SlideShare a Scribd company logo
1 of 45
Empowerment Technologies
Senior High School Applied - Academic
UNIT 2: ONLINE SAFETY AND ETHICS Quipper
LESSON
1
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
What are the
possible ways
that you can
think of to
protect yourself
from different
online threats?
2
Learning
Objectives
At the end of the
lesson, you should
be able to do the
following:
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 3
● Define the cyber world and its
features.
● Identify and examine different
online threats and dangers.
● Practice various ways to be safe
in the cyber world.
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Are you familiar with these images? What do these images
mean?
4
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
What is a password?
● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
5
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1. Study the passwords in the succeeding slides.
2. Classify each password as either a weak password or a
strong password.
3. Write your answer in the table.
Classifying the Password
6
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Classifying the Password
7
Weak Password Strong Password
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Classifying the Password
8
vince15 alp@c@Pet2020 password_1
_paramore_for3ver_
StrongPassword 12345678ABC juandelacruz1994
Hola_amigo!
Beautiful G!v3_m3_Sunsh!n3 helloWorld123 Els@+AnN@_uWu
09_09_2001 erica_sanchez 67a12b90c_me
l!v3_l@ugh_l0v3
moonlover22 18_funnygirl_18 alwaysSmile
9876_ABCDEFG
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1.Among all the words included in the activity,
which password(s) was the hardest to classify?
Which was the easiest?
Classifying the Password
9
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1.What suggestions can you give to protect
online accounts aside from creating a strong
password?
Classifying the Password
10
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
1.x
2.What would be the effect of not having strong
security and password for your online
accounts?
Classifying the Password
11
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
What is the Cyber
World?
12
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
The Cyber World,
also known as
Cyberspace, is
virtual in nature
and unbounded
unlike our physical
environment.
13
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
What are the
features of the
Cyber World?
14
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Virtual Self
● a digital representation of
humans to interact in
virtual world
15
15
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Source of
Information
● data that are
available to
anyone as long
as they have
an internet
connection
16
16
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Social
Interaction
● digital
socialization
using chat,
blogs, vlogs,
online games,
etc.
17
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tools for Social
Interaction
● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends,
COL, etc.)
18
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Dangers and
Threats on the
Internet
19
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Hacking
● stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
20
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Identity Theft
● the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
21
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Internet
Predators
● individuals who
lure children or
teenagers to
engage in
sexual acts or
relationships
online
22
22
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Cyberbullying
● an online act of
humiliation
and/or threats
that is done
with and by
children and
teenagers
23
23
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Malicious Software
● also known as malware,
is created to invade and
destroy computer
systems
24
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Types of
Malware
● virus
● worms
● trojan
● spyware
● adware
● ransomware
● fileless
malware
25
26
About the dangers and threats you
may encounter in cyberspace, can
you think of any ways to avoid these
threats?
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Stay Safe Online
How can you safeguard your virtual identity?
27
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
28
1. Think before you click.
2. Do not share personal
information.
3. Beware of phishing and
scam.
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
29
4. Keep your device secure.
5. Never share passwords.
6. Never agree to meet anyone
you just met online.
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
30
7. Tell your guardian if
something goes wrong online.
8. Cover your webcam when not
in used.
9. Use a strong password.
10.Make sure to logout your
account in public devices.
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Practice 1
Listed on the next slide are
different dangers and threats on
the Internet. Classify the
following items as: unsuitable
content, crime-related, privacy-
related, or malicious software-
related.
31
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 32
● gender
discrimination
● hate speech
● trojan horse
● DNSMessenger
● Computer worm
● computer virus
● pornography
● violence on
games
● adware
● unauthorized
access to private
files
● phishing
● distribution of
private photos
● spyware
● identity theft
● ransomware
● unauthorized
location tracking
● pedophiles
● hackers
● adware
● racism
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 33
Unsuitable
Content
Crime-Related
Privacy-
Related
Malicious
Software-
Related
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 34
Unsuitable Content Crime-Related Privacy- Related Malicious Software-Related
● gender
discrimination
● hate speech
● trojan horse
● DNSMessenger
● Computer worm
● computer virus
● pornography
● violence on
games
● adware
● unauthorized
access to private
files
● phishing
● distribution of
private photos
● spyware
● identity theft
● ransomware
● unauthorized
location tracking
● pedophiles
● hackers
● adware
● racism
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Practice 2
Study the situations on the
next slide. Choose two (2)
situations and describe
what you would do in each
in order to be safe.
35
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
● A stranger added you on Facebook. He claimed that you are schoolmates. Upon checking his profile,
you saw that you knew that person and that he was a year older than you. He then asked to meet you
and added that you should wear a pretty short dress when the two of you meet.
● Your bank emailed you to reset your password as soon as possible because there was a breach in
their system. The email seemed legit but the link was shortened and the email address was not the
name of your bank.
● You got blocked from your bank account. As you talked to the customer support to unblock your
account, the person on the other line asked for your name, account number, and pin to be able to
unblock you on their system.
● One of your classmates was spreading rumors that you had a bad attitude and that you called her a
liar in front of her friends. She even edited your awkward photo to become funny and shared it on
Facebook. People started calling you funny names in school and online since she posted the photo.
● An advertisement just popped up on your browser saying that you won a flat screen TV, and you just
need to confirm your identity on the link provided to claim the prize.
36
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT 37
Situation Your Response
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
1. What is the cyber
world?
2. What are the main
features of the cyber
world and how can we
use these features?
38
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
Give three (3) dangers on
the Internet and explain
how each one can harm
you.
39
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
ENGAG EXPLOR
EXPLAIN EXTEND
EVALUAT
Answer the following
comprehensively:
How useful is the Internet
in your daily life? Does it
always benefit you?
40
Wrap Up
The cyber world allows us to navigate through a
virtual world, interact with other people through
the use of the internet, and retrieve data from the
vast information available online.
The Internet is very powerful but along with these
advancements, we can encounter risks such as
exposure to unsuitable content, crime-related
dangers, privacy-related dangers, and
malicious software.
41
Wrap Up
Being a generation of technology-dependent
human beings, we need to be more careful on
the internet to avoid risks. We protect ourselves
by simply creating strong passwords, and by
avoiding sharing personal information with
others, especially with strangers.
42
Bibliography
43
“About the Cyber World.” ICT Connection. https://ictconnection.moe.edu.sg/cyber-
wellness/cyber-wellness-101/about-the-cyber-world (accessed February 21,
2020).
Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?”
Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen
College, 16 May 2018. https://www.rasmussen.edu/student-experience/college-
life/what-is-digital-footprint/
“Guidelines for Strong Passwords.” Information Technology Services Guidelines for
Strong Passwords Comments.
https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21,
2020).
“How to Stay Safe Online.” Bullying UK. https://www.bullying.co.uk/cyberbullying/how-
to-stay-safe-online/ (accessed February 22, 2020).
Bibliography
44
Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads.
Goodreads. Accessed February 22, 2020.
https://www.goodreads.com/work/quotes/45331179-you-are-what-you-tweet-
harness-the-power-of-twitter-to-create-a-happier
Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of
Cyberspace and Analysis of Cyber Educational Institutions”. Accessed February
21, 2020.
https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71ef07
6.pdf
Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity Magazine,
3 Aug. 2018. https://www.uscybersecurity.net/malware/
“Staying Safe Online.” Childline. Accessed February 22, 2020.
https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-mobile-
safety/staying-safe-online/
Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21, 2020.
https://wiki.uiowa.edu/display/edtech/Internet+Dangers
Bibliography
45
“What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020.
https://www.cisco.com/c/en/us/products/security/advanced-malware-
protection/what-is-malware.html#~related-topics

