SlideShare a Scribd company logo
*Information & Images taken from various sites on the internet and is under OER Commons.
1
*Information & Images taken from various sites on the internet and is under OER Commons.
REVIEW:
❑ We have defined ICT or Information Communication and
Technology.
❑ Explained the effects of ICT in the Philippines from different
sectors
❑ Tackled about the state of ICT existing worldwide, its progress
from Web 1.0 to Web 3.0.
❑ Discussed Trends in ICT, current and existing trends all over the
world and its components and why are they important.
2
*Information & Images taken from various sites on the internet and is under OER Commons.
I CAN
❑ I can apply online safety, security, ethics, and
etiquette standards.
❑ I can practice these standard in my daily life.
3
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {P,R,I,C,Y,A,G,F,V}
4
ANSWER: (7 LETTERS): _ _ _ _ _ _ _
PRIVACY
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {A,C,G,H,D,E,Y,K,R}
5
ANSWER: (6 LETTERS): _ _ _ _ _ _
HACKER
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {W,V,I,S,R,U,T}
6
ANSWER: (5 LETTERS): _ _ _ _ _
VIRUS
*Information & Images taken from various sites on the internet and is under OER Commons.
GUESS THE WORD FROM LETTERS: {E,R,I,N,C,S,I,T,U,Y}
7
ANSWER: (8 LETTERS): _ _ _ _ _ _ _ _
SECURITY
Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
ONLINE SAFETY,
SECURITY, ETHICS,
AND ETIQUETTE
Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
“Are you Safe
and Secured
online?
9
“How Safe and
Secured are you
online?
10
11
*Information & Images taken from various sites on the internet and is under OER Commons.
11
https://www.youtube.com/watch?v=HxySrSbSY7o&t
*Information & Images taken from various sites on the internet and is under OER Commons.
THE INTERNET
Internet is defined as the
information
superhighway. This
means that anyone has
access to this highway,
can place info, and can
grab that info.
12
INFORMATION AT RISK
These are types of information that are
at risk.
13
1
*Information & Images taken from various sites on the internet and is under OER Commons.
TYPES OF INFORMATION WITH RISK:
Mother’s and
Father’s name
14
Sibling’s
Name
Address
Home & Cell
Phone Number
Birthday
Email
Address
First, Middle
& Last Name
Current &
Previous School
15
*Information & Images taken from various sites on the internet and is under OER Commons.
15
ONLINE SAFETY TIPS
Some Tips to Stay Safe Online
16
2
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Be mindful on what you share online.
17
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not just
accept terms
and
conditions,
read it.
18
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not share your password with anyone.
19
20
*Information & Images taken from various sites on the internet and is under OER Commons.
20
21
*Information & Images taken from various sites on the internet and is under OER Commons.
21
22
*Information & Images taken from various sites on the internet and is under OER Commons.
22
23
*Information & Images taken from various sites on the internet and is under OER Commons.
23
24
*Information & Images taken from various sites on the internet and is under OER Commons.
24
25
*Information & Images taken from various sites on the internet and is under OER Commons.
25
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not talk to strangers whether online or face-to- face.
26
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Never post anything about a future vacation.
27
28
*Information & Images taken from various sites on the internet and is under OER Commons.
28
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Add friends you know in real life.
29
30
*Information & Images taken from various sites on the internet and is under OER Commons.
30
31
*Information & Images taken from various sites on the internet and is under OER Commons.
31
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Avoid visiting untrusted websites.
32
33
*Information & Images taken from various sites on the internet and is under OER Commons.
33
34
*Information & Images taken from various sites on the internet and is under OER Commons.
34
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
If you have WiFi at home, make it private by adding a password.
35
36
*Information & Images taken from various sites on the internet and is under OER Commons.
36
1. PLDTHOMEDSL,
PLDTmyDSLPAL or PLDmyDSLBiz
Sa SSID na ito, kailangan mo yung
mac address niya.
for Example yung mac nya is:
00:1F:FB:0F:C5:A8
kunin yung last 5 digit which is: FC5A8
password: PLDTWIFI+FC5A8=
PLDTWIFIFC5A8
37
*Information & Images taken from various sites on the internet and is under OER Commons.
37
2. PLDTHOMEDSLxxxxx
Sa SSID na ito yung five x nasa dulo dapat number
lang pra mkuha yung default pass. Kung may
kasamang letter yan di ko na po alam unless kung
may mgshare dito nyan. for Example:
PLDTHOMEDSL21354 (Yung 5 numbers na nasa
huli dpat imultiply sa 3.
21354*3= 64062)
password:PLDTWIFI64062
38
*Information & Images taken from various sites on the internet and is under OER Commons.
38
3. PLDTHOMEFIBR_xxxxxx
Sa SSID na to nangangailangan tayo ng conversion
ng code sa SSID nya. Yung huling 6 digits dpat
iconvert nyo sa code na katapat nya sa baba.
HEX CODE
TABLE
0=f
1=e
2=d
3=c
4=b
5=a
6=9
7=8
8=7
9=6
a=5
b=4
c=3
d=2
e=1
f=0
for Example: PLDTHOMEFIBR_123abc
password: wlanedc543 (small letter lahat)
wlan+(converted hex)
39
*Information & Images taken from various sites on the internet and is under OER Commons.
