SlideShare a Scribd company logo
1 of 42
TVL Building, Goa NHS March 2, 2021
By the end of this lesson, the
students are expected to: 1. Identify what constitutes
appropriate and
inappropriate online
behavior;
2. Apply Internet online
safety, security ethics and
etiquette standards and
practices in the use of
ICTs;
3. Discern possible
deceptive information
and wrongly evaluated
data.
Pick a Pic
DIRECTION:
• The teacher will show some images to
the students related with the
upcoming discussion.
• Each student will be given 1 minute to
write their observation on the
following images.
• After the activity the student will
share their observation about the
image.
Activity 1
Online Safety, Security,
Ethics and Netiquette
The internet is the guiding technology of
the Information Technology Age just as the
electrical engine was of the Industrial Age. In
these times, more and more people are already
engaged in the use of technology. These people
who are raised in a digital, media-saturated
world are called digital natives.
No doubt, the Internet has been very
useful to us but with the rise of instant
messaging, chat rooms, emails and social
networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers,
including exposure to sexual predators. Thus,
internet safety is always our primary concern.
There's almost no limit to what you
can do online. The Internet makes
it possible to access information
quickly, communicate around the
world, and much more.
Unfortunately, the Internet is also
home to certain risks, such as
malware, spam, and phishing. If
you want to stay safe online, you'll
need to understand these risks
and learn how to avoid them.
HOW SAFE
ARE YOU ?
DIRECTIONS:
Read and reflect each item
carefully. Put check in the space
you have shared or not shared
these pieces of information in all
your social media accounts.
Activity 2
1. How many of these information have you SHARED?
2. How many of these information have you NOT SHARED?
3. Based from your answers, do you think you are safe
when using the internet? Why?
Lesson 2.1:
Online Safety, Security,
Ethics and Netiquette
Online safety refers to
the practices and
precautions that should
be observed when using
the internet to ensure that
the users as well as their
computers and personal
information are safe from
crimes associated with
using the internet.
Online Safety
Numerous delinquencies/minor
crime that can be committed
on the internet:
•Stalking
•Identity theft
•Privacy violations
•Harassment
Online Safety Measures
• Never give any personal
information out about
yourself over the
internet.
• Do not give any banking
or sensitive information
unless you are sure that
it is a reputable business
having a secure service.
To make sure that you
are in a secured
network, the website
address should begin
with “https://’ as
opposed to “http://”.
Never access your
accounts by following an
email link, instead type
your URL by yourself.
Online Safety Measures
• Never open messages or attachments
from someone you do not know.
• Regularly review your privacy settings in
your online accounts to make sure you
are not sharing important personal
information.
• When using a public computer terminal,
be sure to delete your browsing data
before leaving.
• Keep your software updated to
avoid security holes.
• Do not download or install
software or anything on
your computer or cell phone
that is unknown to you.
Online Threats
Is deemed any malicious act that
attempts to gain access to a
computer network without
authorization or permission from
the owners. These are usually
done by computer hackers who
uses World Wide Web to facilitate
cybercrime.
Types of Online Threats • Phishing
• Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Phishing
Phishing happens when an
email is sent from an internet
criminal disguised as an
email from a legitimate,
trustworthy source. The
message is meant to lure
you into revealing sensitive
or confidential information.
Pharming
Pharming happens when a
hacker (or “pharmer”) directs an
internet user to a fake website
instead of a legitimate one.
These “spoofed” sites can
capture a victim’s confidential
information, including
usernames, passwords, and
credit card data, or install
malware on their computer.
Pharmers usually focus on
websites in the financial sector,
including banks, online payment
platforms, or other e-commerce
destinations.
Internet Scam
Internet Scam generally refers to
someone using internet services or
software to defraud or take advantage
of victims, typically for financial gain.
Cybercriminals may contact potential
victims through personal or work email
accounts, social networking sites,
dating apps, or other methods in
attempts to obtain financial or other
