SlideShare a Scribd company logo
1 of 69
Download to read offline
*Information & Images taken from various sites on the internet and is under OER Commons.
1
*Information & Images taken from various sites on the internet and is under OER Commons.
REVIEW:
❑ We have defined ICT or Information Communication and
Technology.
❑ Explained the effects of ICT in the Philippines from different
sectors
❑ Tackled about the state of ICT existing worldwide, its progress
from Web 1.0 to Web 3.0.
❑ Discussed Trends in ICT, current and existing trends all over the
world and its components and why are they important.
2
*Information & Images taken from various sites on the internet and is under OER Commons.
I CAN
❑ I can apply online safety, security, ethics, and
etiquette standards.
❑ I can practice these standard in my daily life.
3
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {P,R,I,C,Y,A,G,F,V}
4
ANSWER: (7 LETTERS): _ _ _ _ _ _ _
PRIVACY
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {A,C,G,H,D,E,Y,K,R}
5
ANSWER: (6 LETTERS): _ _ _ _ _ _
HACKER
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {W,V,I,S,R,U,T}
6
ANSWER: (5 LETTERS): _ _ _ _ _
VIRUS
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {E,R,I,N,C,S,I,T,U,Y}
7
ANSWER: (8 LETTERS): _ _ _ _ _ _ _ _
SECURITY
Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
ONLINE SAFETY,
SECURITY, ETHICS,
AND ETIQUETTE
Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
“Are you Safe
and Secured
online?
9
“How Safe and
Secured are you
online?
10
11
*Information & Images taken from various sites on the internet and is under OER Commons.
11
https://www.youtube.com/watch?v=HxySrSbSY7o&t
*Information & Images taken from various sites on the internet and is under OER Commons.
THE INTERNET
Internet is defined as the
information
superhighway. This
means that anyone has
access to this highway,
can place info, and can
grab that info.
12
INFORMATION AT RISK
These are types of information that are
at risk.
13
1
*Information & Images taken from various sites on the internet and is under OER Commons.
TYPES OF INFORMATION WITH RISK:
Mother’s and
Father’s name
14
Sibling’s
Name
Address
Home & Cell
Phone Number
Birthday
Email
Address
First, Middle
& Last Name
Current &
Previous School
15
*Information & Images taken from various sites on the internet and is under OER Commons.
15
ONLINE SAFETY TIPS
Some Tips to Stay Safe Online
16
2
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Be mindful on what you share online.
17
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not just
accept terms
and
conditions,
read it.
18
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not share your password with anyone.
19
20
*Information & Images taken from various sites on the internet and is under OER Commons.
20
21
*Information & Images taken from various sites on the internet and is under OER Commons.
21
22
*Information & Images taken from various sites on the internet and is under OER Commons.
22
23
*Information & Images taken from various sites on the internet and is under OER Commons.
23
24
*Information & Images taken from various sites on the internet and is under OER Commons.
24
25
*Information & Images taken from various sites on the internet and is under OER Commons.
25
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not talk to strangers whether online or face-to- face.
26
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Never post anything about a future vacation.
27
28
*Information & Images taken from various sites on the internet and is under OER Commons.
28
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Add friends you know in real life.
29
30
*Information & Images taken from various sites on the internet and is under OER Commons.
30
31
*Information & Images taken from various sites on the internet and is under OER Commons.
31
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Avoid visiting untrusted websites.
32
33
*Information & Images taken from various sites on the internet and is under OER Commons.
33
34
*Information & Images taken from various sites on the internet and is under OER Commons.
34
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
If you have WiFi at home, make it private by adding a password.
35
36
*Information & Images taken from various sites on the internet and is under OER Commons.
36
1. PLDTHOMEDSL,
PLDTmyDSLPAL or PLDmyDSLBiz
Sa SSID na ito, kailangan mo yung
mac address niya.
for Example yung mac nya is:
00:1F:FB:0F:C5:A8
kunin yung last 5 digit which is: FC5A8
password: PLDTWIFI+FC5A8=
PLDTWIFIFC5A8
37
*Information & Images taken from various sites on the internet and is under OER Commons.
37
2. PLDTHOMEDSLxxxxx
Sa SSID na ito yung five x nasa dulo dapat number
lang pra mkuha yung default pass. Kung may
kasamang letter yan di ko na po alam unless kung
may mgshare dito nyan. for Example:
PLDTHOMEDSL21354 (Yung 5 numbers na nasa
huli dpat imultiply sa 3.
21354*3= 64062)
password:PLDTWIFI64062
38
*Information & Images taken from various sites on the internet and is under OER Commons.
38
3. PLDTHOMEFIBR_xxxxxx
Sa SSID na to nangangailangan tayo ng conversion
ng code sa SSID nya. Yung huling 6 digits dpat
iconvert nyo sa code na katapat nya sa baba.
HEX CODE
TABLE
0=f
1=e
2=d
3=c
4=b
5=a
6=9
7=8
8=7
9=6
a=5
b=4
c=3
d=2
e=1
f=0
for Example: PLDTHOMEFIBR_123abc
password: wlanedc543 (small letter lahat)
wlan+(converted hex)
39