More Related Content

What's hot

Final filipino11 q3_m10
Final filipino11 q3_m10Final filipino11 q3_m10
Final filipino11 q3_m10Atty Infact
 
Konsepto ng gender at sex
Konsepto ng gender at sexKonsepto ng gender at sex
Konsepto ng gender at sexindaysisilya
 
karahasan sa kababaihan demo lesson plan
karahasan sa kababaihan demo lesson plankarahasan sa kababaihan demo lesson plan
karahasan sa kababaihan demo lesson planCashmir Bermejo
 
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTS
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTSKASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTS
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTSjoril23
 
Argumentative Essay Sample 1000 words
Argumentative Essay Sample 1000 wordsArgumentative Essay Sample 1000 words
Argumentative Essay Sample 1000 wordsRandyAdam11
 
COT- Grade 9 Esp.docx
COT- Grade 9 Esp.docxCOT- Grade 9 Esp.docx
COT- Grade 9 Esp.docxJoanBayangan1
 
2. ISYU SA PAGGAWA.pptx
2. ISYU SA PAGGAWA.pptx2. ISYU SA PAGGAWA.pptx
2. ISYU SA PAGGAWA.pptxRoumellaConos1
 
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptx
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptxKOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptx
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptxlucasmonroe1
 
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptx
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptxcot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptx
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptxfaithdenys
 
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdf
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdfMEDIA AND INFORMATION LITERATE INDIVIDUAL .pdf
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdfMagdaLo1
 
Gender Roles sa Ibat Ibang Lipunan sa Mundo
Gender Roles sa Ibat Ibang  Lipunan sa MundoGender Roles sa Ibat Ibang  Lipunan sa Mundo
Gender Roles sa Ibat Ibang Lipunan sa Mundoedmond84
 
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptx
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptxPagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptx
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptxJanetLatorreTamor
 
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptx
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptxTugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptx
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptxRalphAndrewFelix
 
Week 1-2 Uri ng Teksto Part 1.pptx
Week 1-2 Uri ng Teksto Part 1.pptxWeek 1-2 Uri ng Teksto Part 1.pptx
Week 1-2 Uri ng Teksto Part 1.pptxAntonetteAlbina3
 
Module 3 hamong pangkasarian
Module 3 hamong pangkasarianModule 3 hamong pangkasarian
Module 3 hamong pangkasarianBinibini Cmg
 
tugonsamgaisyu-180101033433.pptx
tugonsamgaisyu-180101033433.pptxtugonsamgaisyu-180101033433.pptx
tugonsamgaisyu-180101033433.pptxJudyAnnAbadilla
 
Activities (Konsepto Ng Kasarian).pptx
Activities (Konsepto Ng Kasarian).pptxActivities (Konsepto Ng Kasarian).pptx
Activities (Konsepto Ng Kasarian).pptxAljonMendoza3
 

What's hot (20)

Final filipino11 q3_m10
Final filipino11 q3_m10Final filipino11 q3_m10
Final filipino11 q3_m10
 
Kom at pan Q2 W6.pptx
Kom at pan Q2 W6.pptxKom at pan Q2 W6.pptx
Kom at pan Q2 W6.pptx
 
Konsepto ng gender at sex
Konsepto ng gender at sexKonsepto ng gender at sex
Konsepto ng gender at sex
 
karahasan sa kababaihan demo lesson plan
karahasan sa kababaihan demo lesson plankarahasan sa kababaihan demo lesson plan
karahasan sa kababaihan demo lesson plan
 
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTS
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTSKASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTS
KASAYSAYAN NG KARAPATANG PANTAO, UDHR, at BILL OF RIGHTS
 
Argumentative Essay Sample 1000 words
Argumentative Essay Sample 1000 wordsArgumentative Essay Sample 1000 words
Argumentative Essay Sample 1000 words
 
COT- Grade 9 Esp.docx
COT- Grade 9 Esp.docxCOT- Grade 9 Esp.docx
COT- Grade 9 Esp.docx
 
2. ISYU SA PAGGAWA.pptx
2. ISYU SA PAGGAWA.pptx2. ISYU SA PAGGAWA.pptx
2. ISYU SA PAGGAWA.pptx
 
Quarter 4 Week 1-2 AP 10.pptx
Quarter 4 Week 1-2 AP 10.pptxQuarter 4 Week 1-2 AP 10.pptx
Quarter 4 Week 1-2 AP 10.pptx
 
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptx
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptxKOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptx
KOMUNIKASYON AT PANANALIKSIK SA WIKA AT KULTURANG PILIPINO.pptx
 
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptx
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptxcot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptx
cot 1-MGA ISYU SA KASARIAN AT LIPUNAN.pptx
 
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdf
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdfMEDIA AND INFORMATION LITERATE INDIVIDUAL .pdf
MEDIA AND INFORMATION LITERATE INDIVIDUAL .pdf
 
