SlideShare a Scribd company logo
1 of 57
SECURITY
SAFETY
PRIVACY
ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE
Learning Competencies
•The learners will be able to:
•Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would
relate to their specific professional tracks
•Discuss what constitutes appropriate and
inappropriate online behavior;
Learning Competencies
•The learners will be able to:
•Make the students discern possible deceptive
information and wrongly evaluated data; and
•Make the students understand the importance of
making judgment calls on possible implications and
consequences of making certain information public
Topic Outline
•Online Safety/Internet Safety
•Online Threats & Types
•Online Safety Measures
• Online Ethics and Netiquette
GALLERY WALK
FORMATIVE ASSESSMENT
DIRECTION:
1. The teacher will show some images to the students related
with the upcoming discussion.
2. Each student will be given 1 minutes to write their
observation on the following images.
4. After the activity the students will share their observation
about the image.
ONLINE SAFETY
HOW SAFE ARE YOU?
Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous school (s)
5. Your Cellphone Number
6. The Name of your Mother and
Father
7. The Name of your Siblings
8. Your Address
9. Your Home Phone Number
10. Your Birthday
QUESTIONS
1. How many checks you have for Shared?
2. How many checks you have for Not Shared?
3. How safe are you when using the Internet?
ONLINE SAFETY
Refers to the practices and precautions that should be
observed when using the internet to ensure that the
users as well as their computers and personal
information are safe from crimes associated with using
the internet.
ONLINE SAFETY
•Numerous delinquencies that can be
committed on the internet:
•Stalking
•Identity theft
•Privacy violations
•Harassment
ONLINE SAFETY MEASURES
• Never give any personal information out about yourself
over the Internet.
• Do not give any banking or sensitive information unless
you are sure that it is a reputable business having a
secure service. To make sure that you are in a secured
network, the website address should begin with
“https://” as opposed to “http://”. Never access your
accounts by following an email link, instead type the URL
by yourself.
• Never open messages or attachments from someone you
do not know.
ONLINE SAFETY MEASURES
•Regularly review your privacy settings in your online
accounts to make sure you are not sharing important
personal information.
•When using a public computer terminal, be sure to
delete your browsing data before leaving.
•Keep your software updated to avoid security holes.
•Do not download or install software or anything on
your computer or cell phone that is unknown to you.
ONLINE THREATS
DEFINITION & TYPES OF THREATS
ONLINE THREATS
An act performed by a knowledgeable
computer user sometimes referred to as
hacker that illegally browses or steal
someone’s information.
TYPES OF THREATS
P G I M H L N K A B
A H N S Y I J G C N
P H I S H I N G
An email sent from an Internet criminal disguised as an
email from a legitimate, trustworthy source. The
message is meant to lure you into revealing sensitive or
confidential information.
PHISHING
TYPES OF THREATS
P G I M R L N K A B
A H N S Y I J G C N
P H A R M I N G
• A malicious website that resembles a legitimate
website, used to gather usernames and passwords.
PHARMING
TYPES OF THREATS
I B T M A N E T K O
Z N X E R C L S N P
I N T E R N E T
S C A M
• A type of scam that misleads the user in many ways
attempting to take lead of them.
• The purpose of this scam is to cheat the target of
their personal property directly rather than private
information through fabricated promises, confidence
tricks and many more.
INTERNET SCAM
TYPES OF THREATS
I B T M A N E T K O
S N X E R B L O N T
I N T E R N E T
B O T S
• A network of zombie computers that have been
taken over by a robot or bot that performs large-
scale malicious acts for the creator of the botnet.
• Captcha technology is used to avoid this type of
security threat.
BOTNET
TYPES OF THREATS
M K A C L G G D C E
X I V I W H A F R B
M A L W A R E
• A generic term for spyware and adware.
• It is a malicious software disguised as real software
often secretly installed, intended to transfer and
gather private information, like passwords, without
the user's permission.
MALWARE
• Adware - Adware (short for advertising-
supported software) is a type of malware that
automatically delivers advertisements.
• Examples: Banner Ads & Pop-up Ads
• Spyware - A type of malware that functions by
spying on user activity without their knowledge.
• These spying capabilities can include activity
monitoring, collecting keystrokes, data harvesting
(account information, logins, financial data), and
more.
• Example: Keylogger
TYPES OF THREATS
V K W N O E R B S A
Z I R M U S F N M X
V I R U S &
W O R M
• Virus is a program designed to replicate by attaching
itself into other computer programs, data files, or
the boot sector of the hard drive.
• Worm is can be injected into a network by any types
of means, like a USB stick or an email attachment.
VIRUS & WORM
• Trojan Horse
• Commonly known as a “Trojan,” is a type of malware
that disguises itself as a normal file or program to trick
users into downloading and installing malware.
• Iloveyou Virus
• Also known as Love bug or love letter
• A computer worm attached on email that have
infected 10 million of windows personal computer that
cause computer shutdown and deletion of files on the
year 2000.
• Created by a Filipino student: Onel De Guzman and
Reonel Ramones.
Love Letter
Virus Infection on a flash drive
TYPES OF THREATS
C X O L M Q P S U V
E Z R B B R U W G T
C O M P U T E R
B U G
• A malfunction on a computer system through its
runtime.
• The term “bug” originated to the Moth found on the
Mark II by Grace Hopper that cause a system
malfunction.
BUG
BUG
TYPES OF THREATS
C K Y J R T M L O I
G B N E S H A Q K P
C Y B E R
S T A L K I N G
• The use of the internet or other electronic device to
harass or stalk individual, group or organization
TYPES OF THREATS
C K Y J R T M L O I
G B N E S H A Q K P
C Y B E R
B U L L Y I N G
• The act of tormenting, threatening, harassing or
embarrassing another person using the internet or
other technologies.
CYBER HARRASSMENT
TYPES OF THREATS
M K A C L G S D C E
X I V I W H A F P B
S P A M
• An unsolicited email, instant messages, or social
media messages.
• These messages are fairly easy to spot and can be
damaging if you open or respond.
TYPES OF THREATS
P G I M R L N K A B
A H N S Y I J G C N
S P O O F I N G
• Describes a criminal who impersonates another
individual or organization, with the intent to gather
personal or business information.
LESSON RECAP
ONLINE ETHICS AND
NETIQUETTE
Netiquette, Online Safety, Computer Ethics & Privacy
NETIQUETTE
• Comes from the word Network and Etiquette.
• Is a set of rules and norms for acceptable conduct or
behaviour online.
COMPUTER ETHICS
• Concerned with how computing professionals should
make decisions regarding professional and social
conduct.
PRIVACY
• Refers to the right of individuals to deny or restrict the
collection and used of information about them.
HOW DO WE MAINTAIN OUR
PRIVACY?
AUTHENTICATION
• A process where users verifies their identity.
• Deals with the problem of determining whether a user
should be allowed access to a particular system.
• Four commonly authentication methods:
• User Identification
• Possessed Objects
• Biometric Device
• Callback System
USER IDENTIFICATION
POSSESSED OBJECT
BIOMETRIC DEVICE
CALLBACK SYSTEM
THANK YOU FOR LISTENING
BE A RESPONSIBLE NETIZEN

