SlideShare a Scribd company logo
ONLINE SAFETY, SECURITY, AND
ETHICS
ONLINE SAFETY AND SECURITY
The internet is a powerful tool for
learning and communicating
with people. However, there are
many dangers that you must
watch out for.
DANGERS ON THE INTERNET
Email Spam
Also known as junk email, it is
usually unsolicited commercial email
sent from one source with identical
message sent to multiple recipients.
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a person who creates
electronic spam.
Spamming is projected to continue because it is a cheap means of
advertising. In addition, many countries do not Have laws to punish
spammers.
Email Spoofing
This refers to the deceitful email
practice in which the sender address
is changed, so that it would appear
to have come from a different
source usually someone you know.
Usually, the reply to address is the source of the email,
and when you unknowingly reply to it you would be
replying to the one who spoofed you.
Email Spoofing is usually used by spammers to hide the
origin of the spam.
Phishing
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and credit
card details by making it appear as if
it comes from a trustworthy source.
Phishing is usually done by email or
other similar means using a popular
entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure
you to their website.
Internet users would think that they are
accessing a genuine website and through
this way, a phisher would be able to
gather sensitive information from the
internet account user.
Pharming
This is a dangerous hacker attack on
a website which directs all traffic to
that website to another fictitious
website. The main object of
pharming is to obtain username and
passwords, as well as credit card and
financial information, and use these
to steal their money electronically or
use the credit card of the victims.
Pharming is a major concern of
many online banking and
electronic commerce
transactions, which would
compromise many of their client
accounts as well as the business.
Antivirus and
anti-spyware
software cannot
prevent and
protect one from
pharming.
Spyware
This is a computer program
that is installed covertly on a
personal computer to collect
information or even take
control over the computer
without the knowledge of the
user.
A spyware program
would be able to
monitor and collect
information about the
user.
Computer Worm
This is a dangerous computer
program that replicates itself through
a network. Some worms delete files,
others disrupt the network and still,
others send junk mail from infected
computer.
Computer worm usually
spreads by exploiting
weaknesses in operating
system, and manufacturers of
this software regularly send
free updates to clients to
prevent the spread of the
worms.
Users should not run
attachments or open emails
from unknown or suspicious
sources, delete them
immediately.
Trojan Horse
This is a form of a malicious software
(malware) fronting to perform a good task,
but covertly performs undesirable function
with the intention of entering the computer
without the user’s consent.
Once the malware is installed in the
computer, the Trojan horse can disable the
computer’s defenses opening it to
unauthorized entry.
It can erase data, can allow access of the
victim’s computer, can corrupt files, and can
be used in Phishing for bank accounts.
Computer Virus
This is a program that duplicates itself
and then infects the computer. It
spreads like a real biological virus,
wherein it attaches itself to host a
program and infect other computers if
it is received by a computer through
the internet.
The virus can also be transferred by
the use of removable storage media
such as diskette, CD, flash drives,
memory cards, and others.
Damage by the computer virus may
be mild to severe.
Hacker
This is a person who is able to enter
and control other people’s computer
without authorization.
A hacker is able to enter another’s
computer, usually vandalizes the
victim’s website, steals personal
information, obtains intellectual
property, and performs credit card
fraud.
Firewalls are able to prevent entry by
hackers.
What are the Dangers on the Internet?
Email Spam
Email Spoofing
Phishing
Pharming
Spyware
Computer worm
Trojan Horse
Computer Virus
Hacker
Get ¼ sheet of paper
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the user’s consent.
5. This is a person who is able to enter and
control other people’s computer without
authorization.
Answer
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
-----Email Spam
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
------Computer virus
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
----Phishing
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the user’s consent.
--- Trojan Horse
5. This is a person who is able to enter and
control other people’s computer without
authorization.
--- Hacker
Research about the
Commandments for
Computer Ethics
Home Activity

More Related Content

What's hot

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
Juan Miguel Palero
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
Maria Rosaria Grasso
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
Zoro18
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
The Pathway Group
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
n|u - The Open Security Community
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Malware
MalwareMalware
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
MarvenParay
 

What's hot (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Computer security
Computer securityComputer security
Computer security
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security
Computer securityComputer security
Computer security
 
Phishing
PhishingPhishing
Phishing
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Malware
MalwareMalware
Malware
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 

Viewers also liked

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
RaquelPG96
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
Conor O'Neill
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
Lea Rodriguez
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino21
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez
 

Viewers also liked (6)

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 

Similar to Online safety, security, and ethics

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
jnallnmnl
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
TseAnRS
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
Melanie Nava
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
Dhrumit Patel
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
sravani ponnuru
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Computer Security
Computer SecurityComputer Security
Computer Security
Danz Magdaraog
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
faadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
HArshMangasuli
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
HeroZero12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 

Similar to Online safety, security, and ethics (20)

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 

Online safety, security, and ethics

  • 2. ONLINE SAFETY AND SECURITY The internet is a powerful tool for learning and communicating with people. However, there are many dangers that you must watch out for.
  • 3. DANGERS ON THE INTERNET Email Spam Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spammer is the term used to refer to a person who creates electronic spam. Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not Have laws to punish spammers.
  • 4. Email Spoofing This refers to the deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know. Usually, the reply to address is the source of the email, and when you unknowingly reply to it you would be replying to the one who spoofed you. Email Spoofing is usually used by spammers to hide the origin of the spam.
  • 5. Phishing This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions to lure you to their website. Internet users would think that they are accessing a genuine website and through this way, a phisher would be able to gather sensitive information from the internet account user.
  • 6. Pharming This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords, as well as credit card and financial information, and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online banking and electronic commerce transactions, which would compromise many of their client accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
  • 7. Spyware This is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. A spyware program would be able to monitor and collect information about the user.
  • 8. Computer Worm This is a dangerous computer program that replicates itself through a network. Some worms delete files, others disrupt the network and still, others send junk mail from infected computer. Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of the worms. Users should not run attachments or open emails from unknown or suspicious sources, delete them immediately.
  • 9. Trojan Horse This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. Once the malware is installed in the computer, the Trojan horse can disable the computer’s defenses opening it to unauthorized entry. It can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing for bank accounts.
  • 10. Computer Virus This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. The virus can also be transferred by the use of removable storage media such as diskette, CD, flash drives, memory cards, and others. Damage by the computer virus may be mild to severe.
  • 11. Hacker This is a person who is able to enter and control other people’s computer without authorization. A hacker is able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.
  • 12. What are the Dangers on the Internet? Email Spam Email Spoofing Phishing Pharming Spyware Computer worm Trojan Horse Computer Virus Hacker
  • 13. Get ¼ sheet of paper 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet.
  • 14. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent.
  • 15. 5. This is a person who is able to enter and control other people’s computer without authorization.
  • 16. Answer 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. -----Email Spam
  • 17. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. ------Computer virus
  • 18. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. ----Phishing
  • 19. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. --- Trojan Horse
  • 20. 5. This is a person who is able to enter and control other people’s computer without authorization. --- Hacker
  • 21. Research about the Commandments for Computer Ethics Home Activity