SlideShare a Scribd company logo
1 of 4
Download to read offline
E
There are also common threats to personal safety:
Malware. Short for “malicious software,” malware comes in several forms and can
cause serious damage to a computer or corporate network. There are various forms of
malware ranging from viruses and worms to Trojans and beyond. Malware is often seen
as a catch-all term that refers to any software designed to cause damage to a computer,
server, or network.
Cyberbullying. Is bullying that takes place over digital devices like cell phones,
computers, and tablets. It can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. It
includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else like sharing personal or private information causing embarrassment or
humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior
(What Is Cyberbullying 2020).
ACTIVITY 3.
Directions: Answer the following questions.
1. How would you feel if someone posted something embarrassing about you?
What would you do?
7
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety and security risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
Netiquette is a combination of the words network and etiquette and is defined as a
set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable
use of online resources in an online social environment.
Online etiquette is the correct or acceptable way of communicating or behaving on
the Internet, for internet security there are 3 important components in terms of Internet
Security and Cyber-Security; Integrity means protection from unauthorized modification,
Availability means protection from flow of information & Confidentiality means protection
from unauthorized access
Most of us use the internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much information
you have shared so far. Put (√) mark under Shared or Not Shared.
How Safe are you?
Information Shared Not Shared
First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday
2
Week # 2 Inclusive Dates: ____________ Quarter: 1 Score: _______
Performance Standard:
The learners should be able to independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks
Most Essential Learning Competencies:
apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
Learning Targets:
1. Consider one’s and others’ safety when sharing information using the Internet;
2. Consider one’s and others’ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.
2. Illustrate at least one internet threat and discuss how will you avoid it.
(Please use separate sheet of paper for your output if needed)
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
Rubrics: Attractiveness = 30 Content = 30 Organization = 15 Grammar = 15 Originality = 10
1
8
Division of Nueva Ecija
NEHS – Senior High School
Quezon District, Cabanatuan City
Empowerment Technologies
Creative & Critical Thinking Activities
Name: ____________________________________________
Grade & Section: ___________________________________
Parent / Guardian Name & Signature: __________________
Teacher: __________________________________________
Email Spoofing - is the creation of emails with a forged sender address. The goal of email
spoofing is to get recipients to open, respond and engage with the email message. Email
spoofing can greatly increase the effectiveness of phishing and other email-based cyber-
attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is
usually used by spammers to hide the origin of the spam.
Phishing – is a deceitful practice of getting your personal information using email or text
messages. Scammers may try to steal your passwords, account numbers, or Social Security
numbers. If they get that information, they could gain access to your email, bank, or other
accounts (Federal Tr. Comm. ’19)
Pharming - is a scamming practice in which malicious code is installed on a personal
computer or server, misdirecting users to fraudulent Web sites without their knowledge or
consent. This happened when the code sent in an e-mail modifies local host files on a
personal computer. A computer with a compromised host file will go to the fake Web site
even if a user types in the correct Internet address or clicks on an affected bookmark entry
(Rouse, Pharming n.d.).
Computer Viruses - are small programs or scripts that can negatively affect the health of
your computer. These malicious little programs can create files, move files, erase files,
consume your computer's memory, and cause your computer not to function correctly.
Some viruses can duplicate themselves, attach themselves to programs, and travel across
networks. In fact, opening an infected e-mail attachment is the most common way to get a
virus (Christensson, Virus Definition 2011).
Spyware – a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through keylogging. Hacker - a clever or
expert programmer who can gain unauthorized access to other computers. He can "hack"
his way through the security levels of a computer system or network (Christensson, Hacker
Definition 2006). And can vandalizes the victims’ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one
of the most dangerous places, especially if you do not know what you are doing.
6 3
6. Respect people's privacy one
7. Fact check before reposting
8. Respond to emails promptly in doing this, you can easily check whether the emails you
received are spams, unsolicited messages or crafty stuffs and delete this right away.
9. Update online information don't leave inaccurate information online that will mislead
your friends or your customers if you have an online business.
10. Think before you click.
Tips to Stay Safe Online
The internet is a public place and it is up to you to protect yourself. Here are some tips to
help you stay safe when using Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding password.
13. Never post anything about future vacation.
14. Add friends you know in real life.
15. Avoid visiting untrusted websites.
The following are some of the internet threats you need to be aware of:
Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an
unknown source with identical message sent to multiple recipients. Usually not
dangerous but can be time and space consuming. Dangerous ones can carry viruses
and other malicious software or malware.
Activity 2. Privacy Policies
Directions: Visit a social networking site and look for the site’s privacy policy. The link is
typically found at the bottom of the page and sometimes labelled only “Privacy”. Write a
summary on how the website handles both your private and public information. (20 points)
Rubrics: Content = 10 Organization = 6 Grammar = 4
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
10 Basic Rules of Netiquette
The rules of etiquette are just as important in cyberspace as they are in the real world
(Hartney, 2020)
1. Make real people a priority.
2. Use respectful language avoid name-calling, cursing, expressing deliberately offensive
opinions.
3. Share with discretion avoid sending naked sexy pictures, drunk pictures, drug use pictures or
unedited home video
4. Don't exclude others don’t let others feel that they are the one you are talking to in your
obscure comment to your Facebook status, Forum or Instagram story.
5. Choose friends wisely. 4 5