More Related Content

What's hot

ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsAngelito Quiambao
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment TechnologiesMark Jhon Oxillo
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content DevelopmentAngelito Quiambao
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Arniel Ping
 
Emp Tech 1 introduction
Emp Tech 1 introductionEmp Tech 1 introduction
Emp Tech 1 introductionArtJaysonOsuyos
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online EnvironmentAngelito Quiambao
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Media and Information Sources - Media and Information Literacy (MIL)
Media and Information Sources - Media and Information Literacy (MIL)Media and Information Sources - Media and Information Literacy (MIL)
Media and Information Sources - Media and Information Literacy (MIL)Mark Jhon Oxillo
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfEricAntonio9
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Aira Shayne Come
 

What's hot (20)

EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 
Emp Tech 1 introduction
Emp Tech 1 introductionEmp Tech 1 introduction
Emp Tech 1 introduction
 
Imaging and Design for Online Environment
Imaging and Design for Online EnvironmentImaging and Design for Online Environment
Imaging and Design for Online Environment
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Media and Information Sources - Media and Information Literacy (MIL)
Media and Information Sources - Media and Information Literacy (MIL)Media and Information Sources - Media and Information Literacy (MIL)
Media and Information Sources - Media and Information Literacy (MIL)
 
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdfMIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
MIL_Q1_M2_Introduction-to-Media-and-Information-Literacy (1).pdf
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 

Similar to Online safety, security, ethics & etiquette

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 

Similar to Online safety, security, ethics & etiquette (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Online safety, security, ethics & etiquette

