SlideShare a Scribd company logo
1 of 48
POLICING
THE
INTERNET
Presented by: GROUP 5
LIVING IN THE IT ERA
1 PETER 5:7
Myra O. Lachica Angelica Hablado Rowena Pepito Mark Daniel Ruga
Christian Jay Legal Lisset May Clarin
1 NETIQUETTES AND IT’S TYPES
2 ONLINE SECURITY, SAFETY AND ETHICS
3 INTERNET THREATS
Topic Outline
4 PROTECTING REPUTATIONS ONLINE
NET + ETIQUETTE = ?
It is a short term for
malicious software and is
the generic term for
spyware and adware.
It is also known as a love bug or love
letter.
The use of the internet or other
electronic device to harass or
stalk individual, group of
organization.
A malicious website that resembles a
legitimate website, used to gather
usernames and passwords.
Topic No. 1
NETIQUETTE
AND IT’S TYPE
Internet Netiquette Etiquette of cyberspace
concerned with the “proper” way to communicate
in an online environment netiquette
(net+etiquette) can be defined as the informal
guidelines developed by the users of the internet
for accepteble online behavior. these are
developed over time in a variety of virtual
environments and internet applications
Netiquette
Types of Netiquette
1.Netiquette Basics
• Make Real People a Priority
• Use Respectful Language
• Share With Discretion
• Don't Exclude Others
• Choose Friends Wisely
• Respect People's Privacy
• Fact Check Before Reposting
• Don't Spam
• Respond to Emails and Texts
Promptly
• Update Online Information
2. Netiquette of Sending
• Be Brief
• Use Whitespaces
• Use Descriptive Subject Lines
• Stay on-topic
• Be careful sending attachment
• Copy the minimum number of people
3. Netiquette of Replying
• Acknowledge important
communications
• Check the current information before
replying
• Reference past communications
• Summarize for the group
4. Netiquette of Confidentiality
• Don’t publicize other’s email
addresses
• Never send what you don’t
read
• Remember archiving
• Respect copyright
ONLINE
SECURITY,
SAFETY AND
ETHICS
Topic No. 2
ONLINE SAFETY AND SECURITY
One of the fastest ways that we are relying on when
accessing and retrieving information is through the
use of the internet. Since time immemorial, internet
has been considered as the library of all libraries
where we can get lots of information all over the
world from different people, events, and places.
Moreover, because of its rapid change and diverse
needs of users, IT experts enhanced and improved
the internet that made it became more powerful.
Along with this are the possible threats and dangers
that may be harmful for the people living in the virtual
world.
Listed to the following slides are the
possible threats that netizens must
be aware of when using the
internet.
• Phishing
• Defined as a software or
program used by an
attacker to obtain personal
information.
• Commonly target user
passwords to hack and take
control of a user account
Types of
Phishing
A. Email Phishing
Most phishing attacks are sent by
email. The crook will register a fake
domain that mimics a genuine
organisation and sends thousands
of generic requests. The fake
domain often involves character
substitution, like using ‘r’ and ‘n’
next to each other to create ‘rn’
instead of ‘m’. In other cases, the
fraudsters create a unique domain
that includes the legitimate
organisation’s name in the URL.
2. Spear Phishing
Spear phishing, describes malicious emails
sent to a specific person. Criminals who do
this will already have some or all of the
following information about the victim: Their
name. Place of employment. Job title. Email
address; and Specific information about their
job role.
C. WHALING
Whaling attacks are even more
targeted, taking aim at senior
executives. Although the end goal of
whaling is the same as any other
kind of phishing attack, the
technique tends to be a lot subtler.
Tricks such as fake links and
malicious URLs aren’t helpful in this
instance, as criminals are
attempting to imitate senior staff.
Whaling emails also commonly use
the pretext of a busy CEO who
wants an employee to do them a
favour
D. Smishing and Vishing
With both smishing and vishing,
telephones replace emails as the
method of communication. Smishing
involves criminals sending text
messages (the content of which is
much the same as with email