Gender Roles sa Ibat Ibang Lipunan sa Mundo
Gender Roles sa Ibat Ibang  Lipunan sa MundoGender Roles sa Ibat Ibang  Lipunan sa Mundo
Gender Roles sa Ibat Ibang Lipunan sa Mundo
 
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptx
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptxPagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptx
Pagtanggap-at-Paggalang-sa-Kasarian-Tungo-sa-Pagkakapantay-pantay.pptx
 
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptx
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptxTugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptx
Tugon-ng-Pamahalaan-at-Mamamayan-sa-mga-Isyu-KASARIAN (2).pptx
 
Week 1-2 Uri ng Teksto Part 1.pptx
Week 1-2 Uri ng Teksto Part 1.pptxWeek 1-2 Uri ng Teksto Part 1.pptx
Week 1-2 Uri ng Teksto Part 1.pptx
 
Module 3 hamong pangkasarian
Module 3 hamong pangkasarianModule 3 hamong pangkasarian
Module 3 hamong pangkasarian
 
tugonsamgaisyu-180101033433.pptx
tugonsamgaisyu-180101033433.pptxtugonsamgaisyu-180101033433.pptx
tugonsamgaisyu-180101033433.pptx
 
2 ap lm tag u1
2 ap lm tag u12 ap lm tag u1
2 ap lm tag u1
 
Activities (Konsepto Ng Kasarian).pptx
Activities (Konsepto Ng Kasarian).pptxActivities (Konsepto Ng Kasarian).pptx
Activities (Konsepto Ng Kasarian).pptx
 

Similar to MAKING ONE SELF SAFE IN THE CYBER WORLD.

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarickjamesjarick
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 

Similar to MAKING ONE SELF SAFE IN THE CYBER WORLD. (20)

Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Users guide
Users guideUsers guide
Users guide
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

More from MaryConcepcion10

EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUR
EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUREMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUR
EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOURMaryConcepcion10
 
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPER
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPEREMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPER
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPERMaryConcepcion10
 
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..MaryConcepcion10
 
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...MaryConcepcion10
 
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPER
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPEREMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPER
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPERMaryConcepcion10
 
Entrepreneurship_PS_Unit3_Lesson3_Final.pptx
Entrepreneurship_PS_Unit3_Lesson3_Final.pptxEntrepreneurship_PS_Unit3_Lesson3_Final.pptx
Entrepreneurship_PS_Unit3_Lesson3_Final.pptxMaryConcepcion10
 
Entrepreneurship_PS_Unit3_Lesson4_Final.pptx
Entrepreneurship_PS_Unit3_Lesson4_Final.pptxEntrepreneurship_PS_Unit3_Lesson4_Final.pptx
Entrepreneurship_PS_Unit3_Lesson4_Final.pptxMaryConcepcion10
 
ENT_PS_Unit5_Lesson2_Final from__Quipper
ENT_PS_Unit5_Lesson2_Final from__QuipperENT_PS_Unit5_Lesson2_Final from__Quipper
ENT_PS_Unit5_Lesson2_Final from__QuipperMaryConcepcion10
 
Entrepreneurship Subject - Unit1_Lesson1_Final
Entrepreneurship Subject -  Unit1_Lesson1_FinalEntrepreneurship Subject -  Unit1_Lesson1_Final
Entrepreneurship Subject - Unit1_Lesson1_FinalMaryConcepcion10
 
GETTING TO KNOW WORD PROCESSING - EMP.TECH
GETTING TO KNOW WORD PROCESSING - EMP.TECHGETTING TO KNOW WORD PROCESSING - EMP.TECH
GETTING TO KNOW WORD PROCESSING - EMP.TECHMaryConcepcion10
 
GOVERNMENT LAWS FOR INTENET USERS - EMP.
GOVERNMENT LAWS FOR INTENET USERS - EMP.GOVERNMENT LAWS FOR INTENET USERS - EMP.
GOVERNMENT LAWS FOR INTENET USERS - EMP.MaryConcepcion10
 
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptx
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptxMIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptx
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptxMaryConcepcion10
 
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptx
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptxMIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptx
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptxMaryConcepcion10
 
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdf
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdfFINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdf
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdfMaryConcepcion10
 
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdf
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdfFINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdf
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdfMaryConcepcion10
 

More from MaryConcepcion10 (15)

EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUR
EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUREMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUR
EMPOWERMENT TECHNOLOGIES UNIT 7 - LESSON FOUR
 
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPER
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPEREMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPER
EMPOWERMENT TECH. UNIT 5 - LESSON 4 FROM QUIPPER
 
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..
UNIT 4: EMPOWERMENT TECHNOLOGIES SUBJECT..
 