39
4. PLDTHOMEFIBRxxxxx
Sa SSID na ito ay iba sa taas. yung underscore
lang ng ngiba. Iba din and prefix nito.
Yung huling 5 digits dpat ding iconvert same sa
number 3. For example: PLDTHOMEFIBR123abc
password: PLDTWIFIedc543
PLDTWIFI+(converted hex)
(take note sa capital at small letter)
HEX CODE
TABLE
0=f
1=e
2=d
3=c
4=b
5=a
6=9
7=8
8=7
9=6
a=5
b=4
c=3
d=2
e=1
f=0
40
*Information & Images taken from various sites on the internet and is under OER Commons.
40
5. HomeBro_Ultera
Sa SSID na to, need natin yung last 6
mac address niya. for example:
00:1F:FB:0F:C5:A8
password: HomeBro_0FC5A8
HomeBro_(MacAddress)
Mga apps na kaya makita Mac Address:
Andro Dumper,Wps Connect,United
Pldt *****er
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Install and update
an antivirus
software on your
computer.
41
*Information & Images taken from various sites on the internet and is under OER Commons.
ANTIVIRUS EXAMPLE:
42
ESET NOD32
F-SECURE
KASPERSKY
NORTON
AVAST
SMADAV
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Avoid downloading anything from untrusted websites.
43
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Buy the software, do not use pirated ones.
44
*Information & Images taken from various sites on the internet and is under OER Commons.
SOME TIPS TO STAY SAFE ONLINE:
Do not reply or click links from suspicious emails.
45
INTERNET THREATS
Some internet threats to avoid or
overlook.
46
3
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
1.Malware – stands for malicious software.
47
a. Virus – a malicious program
designed to replicate itself and transfer
from one computer to another (internet,
local networks, FDs, CDs, etc.)
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
48
b. Worm – a malicious
program that transfers
from one computer to
another by any types of
means. Ex. ILOVEYOU
Worm
*Information & Images taken from various sites on the internet and is under OER Commons.
ILOVEYOU WORM
ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer
worm that attacked tens of millions of Windowspersonal computers on and
after 5 May 2000[1] local time in the Philippines when it started spreading as
an email message with the subject line "ILOVEYOU" and the attachment
"LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension ('vbs', a type
of interpreted file) was most often hidden by default on Windows computers
of the time (as it is an extension for a file type that is known by Windows),
leading unwitting users to think it was a normal text file. Opening the
attachment activated the Visual Basic script.
49
*Information & Images taken from various sites on the internet and is under OER Commons.
ILOVEYOU WORM
The malware originated in the Pandacan neighborhood
of Manila in the Philippines on May 5, 2000, thereafter
following daybreak westward across the world as
employees began their workday that Friday morning,
moving first to Hong Kong, then to Europe, and finally
the United States.
50
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
51
c. Trojan – a malicious program
that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
52
d. Spyware – a program that runs
in the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
53
d. Spyware – a program that runs
in the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
54
e. Adware – a program designed to send you advertisements,
mostly as pop-ups.
55
*Information & Images taken from various sites on the internet and is under OER Commons.
55
56
*Information & Images taken from various sites on the internet and is under OER Commons.
56
57
*Information & Images taken from various sites on the internet and is under OER Commons.
57
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
58
f. Ransomware – or ransom
software is a type of
malicious software from
cryptovirology that threatens
to publish the victim's data or
perpetually block access to it
unless a ransom is paid.
59
*Information & Images taken from various sites on the internet and is under OER Commons.
59
60
*Information & Images taken from various sites on the internet and is under OER Commons.
60
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
2. Spam – an unwanted
email mostly from bots or
advertisers. It can be used to
send malware.
61
62
*Information & Images taken from various sites on the internet and is under OER Commons.
62
63
*Information & Images taken from various sites on the internet and is under OER Commons.
63
*Information & Images taken from various sites on the internet and is under OER Commons.
INTERNET THREATS:
3. Phishing – an unwanted acquisition of
sensitive personal information like
passwords and credit card details.
64
65
*Information & Images taken from various sites on the internet and is under OER Commons.
65
https://www.youtube.com/watch?v=9TRR6lHviQc
66
*Information & Images taken from various sites on the internet and is under OER Commons.
66
“THINK BEFORE
YOU CLICK.
67
*Information & Images taken from various sites on the internet and is under OER Commons.
VALUES INTEGRATION
❑ Everyone’s own information is important, we must keep
this on to ourselves and if ever shared by others, we must
learn to keep it.
❑ Respect begets respect is also applied in technology
settings, not just real life setting.
68
*Information & Images taken from various sites on the internet and is under OER Commons.
ACTIVITY
❑ Share an experience that you have always tend to do but
later did you discover that it is not a standard of ONLINE
SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
69

