Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Emp tech las-week-2
1. E
There are also common threats to personal safety:
Malware. Short for “malicious software,” malware comes in several forms and can
cause serious damage to a computer or corporate network. There are various forms of
malware ranging from viruses and worms to Trojans and beyond. Malware is often seen
as a catch-all term that refers to any software designed to cause damage to a computer,
server, or network.
Cyberbullying. Is bullying that takes place over digital devices like cell phones,
computers, and tablets. It can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. It
includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else like sharing personal or private information causing embarrassment or
humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior
(What Is Cyberbullying 2020).
ACTIVITY 3.
Directions: Answer the following questions.
1. How would you feel if someone posted something embarrassing about you?
What would you do?
7
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety and security risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
Netiquette is a combination of the words network and etiquette and is defined as a
set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable
use of online resources in an online social environment.
Online etiquette is the correct or acceptable way of communicating or behaving on
the Internet, for internet security there are 3 important components in terms of Internet
Security and Cyber-Security; Integrity means protection from unauthorized modification,
Availability means protection from flow of information & Confidentiality means protection
from unauthorized access
Most of us use the internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much information
you have shared so far. Put (√) mark under Shared or Not Shared.
How Safe are you?
Information Shared Not Shared
First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday
2
2. Week # 2 Inclusive Dates: ____________ Quarter: 1 Score: _______
Performance Standard:
The learners should be able to independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks
Most Essential Learning Competencies:
apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.
2. Illustrate at least one internet threat and discuss how will you avoid it.
(Please use separate sheet of paper for your output if needed)
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
Rubrics: Attractiveness = 30 Content = 30 Organization = 15 Grammar = 15 Originality = 10
1
8
Division of Nueva Ecija
NEHS – Senior High School
Quezon District, Cabanatuan City
Empowerment Technologies
Creative & Critical Thinking Activities
Name: ____________________________________________
Grade & Section: ___________________________________
Parent / Guardian Name & Signature: __________________
Teacher: __________________________________________
3. Email Spoofing - is the creation of emails with a forged sender address. The goal of email
spoofing is to get recipients to open, respond and engage with the email message. Email
spoofing can greatly increase the effectiveness of phishing and other email-based cyber-
attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is
usually used by spammers to hide the origin of the spam.
Phishing – is a deceitful practice of getting your personal information using email or text
messages. Scammers may try to steal your passwords, account numbers, or Social Security
numbers. If they get that information, they could gain access to your email, bank, or other
accounts (Federal Tr. Comm. ’19)
Pharming - is a scamming practice in which malicious code is installed on a personal
computer or server, misdirecting users to fraudulent Web sites without their knowledge or
consent. This happened when the code sent in an e-mail modifies local host files on a
personal computer. A computer with a compromised host file will go to the fake Web site
even if a user types in the correct Internet address or clicks on an affected bookmark entry
(Rouse, Pharming n.d.).
Computer Viruses - are small programs or scripts that can negatively affect the health of
your computer. These malicious little programs can create files, move files, erase files,
consume your computer's memory, and cause your computer not to function correctly.
Some viruses can duplicate themselves, attach themselves to programs, and travel across
networks. In fact, opening an infected e-mail attachment is the most common way to get a
virus (Christensson, Virus Definition 2011).
Spyware – a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through keylogging. Hacker - a clever or
expert programmer who can gain unauthorized access to other computers. He can "hack"
his way through the security levels of a computer system or network (Christensson, Hacker
Definition 2006). And can vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one
of the most dangerous places, especially if you do not know what you are doing.
6 3
4. 6. Respect people's privacy one
7. Fact check before reposting
8. Respond to emails promptly in doing this, you can easily check whether the emails you
received are spams, unsolicited messages or crafty stuffs and delete this right away.
9. Update online information don't leave inaccurate information online that will mislead
your friends or your customers if you have an online business.
10. Think before you click.
Tips to Stay Safe Online
The internet is a public place and it is up to you to protect yourself. Here are some tips to
help you stay safe when using Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding password.
13. Never post anything about future vacation.
14. Add friends you know in real life.
15. Avoid visiting untrusted websites.
The following are some of the internet threats you need to be aware of:
Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an
unknown source with identical message sent to multiple recipients. Usually not
dangerous but can be time and space consuming. Dangerous ones can carry viruses
and other malicious software or malware.
Activity 2. Privacy Policies
Directions: Visit a social networking site and look for the site’s privacy policy. The link is
typically found at the bottom of the page and sometimes labelled only “Privacy”. Write a
summary on how the website handles both your private and public information. (20 points)
Rubrics: Content = 10 Organization = 6 Grammar = 4
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
10 Basic Rules of Netiquette
The rules of etiquette are just as important in cyberspace as they are in the real world
(Hartney, 2020)
1. Make real people a priority.
2. Use respectful language avoid name-calling, cursing, expressing deliberately offensive
opinions.
3. Share with discretion avoid sending naked sexy pictures, drunk pictures, drug use pictures or
unedited home video
4. Don't exclude others don’t let others feel that they are the one you are talking to in your
obscure comment to your Facebook status, Forum or Instagram story.
5. Choose friends wisely. 4 5