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPPER...
 
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPER
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPEREMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPER
EMPOWERMENT TECHNOLOGIES SUBJECT FORM QUIPPER
 
Entrepreneurship_PS_Unit3_Lesson3_Final.pptx
Entrepreneurship_PS_Unit3_Lesson3_Final.pptxEntrepreneurship_PS_Unit3_Lesson3_Final.pptx
Entrepreneurship_PS_Unit3_Lesson3_Final.pptx
 
Entrepreneurship_PS_Unit3_Lesson4_Final.pptx
Entrepreneurship_PS_Unit3_Lesson4_Final.pptxEntrepreneurship_PS_Unit3_Lesson4_Final.pptx
Entrepreneurship_PS_Unit3_Lesson4_Final.pptx
 
ENT_PS_Unit5_Lesson2_Final from__Quipper
ENT_PS_Unit5_Lesson2_Final from__QuipperENT_PS_Unit5_Lesson2_Final from__Quipper
ENT_PS_Unit5_Lesson2_Final from__Quipper
 
Entrepreneurship Subject - Unit1_Lesson1_Final
Entrepreneurship Subject -  Unit1_Lesson1_FinalEntrepreneurship Subject -  Unit1_Lesson1_Final
Entrepreneurship Subject - Unit1_Lesson1_Final
 
GETTING TO KNOW WORD PROCESSING - EMP.TECH
GETTING TO KNOW WORD PROCESSING - EMP.TECHGETTING TO KNOW WORD PROCESSING - EMP.TECH
GETTING TO KNOW WORD PROCESSING - EMP.TECH
 
GOVERNMENT LAWS FOR INTENET USERS - EMP.
GOVERNMENT LAWS FOR INTENET USERS - EMP.GOVERNMENT LAWS FOR INTENET USERS - EMP.
GOVERNMENT LAWS FOR INTENET USERS - EMP.
 
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptx
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptxMIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptx
MIL 11_12 Q3 0101 How Media and Information Affect Communication PS.pptx
 
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptx
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptxMIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptx
MIL 11_12 Q3 0102 What Is Media and Information Literacy PS.pptx
 
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdf
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdfFINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdf
FINAL_Unit 2 - The Evolution of Traditional to New Media, 3 Topics.pdf
 
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdf
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdfFINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdf
FINAL_Unit 1_Introduction to Media and Information Literacy, 3 Topics.pdf
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

MAKING ONE SELF SAFE IN THE CYBER WORLD.