*Information & Images taken from various sites on the internet and is under OER Commons.
39
4. PLDTHOMEFIBRxxxxx
Sa SSID na ito ay iba sa taas. yung underscore
lang ng ngiba. Iba din and prefix nito.
Yung huling 5 digits dpat ding iconvert same sa
number 3. For example: PLDTHOMEFIBR123abc
password: PLDTWIFIedc543
PLDTWIFI+(converted hex)
(take note sa capital at small letter)
HEX CODE
TABLE
0=f
1=e
2=d
3=c
4=b
5=a
6=9
7=8
8=7
9=6
a=5
b=4
c=3
d=2
e=1
f=0
40
*Information & Images taken from various sites on the internet and is under OER Commons.
40
5. HomeBro_Ultera
Sa SSID na to, need natin yung last 6
mac address niya. for example:
00:1F:FB:0F:C5:A8
password: HomeBro_0FC5A8
HomeBro_(MacAddress)
Mga apps na kaya makita Mac Address:
Andro Dumper,Wps Connect,United
Pldt *****er
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Install and update
an antivirus
software on your
computer.
41
*Information & Images taken from various sites on the internet and is under OER Commons.
ANTIVIRUS EXAMPLE:
42
ESET NOD32
F-SECURE
KASPERSKY
NORTON
AVAST
SMADAV
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Avoid downloading anything from untrusted websites.
43
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Buy the software, do not use pirated ones.
44
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not reply or click links from suspicious emails.
45
INTERNET THREATS
Some internet threats to avoid or
overlook.
46
3
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
1.Malware – stands for malicious software.
47
a. Virus – a malicious program
designed to replicate itself and transfer
from one computer to another (internet,
local networks, FDs, CDs, etc.)
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
48
b. Worm – a malicious
program that transfers
from one computer to
another by any types of
means. Ex. ILOVEYOU
Worm
*Information & Images taken from various sites on the internet and is under OER Commons.
ILOVEYOU WORM
ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer
worm that attacked tens of millions of Windowspersonal computers on and
after 5 May 2000[1] local time in the Philippines when it started spreading as
an email message with the subject line "ILOVEYOU" and the attachment
"LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension ('vbs', a type
of interpreted file) was most often hidden by default on Windows computers
of the time (as it is an extension for a file type that is known by Windows),
leading unwitting users to think it was a normal text file. Opening the
attachment activated the Visual Basic script.
49
*Information & Images taken from various sites on the internet and is under OER Commons.
ILOVEYOU WORM
The malware originated in the Pandacan neighborhood
of Manila in the Philippines on May 5, 2000, thereafter
following daybreak westward across the world as
employees began their workday that Friday morning,
moving first to Hong Kong, then to Europe, and finally
the United States.
50
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
51
c. Trojan – a malicious program
that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
52
d. Spyware – a program that runs
in the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
53
d. Spyware – a program that runs
in the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
54
e. Adware – a program designed to send you advertisements,
mostly as pop-ups.
55
*Information & Images taken from various sites on the internet and is under OER Commons.
55
56
*Information & Images taken from various sites on the internet and is under OER Commons.
56
57
*Information & Images taken from various sites on the internet and is under OER Commons.
57
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
58
f. Ransomware – or ransom
software is a type of
malicious software from
cryptovirology that threatens
to publish the victim's data or
perpetually block access to it
unless a ransom is paid.
59
*Information & Images taken from various sites on the internet and is under OER Commons.
59
60
*Information & Images taken from various sites on the internet and is under OER Commons.
60
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
2. Spam – an unwanted
email mostly from bots or
advertisers. It can be used to
send malware.
61
62
*Information & Images taken from various sites on the internet and is under OER Commons.
62
63
*Information & Images taken from various sites on the internet and is under OER Commons.
63
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
3. Phishing – an unwanted acquisition of
sensitive personal information like
passwords and credit card details.
64
65
*Information & Images taken from various sites on the internet and is under OER Commons.
65
https://www.youtube.com/watch?v=9TRR6lHviQc
66
*Information & Images taken from various sites on the internet and is under OER Commons.
66
“THINK BEFORE
YOU CLICK.
67
*Information & Images taken from various sites on the internet and is under OER Commons.
VALUES INTEGRATION
❑ Everyone’s own information is important, we must keep
this on to ourselves and if ever shared by others, we must
learn to keep it.
❑ Respect begets respect is also applied in technology
settings, not just real life setting.
68
*Information & Images taken from various sites on the internet and is under OER Commons.
ACTIVITY
❑ Share an experience that you have always tend to do but
later did you discover that it is not a standard of ONLINE
SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
69