phishing), and vishing involves a
telephone conversation. One of the
most common smishing pretexts are
messages supposedly from your
bank alerting you to suspicious
activity.
E. ANGLER PHISHING
A relatively new attack vector, social media
offers several ways for criminals to trick
people. Fake URLs; cloned websites, posts,
and tweets; and instant messaging (which is
essentially the same as smishing) can all be
used to persuade people to divulge sensitive
information or download malware.
Alternatively, criminals can use the data that
people willingly post on social media to
create highly targeted attacks.
2. PHARMING
A malicious website that
resembles a legitimate
website, used to gather
usernames and passwords.
3. Malware
Short term for malicious
software and is the generic term
for spyware and adware A
computer software sent by
attackers to inflict chaos on a
computer’s operation and
processes
A type of scam that misleads
the user in many ways
attempting to make lead of
them. The purpose is to cheat
the target of their personal
property directly rather than
private information through
fabricated promises,
confidence tricks and many
more.
4. INTERNET SCAM
5. VIRUS AND WORMS
• Virus is a program designed to
replicate by attaching itself into
other computer programs, data
files or boot sector of the hard
drive
• Worm is can be injected into a
network by any types of means,
like a USB stick or an email
attachment
• Trogan Horse- commonly known as a “Trojan”, is
a type of malware that disguises itself as a normal
file or program to trick users into downloading
and installing malware.
• Iloveyou Virus- also known as a love bug or love
letter. A computer worm attached on email that
have infected 10 million of windows personal
computer that cause computer shutdown and
deletion of files on the year 2000. Created by
Filipino students Onel De Guzman and Reonel
Ramones
6. Computer Bug
• A malfunction of
computer system
through its runtime.
• The term “bug”
originated to the
Moth found on the
Mark II by Grace
Hopper that cause a
system malfunction.
7. Cyber Stalking
The use of the
internet or
other electronic
device to harass
or stalk
individual,
group of
organization.
8. Cyber Bullying
The act of
tormenting,
threatening,
harassing, or
embarrassing
another person
using the internet
or other
technologies.
9. SPAM
An unsolicited email,
instant messages, or
social media messages.
These messages are
fairly easy to spot and
can be damaging if you
open it.
10. Spoofing
Describes a criminal
who impersonates
another individual or
organization, with the
intent to gather
personal or business
information
s time
and
bandwi
dth
• Make
yoursel
f look
good
• Share
expert
knowle
dge
• Help
keep
flame
Ten Core Roles of Netiquette
In these new world of
communicatingconcern and connecting
with other people, one’s safety in the
online environment is everybody’s concern
and accountability. The government itself
enacted laws and regulations to protect
the welfare of every online user from
possible harm and danger.
• Republic act 10627 or anti-bullying
act of 2013 this law includes
protection of individuals through
electronic means. bullying invades
an individual’s privacy by using
photos and other information
meant to disgrace that individual.
2. Republic Act 10175 or
Cybercrime Prevention Act of
2012
This law protects an individual
from various unwanted online
and cyber acts that may
harm or evade one’s privacy
and integrity.
Here are the things you might want to
consider before posting something over
the internet.
a. Would you want your parents or
grandparents to see it?
b. Would you want your future boss to see
it?
c. Once you ,post something on the web,
you have no control of whos sees your
post.
Set your post to “private”. In this way,
search engines will not be able to scan the
post.
Your friends depend on you to protect
their reputation online. Talk to your
friends about this serious responsibility.
Avoid using names. Names are easy for
search engines to scan.
If you feel that a post can affect you and
other’s reputation, ask the one who
posted it to pull it down or report it as
appropriate.
One word that retain in your mind? How do you
explain it?
Copy of policing the internet_040555.pptx

