3. Learning
Objectives
At the end of the
lesson, you should
be able to do the
following:
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 3
● Define the cyber world and its
features.
● Identify and examine different
online threats and dangers.
● Practice various ways to be safe
in the cyber world.
5. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
What is a password?
● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
5
6. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1. Study the passwords in the succeeding slides.
2. Classify each password as either a weak password or a
strong password.
3. Write your answer in the table.
Classifying the Password
6
9. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1.Among all the words included in the activity,
which password(s) was the hardest to classify?
Which was the easiest?
Classifying the Password
9
28. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
28
1. Think before you click.
2. Do not share personal
information.
3. Beware of phishing and
scam.
29. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
29
4. Keep your device secure.
5. Never share passwords.
6. Never agree to meet anyone
you just met online.
30. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
30
7. Tell your guardian if
something goes wrong online.
8. Cover your webcam when not
in used.
9. Use a strong password.
10.Make sure to logout your
account in public devices.
31. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Practice 1
Listed on the next slide are
different dangers and threats on
the Internet. Classify the
following items as: unsuitable
content, crime-related, privacy-
related, or malicious software-
related.
31
36. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
● A stranger added you on Facebook. He claimed that you are schoolmates. Upon checking his profile,
you saw that you knew that person and that he was a year older than you. He then asked to meet you
and added that you should wear a pretty short dress when the two of you meet.
● Your bank emailed you to reset your password as soon as possible because there was a breach in
their system. The email seemed legit but the link was shortened and the email address was not the
name of your bank.
● You got blocked from your bank account. As you talked to the customer support to unblock your
account, the person on the other line asked for your name, account number, and pin to be able to
unblock you on their system.
● One of your classmates was spreading rumors that you had a bad attitude and that you called her a
liar in front of her friends. She even edited your awkward photo to become funny and shared it on
Facebook. People started calling you funny names in school and online since she posted the photo.
● An advertisement just popped up on your browser saying that you won a flat screen TV, and you just
need to confirm your identity on the link provided to claim the prize.
36
38. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
1. What is the cyber
world?
2. What are the main
features of the cyber
world and how can we
use these features?
38
39. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
Give three (3) dangers on
the Internet and explain
how each one can harm
you.
39
40. ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
comprehensively:
How useful is the Internet
in your daily life? Does it
always benefit you?
40
41. Wrap Up
The cyber world allows us to navigate through a
virtual world, interact with other people through
the use of the internet, and retrieve data from the
vast information available online.
The Internet is very powerful but along with these
advancements, we can encounter risks such as
exposure to unsuitable content, crime-related
dangers, privacy-related dangers, and
malicious software.
41
42. Wrap Up
Being a generation of technology-dependent
human beings, we need to be more careful on
the internet to avoid risks. We protect ourselves
by simply creating strong passwords, and by
avoiding sharing personal information with
others, especially with strangers.
42
43. Bibliography
43
“About the Cyber World.” ICT Connection. https://ictconnection.moe.edu.sg/cyber-
wellness/cyber-wellness-101/about-the-cyber-world (accessed February 21,
2020).
Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?”
Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen
College, 16 May 2018. https://www.rasmussen.edu/student-experience/college-
life/what-is-digital-footprint/
“Guidelines for Strong Passwords.” Information Technology Services Guidelines for
Strong Passwords Comments.
https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21,
2020).
“How to Stay Safe Online.” Bullying UK. https://www.bullying.co.uk/cyberbullying/how-
to-stay-safe-online/ (accessed February 22, 2020).
44. Bibliography
44
Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads.
Goodreads. Accessed February 22, 2020.
https://www.goodreads.com/work/quotes/45331179-you-are-what-you-tweet-
harness-the-power-of-twitter-to-create-a-happier
Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of
Cyberspace and Analysis of Cyber Educational Institutions”. Accessed February
21, 2020.
https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71ef07
6.pdf
Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity Magazine,
3 Aug. 2018. https://www.uscybersecurity.net/malware/
“Staying Safe Online.” Childline. Accessed February 22, 2020.
https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-mobile-
safety/staying-safe-online/
Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21, 2020.
https://wiki.uiowa.edu/display/edtech/Internet+Dangers
45. Bibliography
45
“What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020.
https://www.cisco.com/c/en/us/products/security/advanced-malware-
protection/what-is-malware.html#~related-topics
Editor's Notes
Ano ang mga posibleng paraan na maiisip mo para protektahan ang iyong sarili mula sa iba't ibang banta sa online?
note to teacher:
Social networking sites such as Facebook, Twitter, and Instagram are examples of cyberspace where people can connect and communicate with each other, regardless of their physical location.
Cyberspace is where online communication happens. If you've spent time chatting with friends on the Internet, you've been in cyberspace.
Ang cyberspace ay kung saan nangyayari ang online na komunikasyon. Kung gumugol ka ng oras sa pakikipag-chat sa mga kaibigan sa Internet, ikaw ay nasa cyberspace.
A virtual self is a computer based replica of a person's self which is the form, platform or profile used to explore the virtual world independently.
data na available sa kahit sino basta may internet connection sila
A blog is very similar to a website, where one can find content regarding any topic in a written/text format, along with images, gifs, etc. A vlog, on the other hand, consists of video content published on any topic. There are various blogging and vlogging platforms out there that support both paid and free domains.
Lure – mang aakit
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
Sample answers:
1. The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other.
2. The main features of the Cyber World are virtual world, interaction, and information source. We can use the virtual world as a “second life space” where we can make a digital representation of ourselves. The interaction feature on the other hand lets us have social interactions such as chatting, sharing ideas on an online community, teaming up with players on an online-game, or finding people with similar interests. Lastly, the cyber world contains a lot of information that is readily available for us making it a major information source.
Students answer may vary.
Answers may vary but you may expect them to apply examples from the discussed lesson.