SlideShare a Scribd company logo
1 of 34
SPSHS1 SHARES
What I need to know?
At the end of the lesson, you are expected to:
1. consider everyone’s safety when sharing information
using the Internet;
2. consider everyone’s reputation when using the
Internet;
3. determine and avoid the dangers of the Internet; and
4. be responsible in using online social networking
sites
SPSHS1 SHARES
REVIEW
Onlin Systems, Functions and Platforms
SPSHS1 SHARES
What is new?
SPSHS1 SHARES
What is new?
Guide Questions
What is the video all about?
Can you give your reflection based from the
video?
SPSHS1 SHARES
What is new?
Think and Check
Directions: Put a
check under shared
or not shared to show
information you have
shared.
SPSHS1 SHARES
THINK
• If that is the case, have you experienced searching your
first and last name using search engine like Google?
• Did you get links to your profile page?
• How about switching to image search. Did your pictures
appear?
• How do you feel?
• Is there any danger of being found by search engines?
• How will you protect yourself from or while using the
internet?
SPSHS1 SHARES
Tips on how to be safe online
Do not share your password with anyone.
Add friends you know in real life.
Do not visit untrusted websites.
Add password to your WIFI at home to make it private.
Install and update antivirus in your computer.
Do not give your personal information to anyone
Think before you click.
Never post about your future vacation.
SPSHS1 SHARES
Internet Risk
Cyberbullying
It happens when
someone intentionally
abused, harass, and
mistreated by other
person using electronic
communication.
SPSHS1 SHARES
Identity Theft
It is a crime of stealing
personal information for
the purpose of assuming
that person’s name or
identity to make any
form of transactions.
SPSHS1 SHARES
Cyber Stalking
A criminal practice
where electronic
communication is
used to stalk or
harass individual
or group.
SPSHS1 SHARES
Sexting
The act of sending
sexually explicit text
messages, images, and
videos.
SPSHS1 SHARES
Internet Threats
Malware – also
known as
Malicious
Software.
SPSHS1 SHARES
Types of Malware
1. Virus – a malicious program that replicate
itself by copying itself to another program.
SPSHS1 SHARES
2. Trojan Horse – a malicious program that
disguised as legitimate program that user will
accept and use but take control of your
computer.
SPSHS1 SHARES
3. Worm – malicious program that copy’s itself
and spreads to other computers.
SPSHS1 SHARES
4. Spyware – A malicious program that gathers
information from victim’s computer and send it back
to the hacker.
SPSHS1 SHARES
5. Adware – An unwanted advertisement that
will pop-up several times on victim’s computer
then behave abnormally and tedious to close
them.
SPSHS1 SHARES
6. Keylogger – A program that runs in the background
and steals user credentials and confidential information
and send back to hack by recording every keystroke that a
user makes on their computer or device.
SPSHS1 SHARES
7. Botnet – A collection of infected internet–connected
devices such as PC and mobile phone that are controlled by
a common type of malware.
SPSHS1 SHARES
8. Rootkit – A software tools used by hackers
to gain control over a computer on a network
without being exposed.
SPSHS1 SHARES
9. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the
ransom through online method for the removal of the virus.
SPSHS1 SHARES
Spam
Also known as junk email or unwanted email send
by advertiser or bot. It can be used to send
malware.
SPSHS1 SHARES
Phishing
A cyberattack method using deceptive emails and
websites to acquiring sensitive personal
information.
SPSHS1 SHARES
Cybercrime
A crime in which computer is
used as object and tool in
committing a crime such hacking,
phishing, spamming, child
pornography, libel, hate crimes,
identity thief and
others.
SPSHS1 SHARES
Cybercrime Law
A law that deals with all forms of
cybercrime.
SPSHS1 SHARES
SPSHS1 SHARES
Netiquette
It is a word that came from the two words “net” and
“etiquette”. It is an etiquette applied online that shows
proper manner and behavior. If you are a member of an
online society through social media you are called
netizen. And in interacting with other netizen online, we
need to maintain good behavior which is acceptable to
others in online community
SPSHS1 SHARES
THE CORE RULES OF NETIQUTTE
BY SETH T. ROSS
1. Remember the Human.
2. Adhere the same standards of behavior online that
you follow in a real life.
3. Know where you are in cyberspace
4. Respect other peoples’ time and bandwith
5. Make yourself look good online.
SPSHS1 SHARES
THE CORE RULES OF NETIQUTTE
BY SETH T. ROSS
6. Share expert knowledge
7. Help keep flame wars under control
8. Respect other people’s privacy
9. Don’t abuse your power
10. Be forgiving in other people’s mistake.
SPSHS1 SHARES
What's More? Let us Try
1. Get your mobile phones, open
your data and check how long
will hackers can hack your
account with your passwords.
https://www.security.org/how-
secure-is-my-password/
SPSHS1 SHARES
What's More? Let us Try
How long would hackers hack your account?
SPSHS1 SHARES
What can I do?
Shout Your Mind
Directions: Make a
poster with a theme
“think before you
click” Use a short
bond paper for this
activity.
SPSHS1 SHARES
What have I learned?
Answer the following questions on a half crosswise yellow
paper.
1. How do you keep yourself safe and secure online?
2. Why is it important to observe netiquette online?
Rubrics
Content - 3
Organization - 1
Grammar - 1