  • 1. Empowerment Technologies Senior High School Applied - Academic UNIT 2: ONLINE SAFETY AND ETHICS Quipper LESSON 1
  • 2. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT What are the possible ways that you can think of to protect yourself from different online threats? 2
  • 3. Learning Objectives At the end of the lesson, you should be able to do the following: ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 3 ● Define the cyber world and its features. ● Identify and examine different online threats and dangers. ● Practice various ways to be safe in the cyber world.
  • 4. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Are you familiar with these images? What do these images mean? 4
  • 5. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT What is a password? ● a combination of texts, numbers, and/or special characters to secure accounts ● can be weak (e.g. names, common words, birthdates, etc.) or strong (combination of all characters) 5
  • 6. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 1. Study the passwords in the succeeding slides. 2. Classify each password as either a weak password or a strong password. 3. Write your answer in the table. Classifying the Password 6
  • 7. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Classifying the Password 7 Weak Password Strong Password
  • 8. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Classifying the Password 8 vince15 alp@c@Pet2020 password_1 _paramore_for3ver_ StrongPassword 12345678ABC juandelacruz1994 Hola_amigo! Beautiful G!v3_m3_Sunsh!n3 helloWorld123 Els@+AnN@_uWu 09_09_2001 erica_sanchez 67a12b90c_me l!v3_l@ugh_l0v3 moonlover22 18_funnygirl_18 alwaysSmile 9876_ABCDEFG
  • 9. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 1.Among all the words included in the activity, which password(s) was the hardest to classify? Which was the easiest? Classifying the Password 9
  • 10. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 1.What suggestions can you give to protect online accounts aside from creating a strong password? Classifying the Password 10
  • 11. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 1.x 2.What would be the effect of not having strong security and password for your online accounts? Classifying the Password 11
  • 13. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT The Cyber World, also known as Cyberspace, is virtual in nature and unbounded unlike our physical environment. 13
  • 14. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT What are the features of the Cyber World? 14
  • 15. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Virtual Self ● a digital representation of humans to interact in virtual world 15 15
  • 16. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Source of Information ● data that are available to anyone as long as they have an internet connection 16 16
  • 17. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Social Interaction ● digital socialization using chat, blogs, vlogs, online games, etc. 17
  • 18. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Tools for Social Interaction ● Facebook ● Twitter ● Tumblr ● Instagram ● Online games (Mobile Legends, COL, etc.) 18
  • 19. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Dangers and Threats on the Internet 19
  • 20. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Hacking ● stealing and accessing private information of organizations such as government systems, business systems, etc. 20
  • 21. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Identity Theft ● the act of stealing important information from the target user by accessing online accounts such as bank accounts, etc. 21
  • 22. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Internet Predators ● individuals who lure children or teenagers to engage in sexual acts or relationships online 22 22
  • 23. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Cyberbullying ● an online act of humiliation and/or threats that is done with and by children and teenagers 23 23
  • 24. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Malicious Software ● also known as malware, is created to invade and destroy computer systems 24
  • 25. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Types of Malware ● virus ● worms ● trojan ● spyware ● adware ● ransomware ● fileless malware 25
  • 26. 26 About the dangers and threats you may encounter in cyberspace, can you think of any ways to avoid these threats?
  • 27. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Stay Safe Online How can you safeguard your virtual identity? 27
  • 28. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 28 1. Think before you click. 2. Do not share personal information. 3. Beware of phishing and scam.
  • 29. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 29 4. Keep your device secure. 5. Never share passwords. 6. Never agree to meet anyone you just met online.
  • 30. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Tips to Stay Safe online 30 7. Tell your guardian if something goes wrong online. 8. Cover your webcam when not in used. 9. Use a strong password. 10.Make sure to logout your account in public devices.
  • 31. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Practice 1 Listed on the next slide are different dangers and threats on the Internet. Classify the following items as: unsuitable content, crime-related, privacy- related, or malicious software- related. 31
