ONLINE SAFETY,
SECURITY, ETHICS, AND
ETIQUETTE
Lesson 3
NETIQUETTE
Netiquette, or network etiquette,
refers to the "proper" manner of
communication in the online
environment.
The internet is one of the most
dangerous places if you do not know
what you are doing with it. Thus, the
concept of netiquette deals with truth.
Tips to Stay Safe Online
These are tips to help you stay safe online
1. Be mindful of what you share online and
what site you share it to.
2. Do not just accept terms and conditions;
read it.
3. Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be able
to scan your profile.
4. Don’t share your password with
anyone.
5. Avoid logging in to public networks/Wi-
Fi. Browsing in incognito mode will not
protect you from hackers.
6. Do not talk to strangers whether online
or face-to-face.
7. Never post anything about a future
vacation.
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus
software on your computer. Use only
one anti-virus software to avoid
conflicts.
11. If you have Wi-Fi at home, make it
private network by adding a password.
12. Avoid downloading anything from
untrusted websites.
13. Buy the software, do not use
pirated ones.
14. Do not reply or click links from
suspicious emails.
15. Make Online Purchases from
Secure Sites
Internet Threats
1. MALWARE – or malicious software, is
any program or file that is harmful to a
computer user.
Types of Malware:
a. Virus – a malicious program
designed to replicate itself and transfer
from one computer to another.
b. Worm – a malicious program that
transfers from one computer to another
by any type of means.
c. Trojan – a malicious program
that disguises as a useful program but
once downloaded or installed, leaves
your PC unprotected and allows
hackers to get your information.
d. Spyware – program that runs in
the background without you knowing it.
It monitors what you are currently
doing and typing through keylogging.
Ex. Keylogger – used to record
keystrokes done by the user. This is
done to steal their password or any
other sensitive information.
e. Adware – program designed to
send you advertisements, mostly as
pop-ups.
f. Ransomware – or ransom
software is a type of malicious
software that threatens to publish the
victim's data or perpetually block
access to it unless a ransom is paid.
2. SPAM – an unwanted email mostly from
bots or advertisers. It can be used to send
malware.
3. PHISHING – its goal is to acquire
sensitive information like passwords and
credit card details. This is done by sending
you an e-mail that will direct the user to
visit a fake website and be asked to
update his/her personal information.
Protecting Reputations Online
1. Before you post something on the web,
ask these questions to yourself: Would
you want your parents or grandparents to
see it? Would you want your future boss to
see it?
2. If you feel that a post can affect you or
other’s reputation, ask the one who posted
it to pull it down or report as inappropriate.
Copyright Infringement
It is the use of works protected by
copyright law without permission for a
usage where such permission is required.
Tips to avoid copyright infringement:
a. Always assume that the work is
copyrighted.
b. Do not copy, share or alter
without seeking permission.
c. Review and retain licensing
agreements.
d. Consider buying content.
e. Give credit to the original author
of the page or information.

Online Safety, Security, Ethics, and Etiquette.pptx

  • 1.
    ONLINE SAFETY, SECURITY, ETHICS,AND ETIQUETTE Lesson 3
  • 2.
    NETIQUETTE Netiquette, or networketiquette, refers to the "proper" manner of communication in the online environment. The internet is one of the most dangerous places if you do not know what you are doing with it. Thus, the concept of netiquette deals with truth.
  • 4.
    Tips to StaySafe Online These are tips to help you stay safe online 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
  • 5.
    4. Don’t shareyour password with anyone. 5. Avoid logging in to public networks/Wi- Fi. Browsing in incognito mode will not protect you from hackers. 6. Do not talk to strangers whether online or face-to-face. 7. Never post anything about a future vacation.
  • 6.
    8. Add friendsyou know in real life. 9. Avoid visiting untrusted websites. 10. Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts. 11. If you have Wi-Fi at home, make it private network by adding a password.
  • 7.
    12. Avoid downloadinganything from untrusted websites. 13. Buy the software, do not use pirated ones. 14. Do not reply or click links from suspicious emails. 15. Make Online Purchases from Secure Sites
  • 8.
    Internet Threats 1. MALWARE– or malicious software, is any program or file that is harmful to a computer user. Types of Malware: a. Virus – a malicious program designed to replicate itself and transfer from one computer to another.
  • 9.
    b. Worm –a malicious program that transfers from one computer to another by any type of means. c. Trojan – a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • 10.
    d. Spyware –program that runs in the background without you knowing it. It monitors what you are currently doing and typing through keylogging. Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other sensitive information.
  • 11.
    e. Adware –program designed to send you advertisements, mostly as pop-ups. f. Ransomware – or ransom software is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • 12.
    2. SPAM –an unwanted email mostly from bots or advertisers. It can be used to send malware. 3. PHISHING – its goal is to acquire sensitive information like passwords and credit card details. This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her personal information.
  • 13.
    Protecting Reputations Online 1.Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? 2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report as inappropriate.
  • 14.
    Copyright Infringement It isthe use of works protected by copyright law without permission for a usage where such permission is required. Tips to avoid copyright infringement: a. Always assume that the work is copyrighted.
  • 15.
    b. Do notcopy, share or alter without seeking permission. c. Review and retain licensing agreements. d. Consider buying content. e. Give credit to the original author of the page or information.