More Related Content

What's hot

EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
4 Advance Word Processing Skill
4 Advance Word Processing Skill4 Advance Word Processing Skill
4 Advance Word Processing Skill
Teodoro Llanes II
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
Mark Jhon Oxillo
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
Jesus Rances
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
alicelagajino
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
Teodoro Llanes II
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment
Teodoro Llanes II
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
pizonaim
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
JazzyNF
 
6 Advance Presentation Skill
6 Advance Presentation Skill6 Advance Presentation Skill
6 Advance Presentation Skill
Teodoro Llanes II
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
Angelito Quiambao
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
George Silandote Jr.
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
Mark Jhon Oxillo
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication Technology
Teodoro Llanes II
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
RyanRojasRicablanca
 

What's hot (20)

EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
4 Advance Word Processing Skill
4 Advance Word Processing Skill4 Advance Word Processing Skill
4 Advance Word Processing Skill
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment7 Imaging and Design for the Online Environment
7 Imaging and Design for the Online Environment
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
[EMPOWERMENT TECHNOLOGIES]-MULTIMEDIA AND ICT
 
6 Advance Presentation Skill
6 Advance Presentation Skill6 Advance Presentation Skill
6 Advance Presentation Skill
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
ICT as a Platform for Change
ICT as a Platform for ChangeICT as a Platform for Change
ICT as a Platform for Change
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
1 Information and Communication Technology
1  Information and Communication Technology1  Information and Communication Technology
1 Information and Communication Technology
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 

Similar to 2 Online Safety, Security, Ethics, and Etiquette

1 Information and Communication Technology.pptx
1  Information and Communication Technology.pptx1  Information and Communication Technology.pptx
1 Information and Communication Technology.pptx
mariemichellelaspina
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Ulfah
UlfahUlfah
Ulfahulfah
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
JeffUrgelles
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
xlilmermaidx
 
The internet 2
The internet 2The internet 2
The internet 2
SMS
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01Ajith Pathirana
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
DrMajidMumtaz
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
Simson Garfinkel
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
knowldge
 

Similar to 2 Online Safety, Security, Ethics, and Etiquette (20)

1 Information and Communication Technology.pptx
1  Information and Communication Technology.pptx1  Information and Communication Technology.pptx
1 Information and Communication Technology.pptx
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 
Ulfah
UlfahUlfah
Ulfah
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
The internet 2
The internet 2The internet 2
The internet 2
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
hacking
hackinghacking
hacking
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