  • 32. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 32 ● gender discrimination ● hate speech ● trojan horse ● DNSMessenger ● Computer worm ● computer virus ● pornography ● violence on games ● adware ● unauthorized access to private files ● phishing ● distribution of private photos ● spyware ● identity theft ● ransomware ● unauthorized location tracking ● pedophiles ● hackers ● adware ● racism
  • 33. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 33 Unsuitable Content Crime-Related Privacy- Related Malicious Software- Related
  • 34. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 34 Unsuitable Content Crime-Related Privacy- Related Malicious Software-Related ● gender discrimination ● hate speech ● trojan horse ● DNSMessenger ● Computer worm ● computer virus ● pornography ● violence on games ● adware ● unauthorized access to private files ● phishing ● distribution of private photos ● spyware ● identity theft ● ransomware ● unauthorized location tracking ● pedophiles ● hackers ● adware ● racism
  • 35. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Practice 2 Study the situations on the next slide. Choose two (2) situations and describe what you would do in each in order to be safe. 35
  • 36. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT ● A stranger added you on Facebook. He claimed that you are schoolmates. Upon checking his profile, you saw that you knew that person and that he was a year older than you. He then asked to meet you and added that you should wear a pretty short dress when the two of you meet. ● Your bank emailed you to reset your password as soon as possible because there was a breach in their system. The email seemed legit but the link was shortened and the email address was not the name of your bank. ● You got blocked from your bank account. As you talked to the customer support to unblock your account, the person on the other line asked for your name, account number, and pin to be able to unblock you on their system. ● One of your classmates was spreading rumors that you had a bad attitude and that you called her a liar in front of her friends. She even edited your awkward photo to become funny and shared it on Facebook. People started calling you funny names in school and online since she posted the photo. ● An advertisement just popped up on your browser saying that you won a flat screen TV, and you just need to confirm your identity on the link provided to claim the prize. 36
  • 37. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT 37 Situation Your Response
  • 38. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Answer the following completely in your own words: 1. What is the cyber world? 2. What are the main features of the cyber world and how can we use these features? 38
  • 39. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Answer the following completely in your own words: Give three (3) dangers on the Internet and explain how each one can harm you. 39
  • 40. ENGAG EXPLOR EXPLAIN EXTEND EVALUAT ENGAG EXPLOR EXPLAIN EXTEND EVALUAT Answer the following comprehensively: How useful is the Internet in your daily life? Does it always benefit you? 40
  • 41. Wrap Up The cyber world allows us to navigate through a virtual world, interact with other people through the use of the internet, and retrieve data from the vast information available online. The Internet is very powerful but along with these advancements, we can encounter risks such as exposure to unsuitable content, crime-related dangers, privacy-related dangers, and malicious software. 41
  • 42. Wrap Up Being a generation of technology-dependent human beings, we need to be more careful on the internet to avoid risks. We protect ourselves by simply creating strong passwords, and by avoiding sharing personal information with others, especially with strangers. 42
  • 43. Bibliography 43 “About the Cyber World.” ICT Connection. https://ictconnection.moe.edu.sg/cyber- wellness/cyber-wellness-101/about-the-cyber-world (accessed February 21, 2020). Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?” Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen College, 16 May 2018. https://www.rasmussen.edu/student-experience/college- life/what-is-digital-footprint/ “Guidelines for Strong Passwords.” Information Technology Services Guidelines for Strong Passwords Comments. https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21, 2020). “How to Stay Safe Online.” Bullying UK. https://www.bullying.co.uk/cyberbullying/how- to-stay-safe-online/ (accessed February 22, 2020).
  • 44. Bibliography 44 Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads. Goodreads. Accessed February 22, 2020. https://www.goodreads.com/work/quotes/45331179-you-are-what-you-tweet- harness-the-power-of-twitter-to-create-a-happier Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of Cyberspace and Analysis of Cyber Educational Institutions”. Accessed February 21, 2020. https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71ef07 6.pdf Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity Magazine, 3 Aug. 2018. https://www.uscybersecurity.net/malware/ “Staying Safe Online.” Childline. Accessed February 22, 2020. https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-mobile- safety/staying-safe-online/ Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21, 2020. https://wiki.uiowa.edu/display/edtech/Internet+Dangers
  • 45. Bibliography 45 “What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020. https://www.cisco.com/c/en/us/products/security/advanced-malware- protection/what-is-malware.html#~related-topics