  • 2. Learning Competencies •The learners will be able to: •Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks •Discuss what constitutes appropriate and inappropriate online behavior;
  • 3. Learning Competencies •The learners will be able to: •Make the students discern possible deceptive information and wrongly evaluated data; and •Make the students understand the importance of making judgment calls on possible implications and consequences of making certain information public
  • 4. Topic Outline •Online Safety/Internet Safety •Online Threats & Types •Online Safety Measures • Online Ethics and Netiquette
  • 6. DIRECTION: 1. The teacher will show some images to the students related with the upcoming discussion. 2. Each student will be given 1 minutes to write their observation on the following images. 4. After the activity the students will share their observation about the image.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Type of Information Shared Not Shared 1. First Name 2. Last Name 3. Middle Name 4. Current and previous school (s) 5. Your Cellphone Number 6. The Name of your Mother and Father 7. The Name of your Siblings 8. Your Address 9. Your Home Phone Number 10. Your Birthday
  • 14.
  • 15. QUESTIONS 1. How many checks you have for Shared? 2. How many checks you have for Not Shared? 3. How safe are you when using the Internet?
  • 16. ONLINE SAFETY Refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet.
  • 17. ONLINE SAFETY •Numerous delinquencies that can be committed on the internet: •Stalking •Identity theft •Privacy violations •Harassment
  • 18. ONLINE SAFETY MEASURES • Never give any personal information out about yourself over the Internet. • Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. To make sure that you are in a secured network, the website address should begin with “https://” as opposed to “http://”. Never access your accounts by following an email link, instead type the URL by yourself. • Never open messages or attachments from someone you do not know.
  • 19. ONLINE SAFETY MEASURES •Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. •When using a public computer terminal, be sure to delete your browsing data before leaving. •Keep your software updated to avoid security holes. •Do not download or install software or anything on your computer or cell phone that is unknown to you.
  • 20. ONLINE THREATS DEFINITION & TYPES OF THREATS
  • 21. ONLINE THREATS An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone’s information.
  • 22. TYPES OF THREATS P G I M H L N K A B A H N S Y I J G C N P H I S H I N G An email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
  • 24. TYPES OF THREATS P G I M R L N K A B A H N S Y I J G C N P H A R M I N G • A malicious website that resembles a legitimate website, used to gather usernames and passwords.
  • 26. TYPES OF THREATS I B T M A N E T K O Z N X E R C L S N P I N T E R N E T S C A M • A type of scam that misleads the user in many ways attempting to take lead of them. • The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more.
  • 28. TYPES OF THREATS I B T M A N E T K O S N X E R B L O N T I N T E R N E T B O T S • A network of zombie computers that have been taken over by a robot or bot that performs large- scale malicious acts for the creator of the botnet. • Captcha technology is used to avoid this type of security threat.
  • 30. TYPES OF THREATS M K A C L G G D C E X I V I W H A F R B M A L W A R E • A generic term for spyware and adware. • It is a malicious software disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user's permission.
  • 31. MALWARE • Adware - Adware (short for advertising- supported software) is a type of malware that automatically delivers advertisements. • Examples: Banner Ads & Pop-up Ads • Spyware - A type of malware that functions by spying on user activity without their knowledge. • These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. • Example: Keylogger
  • 32. TYPES OF THREATS V K W N O E R B S A Z I R M U S F N M X V I R U S & W O R M • Virus is a program designed to replicate by attaching itself into other computer programs, data files, or the boot sector of the hard drive. • Worm is can be injected into a network by any types of means, like a USB stick or an email attachment.
  • 33. VIRUS & WORM • Trojan Horse • Commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. • Iloveyou Virus • Also known as Love bug or love letter • A computer worm attached on email that have infected 10 million of windows personal computer that cause computer shutdown and deletion of files on the year 2000. • Created by a Filipino student: Onel De Guzman and Reonel Ramones.
  • 35. Virus Infection on a flash drive
  • 36. TYPES OF THREATS C X O L M Q P S U V E Z R B B R U W G T C O M P U T E R B U G • A malfunction on a computer system through its runtime. • The term “bug” originated to the Moth found on the Mark II by Grace Hopper that cause a system malfunction.
  • 37. BUG
  • 38. BUG
  • 39. TYPES OF THREATS C K Y J R T M L O I G B N E S H A Q K P C Y B E R S T A L K I N G • The use of the internet or other electronic device to harass or stalk individual, group or organization
  • 40. TYPES OF THREATS C K Y J R T M L O I G B N E S H A Q K P C Y B E R B U L L Y I N G • The act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies.
  • 42. TYPES OF THREATS M K A C L G S D C E X I V I W H A F P B S P A M • An unsolicited email, instant messages, or social media messages. • These messages are fairly easy to spot and can be damaging if you open or respond.
  • 43. TYPES OF THREATS P G I M R L N K A B A H N S Y I J G C N S P O O F I N G • Describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information.
  • 45. ONLINE ETHICS AND NETIQUETTE Netiquette, Online Safety, Computer Ethics & Privacy
  • 46. NETIQUETTE • Comes from the word Network and Etiquette. • Is a set of rules and norms for acceptable conduct or behaviour online.
  • 47. COMPUTER ETHICS • Concerned with how computing professionals should make decisions regarding professional and social conduct.
  • 48.
  • 49.
  • 50. PRIVACY • Refers to the right of individuals to deny or restrict the collection and used of information about them.
  • 51. HOW DO WE MAINTAIN OUR PRIVACY?
  • 52. AUTHENTICATION • A process where users verifies their identity. • Deals with the problem of determining whether a user should be allowed access to a particular system. • Four commonly authentication methods: • User Identification • Possessed Objects • Biometric Device • Callback System
  • 57. THANK YOU FOR LISTENING BE A RESPONSIBLE NETIZEN

Editor's Notes

  1. Is a unique combination of characters (letter, number or symbol) that identify specific user Examples: Pin number and Password
  2. Is an any item that you must carry to gain access to computer of computer facility Examples: ATM card, credit card, and smart card
  3. Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database. Examples: Fingerprint reader, iris scanner, hand geometric scanner and signature verification system
  4. A system used for protecting a computer network, in which a user calls into a computer, which checks the person's username and password, ends the call, and then calls back the number connected with that username and password