2 Online Safety, Security, Ethics, and Etiquette

  • 1. *Information & Images taken from various sites on the internet and is under OER Commons. 1
  • 2. *Information & Images taken from various sites on the internet and is under OER Commons. REVIEW: ❑ We have defined ICT or Information Communication and Technology. ❑ Explained the effects of ICT in the Philippines from different sectors ❑ Tackled about the state of ICT existing worldwide, its progress from Web 1.0 to Web 3.0. ❑ Discussed Trends in ICT, current and existing trends all over the world and its components and why are they important. 2
  • 3. *Information & Images taken from various sites on the internet and is under OER Commons. I CAN ❑ I can apply online safety, security, ethics, and etiquette standards. ❑ I can practice these standard in my daily life. 3
  • 4. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {P,R,I,C,Y,A,G,F,V} 4 ANSWER: (7 LETTERS): _ _ _ _ _ _ _ PRIVACY
  • 5. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {A,C,G,H,D,E,Y,K,R} 5 ANSWER: (6 LETTERS): _ _ _ _ _ _ HACKER
  • 6. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {W,V,I,S,R,U,T} 6 ANSWER: (5 LETTERS): _ _ _ _ _ VIRUS
  • 7. *Information & Images taken from various sites on the internet and is under OER Commons. GUESS THE WORD FROM LETTERS: {E,R,I,N,C,S,I,T,U,Y} 7 ANSWER: (8 LETTERS): _ _ _ _ _ _ _ _ SECURITY
  • 8. Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE Prepared by: Mr. Teodoro R. Llanes IIEMPOWERMENT TECHNOLOGIES
  • 9. “Are you Safe and Secured online? 9
  • 10. “How Safe and Secured are you online? 10
  • 11. 11 *Information & Images taken from various sites on the internet and is under OER Commons. 11 https://www.youtube.com/watch?v=HxySrSbSY7o&t
  • 12. *Information & Images taken from various sites on the internet and is under OER Commons. THE INTERNET Internet is defined as the information superhighway. This means that anyone has access to this highway, can place info, and can grab that info. 12
  • 13. INFORMATION AT RISK These are types of information that are at risk. 13 1
  • 14. *Information & Images taken from various sites on the internet and is under OER Commons. TYPES OF INFORMATION WITH RISK: Mother’s and Father’s name 14 Sibling’s Name Address Home & Cell Phone Number Birthday Email Address First, Middle & Last Name Current & Previous School
  • 15. 15 *Information & Images taken from various sites on the internet and is under OER Commons. 15
  • 16. ONLINE SAFETY TIPS Some Tips to Stay Safe Online 16 2
  • 17. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Be mindful on what you share online. 17
  • 18. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not just accept terms and conditions, read it. 18
  • 19. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not share your password with anyone. 19
  • 20. 20 *Information & Images taken from various sites on the internet and is under OER Commons. 20
  • 21. 21 *Information & Images taken from various sites on the internet and is under OER Commons. 21
  • 22. 22 *Information & Images taken from various sites on the internet and is under OER Commons. 22
  • 23. 23 *Information & Images taken from various sites on the internet and is under OER Commons. 23
  • 24. 24 *Information & Images taken from various sites on the internet and is under OER Commons. 24
  • 25. 25 *Information & Images taken from various sites on the internet and is under OER Commons. 25
  • 26. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not talk to strangers whether online or face-to- face. 26
  • 27. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Never post anything about a future vacation. 27
  • 28. 28 *Information & Images taken from various sites on the internet and is under OER Commons. 28
  • 29. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Add friends you know in real life. 29
  • 30. 30 *Information & Images taken from various sites on the internet and is under OER Commons. 30
  • 31. 31 *Information & Images taken from various sites on the internet and is under OER Commons. 31
  • 32. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Avoid visiting untrusted websites. 32
  • 33. 33 *Information & Images taken from various sites on the internet and is under OER Commons. 33
  • 34. 34 *Information & Images taken from various sites on the internet and is under OER Commons. 34
  • 35. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: If you have WiFi at home, make it private by adding a password. 35
  • 36. 36 *Information & Images taken from various sites on the internet and is under OER Commons. 36 1. PLDTHOMEDSL, PLDTmyDSLPAL or PLDmyDSLBiz Sa SSID na ito, kailangan mo yung mac address niya. for Example yung mac nya is: 00:1F:FB:0F:C5:A8 kunin yung last 5 digit which is: FC5A8 password: PLDTWIFI+FC5A8= PLDTWIFIFC5A8
  • 37. 37 *Information & Images taken from various sites on the internet and is under OER Commons. 37 2. PLDTHOMEDSLxxxxx Sa SSID na ito yung five x nasa dulo dapat number lang pra mkuha yung default pass. Kung may kasamang letter yan di ko na po alam unless kung may mgshare dito nyan. for Example: PLDTHOMEDSL21354 (Yung 5 numbers na nasa huli dpat imultiply sa 3. 21354*3= 64062) password:PLDTWIFI64062
  • 38. 38 *Information & Images taken from various sites on the internet and is under OER Commons. 38 3. PLDTHOMEFIBR_xxxxxx Sa SSID na to nangangailangan tayo ng conversion ng code sa SSID nya. Yung huling 6 digits dpat iconvert nyo sa code na katapat nya sa baba. HEX CODE TABLE 0=f 1=e 2=d 3=c 4=b 5=a 6=9 7=8 8=7 9=6 a=5 b=4 c=3 d=2 e=1 f=0 for Example: PLDTHOMEFIBR_123abc password: wlanedc543 (small letter lahat) wlan+(converted hex)