Editor's Notes

  1. Ano ang mga posibleng paraan na maiisip mo para protektahan ang iyong sarili mula sa iba't ibang banta sa online?
  2. note to teacher:
  3. Social networking sites such as Facebook, Twitter, and Instagram are examples of cyberspace where people can connect and communicate with each other, regardless of their physical location. Cyberspace is where online communication happens. If you've spent time chatting with friends on the Internet, you've been in cyberspace. Ang cyberspace ay kung saan nangyayari ang online na komunikasyon. Kung gumugol ka ng oras sa pakikipag-chat sa mga kaibigan sa Internet, ikaw ay nasa cyberspace.
  4. A virtual self is a computer based replica of a person's self which is the form, platform or profile used to explore the virtual world independently.
  5. data na available sa kahit sino basta may internet connection sila
  6. A blog is very similar to a website, where one can find content regarding any topic in a written/text format, along with images, gifs, etc. A vlog, on the other hand, consists of video content published on any topic. There are various blogging and vlogging platforms out there that support both paid and free domains.
  7. Lure – mang aakit
  8. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  9. Sample answers: 1. The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other. 2. The main features of the Cyber World are virtual world, interaction, and information source. We can use the virtual world as a “second life space” where we can make a digital representation of ourselves. The interaction feature on the other hand lets us have social interactions such as chatting, sharing ideas on an online community, teaming up with players on an online-game, or finding people with similar interests. Lastly, the cyber world contains a lot of information that is readily available for us making it a major information source.
  10. Students answer may vary.
  11. Answers may vary but you may expect them to apply examples from the discussed lesson.