valuable personal information. Online
scams may come in various forms such
as lottery scam, charity fraud scams,
job offer scams, and online dating
scams to name a few.
Internet Robots
Internet robots are also known as spiders, crawlers, and web
bots. It is a software application that is programmed to do certain
tasks. Bots are automated, which means they run according to
their instructions without a human user. Some bots are useful,
such as search engine bots that index content for search or
customer service bots that help users. Other bots are "bad" and
are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious
activities.
Captcha Technology is used to
avoid this type of security
threat.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Adware
Adware (advertising supported software) is
unwanted software designed to throw
advertisements up on your screen. Example, pop-
up ads and banner ads.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spyware
Spyware is malware that secretly observes
the computer user’s activities without
permission and reports it to the software’s
author. Example is a keylogger.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Virus and Worms
Virus and Worms are malwares
that attach to another program
and, when executed—
unintentionally by the user—
replicates itself by modifying
other computer programs and
infecting them with its own bits of
code.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Trojan or Trojan Horse
Trojan, or Trojan horse, is one of
the most dangerous malware types.
It usually represents itself as
something useful in order to trick
you. Once it’s on your system, the
attackers behind the Trojan gain
unauthorized access to the affected
computer. From there, Trojans can
be used to steal financial information
or install threats like viruses and
ransomware.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Ransomware
Ransomware is a form of malware that locks you out of your
device and/or encrypts your files, then forces you to pay a
ransom to get them back.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spams
Spams are unsolicited emails, instant messages coming
from recipients that are not granted verifiable permission
for the message to be sent. Spam messages can be
damaging if you open or respond to it.
Cyberstalking
Cyberstalking refers to the
use of the internet or other
electronic device to harass
or stalk individuals or
organizations.
Cyberbullying
Cyberbullying
The Act of tormenting,
threatening, harassing or
embarrassing another person using
the internet or other technologies.
Spoofing
Spoofing happens when
someone or something
pretends to be something
else to gain our
confidence, get access to
our systems, steal data,
steal money, or spread
malware.
-Describe a criminal; who
impersonates another
individual or organization,
with the intent to gather
personal or business
information.
Types of Online Threats • Phishing
• Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Online Ethics and
Netiquette
• Comes from the word
Network and Etiquette
• Is a set of rules and
norms for acceptable
conduct or behavior
online.
Online Ethics and Netiquette
https://www.youtube.com/watch?v=FWMk_Zv7nB8 - by Angel Rivera
Can You Keep it Private?
1. Your family is going out on a
vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone
online.
C. Post updates of where you are
currently checking in hotels or places.
D. Tell no one. Vacations are for getting
away.
• Activity 3
2. Do you have the same passwords for all your
accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different
accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use
for all my accounts.
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
Can You Keep it Private?
3. Choose which image below
describes how you feel about
sharing your password with your
boyfriend/ girlfriend?
• Activity 3
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
Can You Keep it Private?
4. Your parents bought you your first
cellphone. How will you share your
cellphone number?
A. Do not share your cellphone number
to anyone.
B. Post your cellphone number in your
social media account.
C. Share your cellphone number only in
person.
D. Post your cellphone number in your
group chat.
• Activity 3
5. Your social media friends list should only be
composed of ______________.
A. Your favorite brands.
B. Family and friends
C. Anyone who sends you a friend request
D. Foreigners
DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.
What have you Learned?
Direction: Reflect on
this and write your
answer in a ¼ sheet of
Paper
Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
Online Safety, Security, and Netiquette