More Related Content

Similar to Copy of policing the internet_040555.pptx

Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

Similar to Copy of policing the internet_040555.pptx (20)

COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from MdRuga

Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptx
Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptxMath5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptx
Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptxMdRuga
 
Math5_Probability_-The-Addition-Rule_104010.pptx
Math5_Probability_-The-Addition-Rule_104010.pptxMath5_Probability_-The-Addition-Rule_104010.pptx
Math5_Probability_-The-Addition-Rule_104010.pptxMdRuga
 
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptx
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptxMath5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptx
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptxMdRuga
 
mineralnutrition 2.docx
mineralnutrition 2.docxmineralnutrition 2.docx
mineralnutrition 2.docxMdRuga
 
FLUID MECHANICS_101718.pptx
FLUID MECHANICS_101718.pptxFLUID MECHANICS_101718.pptx
FLUID MECHANICS_101718.pptxMdRuga
 
Crop-Science-1.ppt
Crop-Science-1.pptCrop-Science-1.ppt
Crop-Science-1.pptMdRuga
 
Harvesting-and-Post-Harvesting.ppt
Harvesting-and-Post-Harvesting.pptHarvesting-and-Post-Harvesting.ppt
Harvesting-and-Post-Harvesting.pptMdRuga
 

More from MdRuga (7)

Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptx
Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptxMath5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptx
Math5_Probability_-Additional-Topics-in-Probability-and-Counting_103954.pptx
 
Math5_Probability_-The-Addition-Rule_104010.pptx
Math5_Probability_-The-Addition-Rule_104010.pptxMath5_Probability_-The-Addition-Rule_104010.pptx
Math5_Probability_-The-Addition-Rule_104010.pptx
 
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptx
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptxMath5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptx
Math5_Descriptive_Statistics_FrequencyDistribution_and_Graphs.pptx
 
mineralnutrition 2.docx
mineralnutrition 2.docxmineralnutrition 2.docx
mineralnutrition 2.docx
 
FLUID MECHANICS_101718.pptx
FLUID MECHANICS_101718.pptxFLUID MECHANICS_101718.pptx
FLUID MECHANICS_101718.pptx
 
Crop-Science-1.ppt
Crop-Science-1.pptCrop-Science-1.ppt
Crop-Science-1.ppt
 
Harvesting-and-Post-Harvesting.ppt
Harvesting-and-Post-Harvesting.pptHarvesting-and-Post-Harvesting.ppt
Harvesting-and-Post-Harvesting.ppt
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Copy of policing the internet_040555.pptx