More Related Content

What's hot

Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxjoelphillipGranada2
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT DevelopmentTeodoro Llanes II
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online EnvironmentTeodoro Llanes II
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication TechnologyTeodoro Llanes II
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICTJazzyNF
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologieswacasr12
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLSJazzyNF
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesJuvy Novicio
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLSJazzyNF
 
Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316Live Angga
 

What's hot (20)

Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
8 Collaborative ICT Development
8 Collaborative ICT Development8 Collaborative ICT Development
8 Collaborative ICT Development
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication Technology
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Introduction to Information Communication and Technologies
Introduction to Information Communication and TechnologiesIntroduction to Information Communication and Technologies
Introduction to Information Communication and Technologies
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
[EMPOWERMENT TECHNOLOGIES]-ADVANCED PRESENTATION SKILLS
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316Em tech tg-acad-v5-112316
Em tech tg-acad-v5-112316
 

Similar to 2 Online Safety, Security, Ethics, and Etiquette

1 Information and Communication Technology.pptx
1  Information and Communication Technology.pptx1  Information and Communication Technology.pptx
1 Information and Communication Technology.pptxmariemichellelaspina
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Ulfah
UlfahUlfah
Ulfahulfah
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlinexlilmermaidx
 
The internet 2
The internet 2The internet 2
The internet 2SMS
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01Ajith Pathirana
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till nowknowldge
 

Similar to 2 Online Safety, Security, Ethics, and Etiquette (20)

1 Information and Communication Technology.pptx
1  Information and Communication Technology.pptx1  Information and Communication Technology.pptx
1 Information and Communication Technology.pptx
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 
Ulfah
UlfahUlfah
Ulfah
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
The internet 2
The internet 2The internet 2
The internet 2
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
hacking
hackinghacking
hacking
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
 

