ONLINE
SAFETY& MALWARES
Fersie Ann M. Malacas
Marinduque National High School
ONLINE
SAFETYONLINE
SAFETY
©fmalacas2016
ONLINE SAFETY
Web safety, or online safety or Internet Safety is the knowledge of
maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self-
protection from computer crime in general.
As the number of internet users continues to grow worldwide, internet
safety is a growing concern for both children and adults. Common concerns
regarding safety on the internet include: malicious users (spam, phishing,
cyberbullying, cyberstalking etc.), websites and software (malware, computer
viruses, etc.) and various types of obscene or offensive content.
Several crimes can be committed on the Internet such as stalking, identity
theft and more.
©fmalacas2016https://en.wikipedia.org/wiki/Internet_safety
Don’t post any personal information online – like your
address, email address or mobile number.
Think carefully before posting pictures or videos of
yourself. Once you’ve put a picture of yourself online most
people can see it and may be able to download it, it’s not just
yours anymore.
Keep your privacy settings as high as possible.
Never give out your passwords.
Don’t befriend people you don’t know.
Don’t meet up with people you’ve met online. Speak to your
parent or carer about people suggesting you do.
©fmalacas2016http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/
T
I
P
S
ONLINE
SAFETY
Remember that not everyone online is who they say they are.
Think carefully about what you say before you post something
online.
Respect other people’s views, even if you don’t agree with
someone else’s views doesn’t mean you need to be rude.
If you see something online that makes you feel uncomfortable,
unsafe or worried: leave the website, turn off your computer if
you want to and tell a trusted adult immediately.
©fmalacas2016http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/
T
I
P
S
ONLINE
SAFETY
Constantly monitor the students’ online activity.
Install filtering software.
Keep the computer in a place where teachers/ lab technician
can monitor.
Tell students to never give out personal informations.
©fmalacas2016
R
U
L
E
S
PROFESSOR/
LAB
TECHNICIAN
When you are in computer laboratory, observe proper
behavior.
Treat everyone with consideration and respect.
Listen and follow directions.
Chewing gums, foods and drinks are NOT allowed in the
computer laboratory
Respect the equipment. Do NOT connect or disconnect
parts, cables or labels without the administrator’s advice
and assistance.
©fmalacas2016
R
U
L
E
S
COMPUTER
LABORATORY
Internet use is limited to teacher’s assigned activities or
classwork. Using Facebook/Youtube is PROHIBITED.
Do NOT erase or delete any file or software from the
computers.
Do NOT change any of the setting in the computers. This
includes such things as colors, screen savers, backgrounds
and options. Changing these setting can interface with the
normal operation of the computer.
©fmalacas2016
R
U
L
E
S
COMPUTER
LABORATORY
Do NOT download any software from the internet unless
authorized. Loading or installing of any software, programs
and games on the computer is STRICTLY PROHIBITED.
Do NOT insert USB/SD onto the computer.
Once computer is turned on leave it on, it will be turned off
at the end of the day.
Before you leave the lab, please make sure you have done
the following things:
©fmalacas2016
R
U
L
E
S
COMPUTER
LABORATORY
Quit all applications.
Clean area around the computer, that includes
discarding scrap papers and printouts.
Put things back when you are finished with
them, including cover, keyboard, mouse and
chair under the table.
©fmalacas2016
R
U
L
E
S
COMPUTER
LABORATORY
MALWARES
MALWARES
©fmalacas2016
MALWARES
a term for any software that gets installed on your machine and performs
unwanted tasks, often for some third party's benefit
programs can range from being simple annoyances (pop-up advertising) to
causing serious computer invasion and damage (e.g., stealing passwords
and data or infecting other machines on the network)
designed to transmit information about your web-browsing habits to
advertisers or other third party interests without you knowing
©fmalacas2016https://ist.mit.edu/security/malware
MALWARES
TYPES OF MALWARES
©fmalacas2016
TYPES OF MALWARES
TYPES OF MALWARES
VIRUS
Software that can replicate itself and spread to other computers or are
programmed to damage a computer by deleting files, reformatting the hard
disk, or using up computer memory.
There are two types of computer viruses 'parasitic' and 'boot' virus.
A Parasitic virus attaches itself to other programs and is activated
when the host program is executed. It tries to get attached to more
programs so that chances of getting activated is more. It spreads to
other computers when the affected programs are copied. 'Jerusalem'
and 'Datacrime' are parasitic viruses.
©fmalacas2016https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
A Boot virus is designed to enter the boot sector of a floppy disc. It
works by replacing the first sector on the disc with part of itself. It
hides the rest of itself elsewhere on the disc, with a copy of the first
sector. The virus is loaded by the computers built-in start-up
program when the machine is switched on. The virus loads, installs
itself, hides the rest of itself and then loads the original program. On
a hard disc, virus can occupy DOS boot sector or master boot sector.
©fmalacas2016https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
ADWARE
presents unwanted advertisements to the user of a computer
advertisements produced by adware are sometimes in the form of a pop-
up or sometimes in an "unclosable window“
SPYWARE
Software that surreptitiously gathers information and transmits it to
interested parties. Types of information that is gathered includes the
Websites visited, browser and system information, and your computer IP
address.