  • 3. Myra O. Lachica Angelica Hablado Rowena Pepito Mark Daniel Ruga Christian Jay Legal Lisset May Clarin
  • 4. 1 NETIQUETTES AND IT’S TYPES 2 ONLINE SECURITY, SAFETY AND ETHICS 3 INTERNET THREATS Topic Outline 4 PROTECTING REPUTATIONS ONLINE
  • 6. It is a short term for malicious software and is the generic term for spyware and adware.
  • 7. It is also known as a love bug or love letter.
  • 8. The use of the internet or other electronic device to harass or stalk individual, group of organization.
  • 9. A malicious website that resembles a legitimate website, used to gather usernames and passwords.
  • 11. Internet Netiquette Etiquette of cyberspace concerned with the “proper” way to communicate in an online environment netiquette (net+etiquette) can be defined as the informal guidelines developed by the users of the internet for accepteble online behavior. these are developed over time in a variety of virtual environments and internet applications Netiquette
  • 12. Types of Netiquette 1.Netiquette Basics • Make Real People a Priority • Use Respectful Language • Share With Discretion • Don't Exclude Others • Choose Friends Wisely • Respect People's Privacy • Fact Check Before Reposting • Don't Spam • Respond to Emails and Texts Promptly • Update Online Information
  • 13. 2. Netiquette of Sending • Be Brief • Use Whitespaces • Use Descriptive Subject Lines • Stay on-topic • Be careful sending attachment • Copy the minimum number of people
  • 14. 3. Netiquette of Replying • Acknowledge important communications • Check the current information before replying • Reference past communications • Summarize for the group
  • 15. 4. Netiquette of Confidentiality • Don’t publicize other’s email addresses • Never send what you don’t read • Remember archiving • Respect copyright
  • 17. ONLINE SAFETY AND SECURITY One of the fastest ways that we are relying on when accessing and retrieving information is through the use of the internet. Since time immemorial, internet has been considered as the library of all libraries where we can get lots of information all over the world from different people, events, and places. Moreover, because of its rapid change and diverse needs of users, IT experts enhanced and improved the internet that made it became more powerful. Along with this are the possible threats and dangers that may be harmful for the people living in the virtual world.
  • 18. Listed to the following slides are the possible threats that netizens must be aware of when using the internet.
  • 19. • Phishing • Defined as a software or program used by an attacker to obtain personal information. • Commonly target user passwords to hack and take control of a user account
  • 21. A. Email Phishing Most phishing attacks are sent by email. The crook will register a fake domain that mimics a genuine organisation and sends thousands of generic requests. The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each other to create ‘rn’ instead of ‘m’. In other cases, the fraudsters create a unique domain that includes the legitimate organisation’s name in the URL.
  • 22. 2. Spear Phishing Spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim: Their name. Place of employment. Job title. Email address; and Specific information about their job role.
  • 23. C. WHALING Whaling attacks are even more targeted, taking aim at senior executives. Although the end goal of whaling is the same as any other kind of phishing attack, the technique tends to be a lot subtler. Tricks such as fake links and malicious URLs aren’t helpful in this instance, as criminals are attempting to imitate senior staff. Whaling emails also commonly use the pretext of a busy CEO who wants an employee to do them a favour
  • 24. D. Smishing and Vishing With both smishing and vishing, telephones replace emails as the method of communication. Smishing involves criminals sending text messages (the content of which is much the same as with email phishing), and vishing involves a telephone conversation. One of the most common smishing pretexts are messages supposedly from your bank alerting you to suspicious activity.
  • 25. E. ANGLER PHISHING A relatively new attack vector, social media offers several ways for criminals to trick people. Fake URLs; cloned websites, posts, and tweets; and instant messaging (which is essentially the same as smishing) can all be used to persuade people to divulge sensitive information or download malware. Alternatively, criminals can use the data that people willingly post on social media to create highly targeted attacks.
  • 26. 2. PHARMING A malicious website that resembles a legitimate website, used to gather usernames and passwords.
  • 27. 3. Malware Short term for malicious software and is the generic term for spyware and adware A computer software sent by attackers to inflict chaos on a computer’s operation and processes
  • 28. A type of scam that misleads the user in many ways attempting to make lead of them. The purpose is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more. 4. INTERNET SCAM
  • 29. 5. VIRUS AND WORMS • Virus is a program designed to replicate by attaching itself into other computer programs, data files or boot sector of the hard drive • Worm is can be injected into a network by any types of means, like a USB stick or an email attachment • Trogan Horse- commonly known as a “Trojan”, is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. • Iloveyou Virus- also known as a love bug or love letter. A computer worm attached on email that have infected 10 million of windows personal computer that cause computer shutdown and deletion of files on the year 2000. Created by Filipino students Onel De Guzman and Reonel Ramones
  • 30. 6. Computer Bug • A malfunction of computer system through its runtime. • The term “bug” originated to the Moth found on the Mark II by Grace Hopper that cause a system malfunction.
  • 31. 7. Cyber Stalking The use of the internet or other electronic device to harass or stalk individual, group of organization.
  • 32. 8. Cyber Bullying The act of tormenting, threatening, harassing, or embarrassing another person using the internet or other technologies.
  • 33. 9. SPAM An unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open it.
  • 34. 10. Spoofing Describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information
  • 35. s time and bandwi dth • Make yoursel f look good • Share expert knowle dge • Help keep flame Ten Core Roles of Netiquette
  • 36. In these new world of communicatingconcern and connecting with other people, one’s safety in the online environment is everybody’s concern and accountability. The government itself enacted laws and regulations to protect the welfare of every online user from possible harm and danger.
  • 37. • Republic act 10627 or anti-bullying act of 2013 this law includes protection of individuals through electronic means. bullying invades an individual’s privacy by using photos and other information meant to disgrace that individual.
  • 38. 2. Republic Act 10175 or Cybercrime Prevention Act of 2012 This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity.
  • 39.
  • 40. Here are the things you might want to consider before posting something over the internet.
  • 41.
  • 42. a. Would you want your parents or grandparents to see it? b. Would you want your future boss to see it? c. Once you ,post something on the web, you have no control of whos sees your post.
  • 43. Set your post to “private”. In this way, search engines will not be able to scan the post.
  • 44. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
  • 45. Avoid using names. Names are easy for search engines to scan.
  • 46. If you feel that a post can affect you and other’s reputation, ask the one who posted it to pull it down or report it as appropriate.
  • 47. One word that retain in your mind? How do you explain it?