Recently uploaded

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 

2 Online Safety, Security, Ethics, and Etiquette

  • 1. *Information & Images taken from various sites on the internet and is under OER Commons. 1
  • 2. *Information & Images taken from various sites on the internet and is under OER Commons. REVIEW: ❑ We have defined ICT or Information Communication and Technology. ❑ Explained the effects of ICT in the Philippines from different sectors ❑ Tackled about the state of ICT existing worldwide, its progress from Web 1.0 to Web 3.0. ❑ Discussed Trends in ICT, current and existing trends all over the world and its components and why are they important. 2
  • 3. *Information & Images taken from various sites on the internet and is under OER Commons. I CAN ❑ I can apply online safety, security, ethics, and etiquette standards. ❑ I can practice these standard in my daily life. 3
  • 4. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {P,R,I,C,Y,A,G,F,V} 4 ANSWER: (7 LETTERS): _ _ _ _ _ _ _ PRIVACY
  • 5. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {A,C,G,H,D,E,Y,K,R} 5 ANSWER: (6 LETTERS): _ _ _ _ _ _ HACKER
  • 6. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {W,V,I,S,R,U,T} 6 ANSWER: (5 LETTERS): _ _ _ _ _ VIRUS
  • 7. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {E,R,I,N,C,S,I,T,U,Y} 7 ANSWER: (8 LETTERS): _ _ _ _ _ _ _ _ SECURITY
  • 8. Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
  • 9. “Are you Safe and Secured online? 9
  • 10. “How Safe and Secured are you online? 10
  • 11. 11 *Information & Images taken from various sites on the internet and is under OER Commons. 11 https://www.youtube.com/watch?v=HxySrSbSY7o&t
  • 12. *Information & Images taken from various sites on the internet and is under OER Commons. THE INTERNET Internet is defined as the information superhighway. This means that anyone has access to this highway, can place info, and can grab that info. 12
  • 13. INFORMATION AT RISK These are types of information that are at risk. 13 1
  • 14. *Information & Images taken from various sites on the internet and is under OER Commons. TYPES OF INFORMATION WITH RISK: Mother’s and Father’s name 14 Sibling’s Name Address Home & Cell Phone Number Birthday Email Address First, Middle & Last Name Current & Previous School
  • 15. 15 *Information & Images taken from various sites on the internet and is under OER Commons. 15
  • 16. ONLINE SAFETY TIPS Some Tips to Stay Safe Online 16 2
  • 17. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Be mindful on what you share online. 17
  • 18. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not just accept terms and conditions, read it. 18
  • 19. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not share your password with anyone. 19
  • 20. 20 *Information & Images taken from various sites on the internet and is under OER Commons. 20
  • 21. 21 *Information & Images taken from various sites on the internet and is under OER Commons. 21
  • 22. 22 *Information & Images taken from various sites on the internet and is under OER Commons. 22
  • 23. 23 *Information & Images taken from various sites on the internet and is under OER Commons. 23
  • 24. 24 *Information & Images taken from various sites on the internet and is under OER Commons. 24
  • 25. 25 *Information & Images taken from various sites on the internet and is under OER Commons. 25
  • 26. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not talk to strangers whether online or face-to- face. 26
  • 27. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Never post anything about a future vacation. 27
  • 28. 28 *Information & Images taken from various sites on the internet and is under OER Commons. 28
  • 29. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Add friends you know in real life. 29
  • 30. 30 *Information & Images taken from various sites on the internet and is under OER Commons. 30
  • 31. 31 *Information & Images taken from various sites on the internet and is under OER Commons. 31
  • 32. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Avoid visiting untrusted websites. 32
  • 33. 33 *Information & Images taken from various sites on the internet and is under OER Commons. 33
  • 34. 34 *Information & Images taken from various sites on the internet and is under OER Commons. 34
  • 35. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: If you have WiFi at home, make it private by adding a password. 35
  • 36. 36 *Information & Images taken from various sites on the internet and is under OER Commons. 36 1. PLDTHOMEDSL, PLDTmyDSLPAL or PLDmyDSLBiz Sa SSID na ito, kailangan mo yung mac address niya. for Example yung mac nya is: 00:1F:FB:0F:C5:A8 kunin yung last 5 digit which is: FC5A8 password: PLDTWIFI+FC5A8= PLDTWIFIFC5A8
  • 37. 37 *Information & Images taken from various sites on the internet and is under OER Commons. 37 2. PLDTHOMEDSLxxxxx Sa SSID na ito yung five x nasa dulo dapat number lang pra mkuha yung default pass. Kung may kasamang letter yan di ko na po alam unless kung may mgshare dito nyan. for Example: PLDTHOMEDSL21354 (Yung 5 numbers na nasa huli dpat imultiply sa 3. 21354*3= 64062) password:PLDTWIFI64062