More Related Content

What's hot

Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
At Your Expense
At Your ExpenseAt Your Expense
At Your ExpenseDan Oblak
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 

What's hot (20)

Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 

Similar to Emp tech las-week-2

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 

Similar to Emp tech las-week-2 (20)

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 

Recently uploaded

Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Avanish Goel
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130Suhani Kapoor
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 

Emp tech las-week-2

  • 1. E There are also common threats to personal safety: Malware. Short for “malicious software,” malware comes in several forms and can cause serious damage to a computer or corporate network. There are various forms of malware ranging from viruses and worms to Trojans and beyond. Malware is often seen as a catch-all term that refers to any software designed to cause damage to a computer, server, or network. Cyberbullying. Is bullying that takes place over digital devices like cell phones, computers, and tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else like sharing personal or private information causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior (What Is Cyberbullying 2020). ACTIVITY 3. Directions: Answer the following questions. 1. How would you feel if someone posted something embarrassing about you? What would you do? 7 Internet safety, or online safety, is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment. Online etiquette is the correct or acceptable way of communicating or behaving on the Internet, for internet security there are 3 important components in terms of Internet Security and Cyber-Security; Integrity means protection from unauthorized modification, Availability means protection from flow of information & Confidentiality means protection from unauthorized access Most of us use the internet every day. Sometimes, we do not pay attention on how much information we share online. Below is a questionnaire about how much information you have shared so far. Put (√) mark under Shared or Not Shared. How Safe are you? Information Shared Not Shared First Name Last Name Middle Name Current and previous school(s) Cellphone number Names of your mother and father Names of your siblings Address Home phone number Birthday 2
  • 2. Week # 2 Inclusive Dates: ____________ Quarter: 1 Score: _______ Performance Standard: The learners should be able to independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks Most Essential Learning Competencies: apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Learning Targets: 1. Consider one’s and others’ safety when sharing information using the Internet; 2. Consider one’s and others’ reputation when using the Internet; 3. Determine and avoid the dangers of the Internet; 4. Be responsible in the use of social networking sites; and 5. Browse the Internet efficiently and properly through proper referencing. 2. Illustrate at least one internet threat and discuss how will you avoid it. (Please use separate sheet of paper for your output if needed) _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ Rubrics: Attractiveness = 30 Content = 30 Organization = 15 Grammar = 15 Originality = 10 1 8 Division of Nueva Ecija NEHS – Senior High School Quezon District, Cabanatuan City Empowerment Technologies Creative & Critical Thinking Activities Name: ____________________________________________ Grade & Section: ___________________________________ Parent / Guardian Name & Signature: __________________ Teacher: __________________________________________
  • 3. Email Spoofing - is the creation of emails with a forged sender address. The goal of email spoofing is to get recipients to open, respond and engage with the email message. Email spoofing can greatly increase the effectiveness of phishing and other email-based cyber- attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is usually used by spammers to hide the origin of the spam. Phishing – is a deceitful practice of getting your personal information using email or text messages. Scammers may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts (Federal Tr. Comm. ’19) Pharming - is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. This happened when the code sent in an e-mail modifies local host files on a personal computer. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry (Rouse, Pharming n.d.). Computer Viruses - are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact, opening an infected e-mail attachment is the most common way to get a virus (Christensson, Virus Definition 2011). Spyware – a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. Hacker - a clever or expert programmer who can gain unauthorized access to other computers. He can "hack" his way through the security levels of a computer system or network (Christensson, Hacker Definition 2006). And can vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs credit card fraud. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. 6 3
  • 4. 6. Respect people's privacy one 7. Fact check before reposting 8. Respond to emails promptly in doing this, you can easily check whether the emails you received are spams, unsolicited messages or crafty stuffs and delete this right away. 9. Update online information don't leave inaccurate information online that will mislead your friends or your customers if you have an online business. 10. Think before you click. Tips to Stay Safe Online The internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using Internet. 1. Be mindful of what you share and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website. 4. Know the security features of the social networking site you use. 5. Do not share password with anyone. 6. Avoid logging in to public networks/Wi-Fi. 7. Do not talk to strangers whether online or face-to-face. 8. Never post anything about future vacation. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your computer. 12. If you have a Wi-Fi at home, make it a private network by adding password. 13. Never post anything about future vacation. 14. Add friends you know in real life. 15. Avoid visiting untrusted websites. The following are some of the internet threats you need to be aware of: Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software or malware. Activity 2. Privacy Policies Directions: Visit a social networking site and look for the site’s privacy policy. The link is typically found at the bottom of the page and sometimes labelled only “Privacy”. Write a summary on how the website handles both your private and public information. (20 points) Rubrics: Content = 10 Organization = 6 Grammar = 4 Name of Website: _________________________________________ URL: ______________________________________________________________________ Summary: Name of Website: _________________________________________ URL: ______________________________________________________________________ Summary: 10 Basic Rules of Netiquette The rules of etiquette are just as important in cyberspace as they are in the real world (Hartney, 2020) 1. Make real people a priority. 2. Use respectful language avoid name-calling, cursing, expressing deliberately offensive opinions. 3. Share with discretion avoid sending naked sexy pictures, drunk pictures, drug use pictures or unedited home video 4. Don't exclude others don’t let others feel that they are the one you are talking to in your obscure comment to your Facebook status, Forum or Instagram story. 5. Choose friends wisely. 4 5