©fmalacas2016https://en.wikipedia.org/wiki/Adware https://ist.mit.edu/security/malware
BROWSER HIJACKING SOFTWARE
Advertising software that modifies your browser settings (e.g., default
home page, search bars, toolbars), creates desktop shortcuts, and displays
intermittent advertising pop-ups. Once a browser is hijacked, the software
may also redirect links to other sites that advertise, or sites that collect
Web usage information
©fmalacas2016https://ist.mit.edu/security/malware

Online safety and malwares

  • 1.
    ONLINE SAFETY& MALWARES Fersie AnnM. Malacas Marinduque National High School
  • 2.
  • 3.
    Web safety, oronline safety or Internet Safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self- protection from computer crime in general. As the number of internet users continues to grow worldwide, internet safety is a growing concern for both children and adults. Common concerns regarding safety on the internet include: malicious users (spam, phishing, cyberbullying, cyberstalking etc.), websites and software (malware, computer viruses, etc.) and various types of obscene or offensive content. Several crimes can be committed on the Internet such as stalking, identity theft and more. ©fmalacas2016https://en.wikipedia.org/wiki/Internet_safety
  • 4.
    Don’t post anypersonal information online – like your address, email address or mobile number. Think carefully before posting pictures or videos of yourself. Once you’ve put a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore. Keep your privacy settings as high as possible. Never give out your passwords. Don’t befriend people you don’t know. Don’t meet up with people you’ve met online. Speak to your parent or carer about people suggesting you do. ©fmalacas2016http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/ T I P S ONLINE SAFETY
  • 5.
    Remember that noteveryone online is who they say they are. Think carefully about what you say before you post something online. Respect other people’s views, even if you don’t agree with someone else’s views doesn’t mean you need to be rude. If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately. ©fmalacas2016http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/ T I P S ONLINE SAFETY
  • 6.
    Constantly monitor thestudents’ online activity. Install filtering software. Keep the computer in a place where teachers/ lab technician can monitor. Tell students to never give out personal informations. ©fmalacas2016 R U L E S PROFESSOR/ LAB TECHNICIAN
  • 7.
    When you arein computer laboratory, observe proper behavior. Treat everyone with consideration and respect. Listen and follow directions. Chewing gums, foods and drinks are NOT allowed in the computer laboratory Respect the equipment. Do NOT connect or disconnect parts, cables or labels without the administrator’s advice and assistance. ©fmalacas2016 R U L E S COMPUTER LABORATORY
  • 8.
    Internet use islimited to teacher’s assigned activities or classwork. Using Facebook/Youtube is PROHIBITED. Do NOT erase or delete any file or software from the computers. Do NOT change any of the setting in the computers. This includes such things as colors, screen savers, backgrounds and options. Changing these setting can interface with the normal operation of the computer. ©fmalacas2016 R U L E S COMPUTER LABORATORY
  • 9.
    Do NOT downloadany software from the internet unless authorized. Loading or installing of any software, programs and games on the computer is STRICTLY PROHIBITED. Do NOT insert USB/SD onto the computer. Once computer is turned on leave it on, it will be turned off at the end of the day. Before you leave the lab, please make sure you have done the following things: ©fmalacas2016 R U L E S COMPUTER LABORATORY
  • 10.
    Quit all applications. Cleanarea around the computer, that includes discarding scrap papers and printouts. Put things back when you are finished with them, including cover, keyboard, mouse and chair under the table. ©fmalacas2016 R U L E S COMPUTER LABORATORY
  • 11.
  • 12.
    a term forany software that gets installed on your machine and performs unwanted tasks, often for some third party's benefit programs can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network) designed to transmit information about your web-browsing habits to advertisers or other third party interests without you knowing ©fmalacas2016https://ist.mit.edu/security/malware MALWARES
  • 13.
    TYPES OF MALWARES ©fmalacas2016 TYPESOF MALWARES TYPES OF MALWARES
  • 14.
    VIRUS Software that canreplicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory. There are two types of computer viruses 'parasitic' and 'boot' virus. A Parasitic virus attaches itself to other programs and is activated when the host program is executed. It tries to get attached to more programs so that chances of getting activated is more. It spreads to other computers when the affected programs are copied. 'Jerusalem' and 'Datacrime' are parasitic viruses. ©fmalacas2016https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
  • 15.
    A Boot virusis designed to enter the boot sector of a floppy disc. It works by replacing the first sector on the disc with part of itself. It hides the rest of itself elsewhere on the disc, with a copy of the first sector. The virus is loaded by the computers built-in start-up program when the machine is switched on. The virus loads, installs itself, hides the rest of itself and then loads the original program. On a hard disc, virus can occupy DOS boot sector or master boot sector. ©fmalacas2016https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
  • 16.
    ADWARE presents unwanted advertisementsto the user of a computer advertisements produced by adware are sometimes in the form of a pop- up or sometimes in an "unclosable window“ SPYWARE Software that surreptitiously gathers information and transmits it to interested parties. Types of information that is gathered includes the Websites visited, browser and system information, and your computer IP address. ©fmalacas2016https://en.wikipedia.org/wiki/Adware https://ist.mit.edu/security/malware
  • 17.
    BROWSER HIJACKING SOFTWARE Advertisingsoftware that modifies your browser settings (e.g., default home page, search bars, toolbars), creates desktop shortcuts, and displays intermittent advertising pop-ups. Once a browser is hijacked, the software may also redirect links to other sites that advertise, or sites that collect Web usage information ©fmalacas2016https://ist.mit.edu/security/malware