7. 1. First name
2. Middle Name
3. Last Name
4. Current and Previous School
5. Your Cellphone Number
6. The name of Your Mother and Father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
11. INTERNET :
Defined as the information
superhighway.
This means that anyone
has access to this
highway, can place info,
and can grab that info.
12. TYPES OF INFO WITH RISK
Mother and Fathers Name
Siblings Name
Address
Home Phone Number
Birthday
Email Address
13. TYPES OF INFO WITH RISK
First Name
Last Name
Middle Name
Current and Previous
School
Cellphone Number
14. SOME TIPS TO STAY SAFE
ONLINE:
Be mindful of what you
share online
Do not just accept terms
and conditions, read it.
Do not share your
password with anyone.
15. SOME TIPS TO STAY SAFE
ONLINE:
Do not talk to strangers
whether online or face-to-
face.
Never post about future
vacation.
Add Friends you know in
real life.
16. SOME TIPS TO STAY SAFE
ONLINE:
Avoid visited untrusted
websites.
If you have Wi-Fi at home
make it private by adding a
password.
Install and update an antivirus
software on your computer
17. SOME TIPS TO STAY SAFE
ONLINE:
Avoid downloading
anything from untrusted
websites.
Buy the software. Do not
use the pirated ones.
Do not reply or click links
from suspicious emails.
18.
19. 1. Malware – stands for malicious software
5 types of malware
a. Virus
- a malicious program designed to replicate
itself to transfer from one computer to another
(internet, local networks, FD’s, CD’s , etc.)
INTERNET THREATS
20. 5 types of malware
b. Worm
– a malicious program that transfers
from one computer to another by any
types of means.
Ex. ILOVEYOU Worm
INTERNET THREATS
21. INTERNET THREATS
5 types of malware
c. Trojan
– a malicious program disguises as a
useful program but once downloaded or
install leave your PC unprotected and
allows hackers to get your information.
INTERNET THREATS
22. INTERNET THREATS
5 types of malware
d. Spyware
– a program that runs in the background
without you knowing it (that’s called
spy”). It has the ability to monitor what
you are currently doing and typing
through key logging.
INTERNET THREATS
23. INTERNET THREATS
5 types of malware
e. Adware
– a program designed to send
you advertisements, mostly as
pop-ups.
28. TEN CORE RULES OF NETIQUETTE
Remember the Human
Be Ethical
Know where you are
Respect other people time
and data limits
Make yourself look good
online
Share expert knowledge
Keep disagreement healthy
Respect other people’s
privacy
Don’t abuse your power
Be forgiving for other
people’s mistake