EMPOWERMENT
TECHNOLOGIES
Guess the word
privacy
Guess the word
HACKER
Guess the word
VIRUS
Guess the word
SECURITY
Online safety, Security
ETHICS, & etiquette
Lesson Objectives
2. Apply internet online
safety, security ethics and
etiquette standards and
practice in the use of ICTs.
1. Identify what constitutes
appropriate and
inappropriate online
behaviors.
At the end of the lesson, the
student must be able to:
are you safe
and secured
online?
INTERNET
• is defined as the information
superhighway.
information at
risk
information at
risk
• Complete Name
• Parents’ or Guardian’s Name
• Siblings’ Name
• Complete Address
• Home and Cellphone Number
• Birthday
• Email Address
• Current and Previous Schools
What are the possible ways
that you can think of to protect
yourself from different online
threats?
PASSWORD
PASSWORD
• a combination of texts,
numbers, and/or special
characters to secure accounts.
• can be weak (e.g. names,
common words, birthdates, etc.)
or strong (combination of all
characters)
vince15
password_1
09_09_2001
67a12b90c_me
Juandelacruz1994
helloWorld123
l!v3_l@ugh_l0v3
alp@c@Pet2020
Moonlover22
18_funnygirl_18
_paramore_for3ver_
12345678ABC
StrongPassword
Hola_amigo!
Beautiful
G!v3_m3_Sunsh!n3
Els@+AnN@_uWu
erica_sanchez
9876_ABCDEFG
alwaysSmile
tips to stay safe
online
Be mindful of what you share online
and what site you share it to.
Do not just accept terms and
conditions; read it.
Do not share your password with
anyone.
Do not talk to strangers whether
online or face-to-face.
Never post anything about a future
vacation.
Add friends you know in real life.
Avoid visiting untrusted websites.
Do not reply or click links from
suspicious emails.
Make Online Purchases from Secure
Sites.
DANGERS AND
THREATS ON THE
INTERNET
HACKING
• stealing and
accessing private
information of
organizations such as
government systems,
business systems, etc.
IDENTITY THEFT
• the act of stealing
important
information from the
target user by
accessing online
accounts such as
bank accounts, etc.
INTERNET PREDATORS
• individuals who lure
children or teenagers
to engage in sexual
acts or relationships
online
CYBERBULLYING
• an online act of
humiliation and/or
threats that is done
with and by children
and teenagers
MALICIOUS MALWARE
• also known as
malware, is created to
invade and destroy
computer systems
TYPES OF MALWARE
TYPES OF MALWARE
• Virus
• Worm
• Trojan
• Spyware
• Adware
VIRUS
• a malicious program
designed to replicate itself
and transfer from one
computer to another
(internet, local networks,
FDs, CDs, etc.)
worm
• a malicious program that
transfers from one computer
to another by any type of
means. Often, it uses a
computer network to spread
itself.
trojan
• a malicious program that
disguise as a useful program
but once downloaded or
installed, leaves your PC
unprotected and allows
hackers to get your
information.
spyware
• a program that runs in the background without knowing it
(thus called “spy”). It has the ability to monitor what you
are currently doing or typing through keylogging.
*keyloggers
• used to record the keystroke done by the users.
This is done to steal their password or any
other sensitive information.
adware
• a program designed to send
you advertisements, mostly
as pop-ups.
spam
• unwanted email mostly
from bots or advertisers. It
can be used to send
malware.
PHISHING
• its goal is to acquire sensitive personal
information like passwords and credit card
details.
*pharming
• It is more complicated way of
phishing where it exploits the DNS
(Domain Name Service) system.
 protecting reputations online
 THINK BEFORE YOU CLICK
 copyright infringement
 SOME TIPS TO AVOID COPYRIGHT INFRINGEMENT
 UNDERSTAND
 BE RESPONSIBLE
 BE CREATIVE
 KNOW THE LAW
 ONLINE RESEARCH
skit performance rubric
GROUP 1
A stranger added you on Facebook. He claimed
that you are schoolmates. Upon checking his
profile, you saw that you knew that person and
that he was a year older than you. He then
asked to meet you and added that you should
wear a pretty short dress when the two of you
meet.
GROUP 2
Your bank emailed you to reset your password
as soon as possible because there was a
breach in their system. The email seemed legit
but the link was shortened and the email
address was not the name of your bank.
GROUP 3
You got blocked from your bank account. As you
talked to the customer support to unblock your
account, the person on the other line asked for
your name, account number, and pin to be able
to unblock you on their system.
GROUP 4
One of your classmates was spreading rumors
that you had a bad attitude and that you called
her a liar in front of her friends. She even edited
your awkward photo to become funny and
shared it on Facebook. People started calling
you funny names in school and online since she
posted the photo.
GROUP 5
An advertisement just popped up on your
browser saying that you won a flat screen TV,
and you just need to confirm your identity on the
link provided to claim the prize.
CYBER WORLD
CYBER WORLD
- also known as
Cyberspace, is virtual in
nature and unbounded
unlike our physical
environment.
Features of CYBER
WORLD
virtual self
• a digital
representation of
humans to interact in
virtual world.
source of
information
• data that are available
to anyone as long as
they have an internet
connection.
social interaction
• digital socialization
using chat, blogs,
vlogs, online games,
etc.
social interaction
• digital socialization
using chat, blogs,
vlogs, online games,
etc.
TOOLS FOR SOCIAL
INTERACTION
• Facebook
• Twitter
• Tumblr
• Instagram
• Online games (MLBB,
COD, PUBG, etc.)
About the dangers and threats
you may encounter in
cyberspace, can you think of
any ways to avoid these
threats?
STAY
refers to the ability to recognize,
comprehend, analyze, develop, convey,
and compute using printed and written
materials related to various contexts.

Empowerment Technologies Classroom Observation