  • 38. 38 *Information & Images taken from various sites on the internet and is under OER Commons. 38 3. PLDTHOMEFIBR_xxxxxx Sa SSID na to nangangailangan tayo ng conversion ng code sa SSID nya. Yung huling 6 digits dpat iconvert nyo sa code na katapat nya sa baba. HEX CODE TABLE 0=f 1=e 2=d 3=c 4=b 5=a 6=9 7=8 8=7 9=6 a=5 b=4 c=3 d=2 e=1 f=0 for Example: PLDTHOMEFIBR_123abc password: wlanedc543 (small letter lahat) wlan+(converted hex)
  • 39. 39 *Information & Images taken from various sites on the internet and is under OER Commons. 39 4. PLDTHOMEFIBRxxxxx Sa SSID na ito ay iba sa taas. yung underscore lang ng ngiba. Iba din and prefix nito. Yung huling 5 digits dpat ding iconvert same sa number 3. For example: PLDTHOMEFIBR123abc password: PLDTWIFIedc543 PLDTWIFI+(converted hex) (take note sa capital at small letter) HEX CODE TABLE 0=f 1=e 2=d 3=c 4=b 5=a 6=9 7=8 8=7 9=6 a=5 b=4 c=3 d=2 e=1 f=0
  • 40. 40 *Information & Images taken from various sites on the internet and is under OER Commons. 40 5. HomeBro_Ultera Sa SSID na to, need natin yung last 6 mac address niya. for example: 00:1F:FB:0F:C5:A8 password: HomeBro_0FC5A8 HomeBro_(MacAddress) Mga apps na kaya makita Mac Address: Andro Dumper,Wps Connect,United Pldt *****er
  • 41. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Install and update an antivirus software on your computer. 41
  • 42. *Information & Images taken from various sites on the internet and is under OER Commons. ANTIVIRUS EXAMPLE: 42 ESET NOD32 F-SECURE KASPERSKY NORTON AVAST SMADAV
  • 43. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Avoid downloading anything from untrusted websites. 43
  • 44. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Buy the software, do not use pirated ones. 44
  • 45. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not reply or click links from suspicious emails. 45
  • 46. INTERNET THREATS Some internet threats to avoid or overlook. 46 3
  • 47. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 1.Malware – stands for malicious software. 47 a. Virus – a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
  • 48. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 48 b. Worm – a malicious program that transfers from one computer to another by any types of means. Ex. ILOVEYOU Worm
  • 49. *Information & Images taken from various sites on the internet and is under OER Commons. ILOVEYOU WORM ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windowspersonal computers on and after 5 May 2000[1] local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension ('vbs', a type of interpreted file) was most often hidden by default on Windows computers of the time (as it is an extension for a file type that is known by Windows), leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. 49
  • 50. *Information & Images taken from various sites on the internet and is under OER Commons. ILOVEYOU WORM The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000, thereafter following daybreak westward across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States. 50
  • 51. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 51 c. Trojan – a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 52. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 52 d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 53. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 53 d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 54. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 54 e. Adware – a program designed to send you advertisements, mostly as pop-ups.
  • 55. 55 *Information & Images taken from various sites on the internet and is under OER Commons. 55
  • 56. 56 *Information & Images taken from various sites on the internet and is under OER Commons. 56
  • 57. 57 *Information & Images taken from various sites on the internet and is under OER Commons. 57
  • 58. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 58 f. Ransomware – or ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • 59. 59 *Information & Images taken from various sites on the internet and is under OER Commons. 59
  • 60. 60 *Information & Images taken from various sites on the internet and is under OER Commons. 60
  • 61. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send malware. 61
  • 62. 62 *Information & Images taken from various sites on the internet and is under OER Commons. 62
  • 63. 63 *Information & Images taken from various sites on the internet and is under OER Commons. 63
  • 64. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 3. Phishing – an unwanted acquisition of sensitive personal information like passwords and credit card details. 64
  • 65. 65 *Information & Images taken from various sites on the internet and is under OER Commons. 65 https://www.youtube.com/watch?v=9TRR6lHviQc
  • 66. 66 *Information & Images taken from various sites on the internet and is under OER Commons. 66
  • 68. *Information & Images taken from various sites on the internet and is under OER Commons. VALUES INTEGRATION ❑ Everyone’s own information is important, we must keep this on to ourselves and if ever shared by others, we must learn to keep it. ❑ Respect begets respect is also applied in technology settings, not just real life setting. 68
  • 69. *Information & Images taken from various sites on the internet and is under OER Commons. ACTIVITY ❑ Share an experience that you have always tend to do but later did you discover that it is not a standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE. 69