More Related Content

What's hot

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxLeah Condina
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1alicelagajino
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxluvvprems5
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICTJazzyNF
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologieswacasr12
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3alicelagajino
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT ProjectTeodoro Llanes II
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 

What's hot (20)

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Opportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptxOpportunities ,Challenges, and Power of Media and Information.pptx
Opportunities ,Challenges, and Power of Media and Information.pptx
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
 
Dll empowerment technologies
Dll empowerment technologiesDll empowerment technologies
Dll empowerment technologies
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project12 Publishing and Sustaining for ICT Project
12 Publishing and Sustaining for ICT Project
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 

Similar to Online Safety, Security, Ethics and Netiquette.pptx

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Similar to Online Safety, Security, Ethics and Netiquette.pptx (20)

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Online Safety, Security, Ethics and Netiquette.pptx

  • 1. TVL Building, Goa NHS March 2, 2021
  • 2. By the end of this lesson, the students are expected to: 1. Identify what constitutes appropriate and inappropriate online behavior; 2. Apply Internet online safety, security ethics and etiquette standards and practices in the use of ICTs; 3. Discern possible deceptive information and wrongly evaluated data.
  • 3. Pick a Pic DIRECTION: • The teacher will show some images to the students related with the upcoming discussion. • Each student will be given 1 minute to write their observation on the following images. • After the activity the student will share their observation about the image. Activity 1
  • 4.
  • 5. Online Safety, Security, Ethics and Netiquette The internet is the guiding technology of the Information Technology Age just as the electrical engine was of the Industrial Age. In these times, more and more people are already engaged in the use of technology. These people who are raised in a digital, media-saturated world are called digital natives. No doubt, the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always our primary concern.
  • 6. There's almost no limit to what you can do online. The Internet makes it possible to access information quickly, communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks, such as malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn how to avoid them.
  • 8. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts. Activity 2
  • 9. 1. How many of these information have you SHARED? 2. How many of these information have you NOT SHARED? 3. Based from your answers, do you think you are safe when using the internet? Why?
  • 10. Lesson 2.1: Online Safety, Security, Ethics and Netiquette Online safety refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet.
  • 11. Online Safety Numerous delinquencies/minor crime that can be committed on the internet: •Stalking •Identity theft •Privacy violations •Harassment
  • 12. Online Safety Measures • Never give any personal information out about yourself over the internet. • Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”. Never access your accounts by following an email link, instead type your URL by yourself.
  • 13. Online Safety Measures • Never open messages or attachments from someone you do not know. • Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. • When using a public computer terminal, be sure to delete your browsing data before leaving. • Keep your software updated to avoid security holes. • Do not download or install software or anything on your computer or cell phone that is unknown to you.
  • 14. Online Threats Is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. These are usually done by computer hackers who uses World Wide Web to facilitate cybercrime.
  • 15. Types of Online Threats • Phishing • Pharming • Internet Scam • Internet robots • Malware • Spams • Cyberstalking • Cyberbullying • Spoofing
  • 16. Phishing Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
  • 17. Pharming Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations.
  • 18. Internet Scam Internet Scam generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal information. Online scams may come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few.
  • 19. Internet Robots Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user. Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities. Captcha Technology is used to avoid this type of security threat.
  • 20. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 21. Adware Adware (advertising supported software) is unwanted software designed to throw advertisements up on your screen. Example, pop- up ads and banner ads.
  • 22. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 23. Spyware Spyware is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger.
  • 24. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 25. Virus and Worms Virus and Worms are malwares that attach to another program and, when executed— unintentionally by the user— replicates itself by modifying other computer programs and infecting them with its own bits of code.
  • 26. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 27. Trojan or Trojan Horse Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, Trojans can be used to steal financial information or install threats like viruses and ransomware.
  • 28. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 29. Ransomware Ransomware is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
  • 30. Malware Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most common offenders in the rogues’ gallery of malware: • Adware • Spyware • Virus and Worms • Trojan or Trojan Horse • Ransomware
  • 31. Spams Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it.
  • 32. Cyberstalking Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
  • 33. Cyberbullying Cyberbullying The Act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies.
  • 34. Spoofing Spoofing happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware. -Describe a criminal; who impersonates another individual or organization, with the intent to gather personal or business information.
  • 35. Types of Online Threats • Phishing • Pharming • Internet Scam • Internet robots • Malware • Spams • Cyberstalking • Cyberbullying • Spoofing
  • 36. Online Ethics and Netiquette • Comes from the word Network and Etiquette • Is a set of rules and norms for acceptable conduct or behavior online.
  • 37. Online Ethics and Netiquette https://www.youtube.com/watch?v=FWMk_Zv7nB8 - by Angel Rivera
  • 38. Can You Keep it Private? 1. Your family is going out on a vacation. What should you do? A. Post pictures when you return home. B. Post the dates you will be gone online. C. Post updates of where you are currently checking in hotels or places. D. Tell no one. Vacations are for getting away. • Activity 3 2. Do you have the same passwords for all your accounts? A. Yes. That is how I remember all my passwords. B. I have different passwords for all different accounts. C. I keep it simple. I don’t have any passwords. D. I have two similar passwords that I alternately use for all my accounts. DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 39. Can You Keep it Private? 3. Choose which image below describes how you feel about sharing your password with your boyfriend/ girlfriend? • Activity 3 DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 40. Can You Keep it Private? 4. Your parents bought you your first cellphone. How will you share your cellphone number? A. Do not share your cellphone number to anyone. B. Post your cellphone number in your social media account. C. Share your cellphone number only in person. D. Post your cellphone number in your group chat. • Activity 3 5. Your social media friends list should only be composed of ______________. A. Your favorite brands. B. Family and friends C. Anyone who sends you a friend request D. Foreigners DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter of your answer and briefly explain why.
  • 41. What have you Learned? Direction: Reflect on this and write your answer in a ¼ sheet of Paper Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/
  • 42. Online Safety, Security, and Netiquette

Editor's Notes

  1. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts.
  2. DIRECTIONS: Read and reflect each item carefully. Put check in the space you have shared or not shared these pieces of information in all your social media accounts.