. SPSHS1 SHARES
What can I do?
Shout Your Mind
Directions: Make a
poster with a theme
“think before you
click” Use a short
bond paper for this
activity.
34. SPSHS1 SHARES
What have I learned?
Answer the following questions on a half crosswise yellow
paper.
1. How do you keep yourself safe and secure online?
2. Why is it important to observe netiquette online?
Rubrics
Content - 3
Organization - 1
Grammar - 1