More Related Content

Similar to SPSHS1 SHARES Internet Safety Lesson

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyErdo Deshiant Garnaby
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 

Similar to SPSHS1 SHARES Internet Safety Lesson (20)

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

SPSHS1 SHARES Internet Safety Lesson

  • 1.
  • 2. SPSHS1 SHARES What I need to know? At the end of the lesson, you are expected to: 1. consider everyone’s safety when sharing information using the Internet; 2. consider everyone’s reputation when using the Internet; 3. determine and avoid the dangers of the Internet; and 4. be responsible in using online social networking sites
  • 3. SPSHS1 SHARES REVIEW Onlin Systems, Functions and Platforms
  • 5. SPSHS1 SHARES What is new? Guide Questions What is the video all about? Can you give your reflection based from the video?
  • 6. SPSHS1 SHARES What is new? Think and Check Directions: Put a check under shared or not shared to show information you have shared.
  • 7. SPSHS1 SHARES THINK • If that is the case, have you experienced searching your first and last name using search engine like Google? • Did you get links to your profile page? • How about switching to image search. Did your pictures appear? • How do you feel? • Is there any danger of being found by search engines? • How will you protect yourself from or while using the internet?
  • 8. SPSHS1 SHARES Tips on how to be safe online Do not share your password with anyone. Add friends you know in real life. Do not visit untrusted websites. Add password to your WIFI at home to make it private. Install and update antivirus in your computer. Do not give your personal information to anyone Think before you click. Never post about your future vacation.
  • 9. SPSHS1 SHARES Internet Risk Cyberbullying It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.
  • 10. SPSHS1 SHARES Identity Theft It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
  • 11. SPSHS1 SHARES Cyber Stalking A criminal practice where electronic communication is used to stalk or harass individual or group.
  • 12. SPSHS1 SHARES Sexting The act of sending sexually explicit text messages, images, and videos.
  • 13. SPSHS1 SHARES Internet Threats Malware – also known as Malicious Software.
  • 14. SPSHS1 SHARES Types of Malware 1. Virus – a malicious program that replicate itself by copying itself to another program.
  • 15. SPSHS1 SHARES 2. Trojan Horse – a malicious program that disguised as legitimate program that user will accept and use but take control of your computer.
  • 16. SPSHS1 SHARES 3. Worm – malicious program that copy’s itself and spreads to other computers.
  • 17. SPSHS1 SHARES 4. Spyware – A malicious program that gathers information from victim’s computer and send it back to the hacker.
  • 18. SPSHS1 SHARES 5. Adware – An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.
  • 19. SPSHS1 SHARES 6. Keylogger – A program that runs in the background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.
  • 20. SPSHS1 SHARES 7. Botnet – A collection of infected internet–connected devices such as PC and mobile phone that are controlled by a common type of malware.
  • 21. SPSHS1 SHARES 8. Rootkit – A software tools used by hackers to gain control over a computer on a network without being exposed.
  • 22. SPSHS1 SHARES 9. Ransomware – A ransom virus that block the user from accessing the programs or files and demands to pay the ransom through online method for the removal of the virus.
  • 23. SPSHS1 SHARES Spam Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
  • 24. SPSHS1 SHARES Phishing A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.
  • 25. SPSHS1 SHARES Cybercrime A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.
  • 26. SPSHS1 SHARES Cybercrime Law A law that deals with all forms of cybercrime.
  • 28. SPSHS1 SHARES Netiquette It is a word that came from the two words “net” and “etiquette”. It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society through social media you are called netizen. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community
  • 29. SPSHS1 SHARES THE CORE RULES OF NETIQUTTE BY SETH T. ROSS 1. Remember the Human. 2. Adhere the same standards of behavior online that you follow in a real life. 3. Know where you are in cyberspace 4. Respect other peoples’ time and bandwith 5. Make yourself look good online.
  • 30. SPSHS1 SHARES THE CORE RULES OF NETIQUTTE BY SETH T. ROSS 6. Share expert knowledge 7. Help keep flame wars under control 8. Respect other people’s privacy 9. Don’t abuse your power 10. Be forgiving in other people’s mistake.
  • 31. SPSHS1 SHARES What's More? Let us Try 1. Get your mobile phones, open your data and check how long will hackers can hack your account with your passwords. https://www.security.org/how- secure-is-my-password/
  • 32. SPSHS1 SHARES What's More? Let us Try How long would hackers hack your account?
  • 33. SPSHS1 SHARES What can I do? Shout Your Mind Directions: Make a poster with a theme “think before you click” Use a short bond paper for this activity.
  • 34. SPSHS1 SHARES What have I learned? Answer the following questions on a half crosswise yellow paper. 1. How do you keep yourself safe and secure online? 2. Why is it important to observe netiquette online? Rubrics Content - 3 Organization - 1 Grammar - 1