SlideShare a Scribd company logo
1 of 65
Review:
_ _ _ _ _ _ _
_ _ _ _ _ _
_ _ _ _ _
_ _ _ _ _ _ _ _
Online Safety, Security,
Ethics and Etiquette
First Name Last Name Middle Name
Address Mothers Name Fathers Name
Name of your Siblings cellphone number
Birthday Home Phone number
Types of Information
1.First name
-There is a risk sharing your first name.
-Hacker may already know plenty of stuff about
you
2. Last name
-If sharing your first is a small risk, having both
your
first and last name is more risky.
-Matching a name with a face is a modus to
Types of Information
3. Middle name
-It’s not the most risky of these shared information.
4. Current and previous schools
-Most people who steal identities study their subject. They can use this
information for verification purposes.
5. Your cellphone number
-It should never be posted over the Internet.
6. The name of your mother and father
-Risky, yet not as risky as posting their full names, especially your
mother’s maiden name.
Types of Information
7. The name of your siblings
-Disclosing this is a huge risk.
8. Your address
-Giving them your address will be much easier for
criminals to find you.
9. Your home phone number
-This shared information is more risky.
-Scams usually use this information to deceive
you,.
Types of Information
10. Your birthday
-Letting people know your birthday is probably a
must if you want to get as many gifts as possible
Add some text to the title slide
1. Be mindful of what you share online and what site you
share it to.
2. Do not just accept terms and
conditions; read it.
3. Know the security features of
the social networking site
you use. By keeping your
profile private, search
engines will not be able to
scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or
private) mode will NOT protect you from hackers.
Add some text to the title slide
8. Add friends you
know in real life.
10. Install and update an antivirus software on your computer. Use only one anti-
virus software to avoid conflicts.
10. If you have Wi-Fi at home, make it private
network by adding a password.
15. Make online purchases from secure sites
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx

More Related Content

Similar to lesson 2 online Safety Security eth.pptx

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptxPaulineMae5
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxTCPSM
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdfArise Roby
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETcpsoncanals
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 

Similar to lesson 2 online Safety Security eth.pptx (20)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Users guide
Users guideUsers guide
Users guide
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
AMMU
AMMUAMMU
AMMU
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
LESSON 2.1.pptx
LESSON 2.1.pptxLESSON 2.1.pptx
LESSON 2.1.pptx
 
Rules of Netiquette.pptx
Rules of Netiquette.pptxRules of Netiquette.pptx
Rules of Netiquette.pptx
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

lesson 2 online Safety Security eth.pptx

  • 2.
  • 3. _ _ _ _ _ _ _
  • 4. _ _ _ _ _ _
  • 5. _ _ _ _ _
  • 6. _ _ _ _ _ _ _ _
  • 8.
  • 9.
  • 10.
  • 11. First Name Last Name Middle Name Address Mothers Name Fathers Name Name of your Siblings cellphone number Birthday Home Phone number
  • 12.
  • 13.
  • 14. Types of Information 1.First name -There is a risk sharing your first name. -Hacker may already know plenty of stuff about you 2. Last name -If sharing your first is a small risk, having both your first and last name is more risky. -Matching a name with a face is a modus to
  • 15. Types of Information 3. Middle name -It’s not the most risky of these shared information. 4. Current and previous schools -Most people who steal identities study their subject. They can use this information for verification purposes. 5. Your cellphone number -It should never be posted over the Internet. 6. The name of your mother and father -Risky, yet not as risky as posting their full names, especially your mother’s maiden name.
  • 16. Types of Information 7. The name of your siblings -Disclosing this is a huge risk. 8. Your address -Giving them your address will be much easier for criminals to find you. 9. Your home phone number -This shared information is more risky. -Scams usually use this information to deceive you,.
  • 17. Types of Information 10. Your birthday -Letting people know your birthday is probably a must if you want to get as many gifts as possible
  • 18.
  • 19.
  • 20.
  • 21. Add some text to the title slide 1. Be mindful of what you share online and what site you share it to.
  • 22. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  • 23. 4. Do not share your password with anyone.
  • 24.
  • 25.
  • 26. 5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers. Add some text to the title slide
  • 27.
  • 28.
  • 29.
  • 30. 8. Add friends you know in real life.
  • 31.
  • 32.
  • 33.
  • 34. 10. Install and update an antivirus software on your computer. Use only one anti- virus software to avoid conflicts.
  • 35.
  • 36. 10. If you have Wi-Fi at home, make it private network by adding a password.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. 15. Make online purchases from secure sites

Editor's Notes

  1. From the previous lesson, we've learned that there are three versions of Web Technologies: Web 1.0, Web 2.0, and Web 3.0. Further, we said that as the world of ICT continues to evolve, the industry has developed several innovations that cater to the needs of the people whether it is for business or personal use. These trends in ICT in today's generation focuses on technological convergence, social media, mobile technologies, and assistive media. The internet has radically changed the way people interact with the world. They have accounts on different online platforms; some have unlimited Internet access, and some are active users of the web. Yet along this opportunity are the new risks or threats that the Internet may bring. Hence, online safety or Internet safety is an emergent concern for children.
  2. Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we share online. Identify which of the following information you have shared online and list down your answers on the separate sheet of paper. How many information you have shared? You probably shared the first two items. If that is the case, try using a search engine like Google then type your first and last name. Did you get links to your profile page? Try switching to image search. Did your pictures appear? If you have a unique name, chances are, it did. Do not feel bad if it did not appear though; in fact, it is probably for your best interest not to have pictures of yourself in a search engine. So how did these things happen? How can search engines locate me? Is there any danger of being found by search engines?
  3. 1. First Name There is still a risk in sharing your first name. Chances are, a hacker already knows plenty of stuff about you even if you only give out your first name. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across. 2. Last Name If sharing your first name is a small risk, having both your first and last is a more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft.
  4. 3. Middle Name Sharing your middle name is probably not the most risky of these shared information, but sharing your entire full name would be. 4. Current and Previous School Most people who steal identities study their subject. They can use this information for verification purposes. 5. Your cellphone number Your cellphone number should never be posted over the Internet. The Internet is a public place. It is the same as posting your number on a billboard. 6. The name of your father and mother Risky yet not as risky as posting their full names, especially your mother’s maiden name. Many websites require your mother’s maiden name as an answer to a secret question whenever you lose your password.
  5. 7. The name of your siblings This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dupe you. 8. Your address Giving the Internet your phone number is one thing, giving them your address is a whole other level. It would be much easier for the criminals to find you. 9. Your home phone number This shared information is riskier than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to be your parents or pretends to be you.
  6. 10. Your Birthday Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having this in your profile makes you vulnerable to identity theft.
  7. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always “other side of the coin”. The internet is one of the most dangerous places especially if you do not know what you are doing with it. But there is no need to worry; it is never that late. Hopefully, by the end of this lesson, you can consider how you go about your use of the Internet.
  8. The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using the internet.
  9. It is similar to posting, “Rob my house at this date.”