  • 39. 39 *Information & Images taken from various sites on the internet and is under OER Commons. 39 4. PLDTHOMEFIBRxxxxx Sa SSID na ito ay iba sa taas. yung underscore lang ng ngiba. Iba din and prefix nito. Yung huling 5 digits dpat ding iconvert same sa number 3. For example: PLDTHOMEFIBR123abc password: PLDTWIFIedc543 PLDTWIFI+(converted hex) (take note sa capital at small letter) HEX CODE TABLE 0=f 1=e 2=d 3=c 4=b 5=a 6=9 7=8 8=7 9=6 a=5 b=4 c=3 d=2 e=1 f=0
  • 40. 40 *Information & Images taken from various sites on the internet and is under OER Commons. 40 5. HomeBro_Ultera Sa SSID na to, need natin yung last 6 mac address niya. for example: 00:1F:FB:0F:C5:A8 password: HomeBro_0FC5A8 HomeBro_(MacAddress) Mga apps na kaya makita Mac Address: Andro Dumper,Wps Connect,United Pldt *****er
  • 41. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Install and update an antivirus software on your computer. 41
  • 42. *Information & Images taken from various sites on the internet and is under OER Commons. ANTIVIRUS EXAMPLE: 42 ESET NOD32 F-SECURE KASPERSKY NORTON AVAST SMADAV
  • 43. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Avoid downloading anything from untrusted websites. 43
  • 44. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Buy the software, do not use pirated ones. 44
  • 45. *Information & Images taken from various sites on the internet and is under OER Commons. SOME TIPS TO STAY SAFE ONLINE: Do not reply or click links from suspicious emails. 45
  • 46. INTERNET THREATS Some internet threats to avoid or overlook. 46 3
  • 47. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 1.Malware – stands for malicious software. 47 a. Virus – a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
  • 48. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 48 b. Worm – a malicious program that transfers from one computer to another by any types of means. Ex. ILOVEYOU Worm
  • 49. *Information & Images taken from various sites on the internet and is under OER Commons. ILOVEYOU WORM ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windowspersonal computers on and after 5 May 2000[1] local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension ('vbs', a type of interpreted file) was most often hidden by default on Windows computers of the time (as it is an extension for a file type that is known by Windows), leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. 49
  • 50. *Information & Images taken from various sites on the internet and is under OER Commons. ILOVEYOU WORM The malware originated in the Pandacan neighborhood of Manila in the Philippines on May 5, 2000, thereafter following daybreak westward across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States. 50
  • 51. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 51 c. Trojan – a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 52. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 52 d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 53. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 53 d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging.
  • 54. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 54 e. Adware – a program designed to send you advertisements, mostly as pop-ups.
  • 55. 55 *Information & Images taken from various sites on the internet and is under OER Commons. 55
  • 56. 56 *Information & Images taken from various sites on the internet and is under OER Commons. 56
  • 57. 57 *Information & Images taken from various sites on the internet and is under OER Commons. 57
  • 58. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 58 f. Ransomware – or ransom software is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • 59. 59 *Information & Images taken from various sites on the internet and is under OER Commons. 59
  • 60. 60 *Information & Images taken from various sites on the internet and is under OER Commons. 60
  • 61. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send malware. 61
  • 62. 62 *Information & Images taken from various sites on the internet and is under OER Commons. 62
  • 63. 63 *Information & Images taken from various sites on the internet and is under OER Commons. 63
  • 64. *Information & Images taken from various sites on the internet and is under OER Commons. INTERNET THREATS: 3. Phishing – an unwanted acquisition of sensitive personal information like passwords and credit card details. 64
  • 65. 65 *Information & Images taken from various sites on the internet and is under OER Commons. 65 https://www.youtube.com/watch?v=9TRR6lHviQc
  • 66. 66 *Information & Images taken from various sites on the internet and is under OER Commons. 66
  • 68. *Information & Images taken from various sites on the internet and is under OER Commons. VALUES INTEGRATION ❑ Everyone’s own information is important, we must keep this on to ourselves and if ever shared by others, we must learn to keep it. ❑ Respect begets respect is also applied in technology settings, not just real life setting. 68
  • 69. *Information & Images taken from various sites on the internet and is under OER Commons. ACTIVITY ❑ Share an experience that you have always tend to do but later did you discover that it is not a standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE. 69