SlideShare a Scribd company logo
1 of 29
Online safety and
Security and tips to stay
safe online
HEIDE YLANAN
PRESENTED BY:
AMAZING MIND
READER REVEALS
HIS GIFT
HOW SAFE ARE YOU ACTIVITY
Shared
“YES”
Not Shared
“NO”
Takot na ako
masugatan
1. First name
2. Middle Name
3. Last Name
4. Current and Previous School
5. Your Cellphone Number
6. The name of Your Mother and Father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Are you safe
and secured
online?
How safe and
secured are
you online?
PREVIOUS TOPIC
ICT Information Communication Technology
INTERNET :
Defined as the information
superhighway.
This means that anyone
has access to this
highway, can place info,
and can grab that info.
TYPES OF INFO WITH RISK
Mother and Fathers Name
Siblings Name
Address
Home Phone Number
Birthday
Email Address
TYPES OF INFO WITH RISK
First Name
Last Name
Middle Name
Current and Previous
School
Cellphone Number
SOME TIPS TO STAY SAFE
ONLINE:
Be mindful of what you
share online
Do not just accept terms
and conditions, read it.
Do not share your
password with anyone.
SOME TIPS TO STAY SAFE
ONLINE:
Do not talk to strangers
whether online or face-to-
face.
Never post about future
vacation.
Add Friends you know in
real life.
SOME TIPS TO STAY SAFE
ONLINE:
Avoid visited untrusted
websites.
If you have Wi-Fi at home
make it private by adding a
password.
Install and update an antivirus
software on your computer
SOME TIPS TO STAY SAFE
ONLINE:
Avoid downloading
anything from untrusted
websites.
Buy the software. Do not
use the pirated ones.
Do not reply or click links
from suspicious emails.
1. Malware – stands for malicious software
5 types of malware
a. Virus
- a malicious program designed to replicate
itself to transfer from one computer to another
(internet, local networks, FD’s, CD’s , etc.)
INTERNET THREATS
5 types of malware
b. Worm
– a malicious program that transfers
from one computer to another by any
types of means.
Ex. ILOVEYOU Worm
INTERNET THREATS
INTERNET THREATS
5 types of malware
c. Trojan
– a malicious program disguises as a
useful program but once downloaded or
install leave your PC unprotected and
allows hackers to get your information.
INTERNET THREATS
INTERNET THREATS
5 types of malware
d. Spyware
– a program that runs in the background
without you knowing it (that’s called
spy”). It has the ability to monitor what
you are currently doing and typing
through key logging.
INTERNET THREATS
INTERNET THREATS
5 types of malware
e. Adware
– a program designed to send
you advertisements, mostly as
pop-ups.
INTERNET THREATS
2. Spam
– an unwanted email from bots
or advertisers. It can be used to
send malware.
3. Phishing
– an unwanted acquisition of sensitive
personal information like passwords and
credit card details.
INTERNET THREATS
4. Botnet
– group of
compromised
computer connected to
a network (“zombie”).
5.Denial of Service Attack
- disrupts computer
access to internet
services.
TEN CORE RULES OF NETIQUETTE
 Remember the Human
 Be Ethical
 Know where you are
 Respect other people time
and data limits
 Make yourself look good
online
 Share expert knowledge
 Keep disagreement healthy
 Respect other people’s
privacy
 Don’t abuse your power
 Be forgiving for other
people’s mistake
Rules of Nitiquette organize everything education computer.pptx

More Related Content

Similar to Rules of Nitiquette organize everything education computer.pptx

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxMichael Montarde
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyankoSergiy Sydoriv
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy QuizDr. Joel Evans
 

Similar to Rules of Nitiquette organize everything education computer.pptx (20)

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Jake on cybersafety
Jake on cybersafetyJake on cybersafety
Jake on cybersafety
 
AMMU
AMMUAMMU
AMMU
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Security on the internet volosyanko
Security on the internet volosyankoSecurity on the internet volosyanko
Security on the internet volosyanko
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
Users guide
Users guideUsers guide
Users guide
 
lesson-2.pptx
lesson-2.pptxlesson-2.pptx
lesson-2.pptx
 

Recently uploaded

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Rules of Nitiquette organize everything education computer.pptx

  • 1.
  • 2. Online safety and Security and tips to stay safe online HEIDE YLANAN PRESENTED BY:
  • 4.
  • 5. HOW SAFE ARE YOU ACTIVITY Shared “YES”
  • 7. 1. First name 2. Middle Name 3. Last Name 4. Current and Previous School 5. Your Cellphone Number 6. The name of Your Mother and Father 7. The name of your siblings 8. Your address 9. Your home phone number 10. Your birthday
  • 8. Are you safe and secured online?
  • 9. How safe and secured are you online?
  • 10. PREVIOUS TOPIC ICT Information Communication Technology
  • 11. INTERNET : Defined as the information superhighway. This means that anyone has access to this highway, can place info, and can grab that info.
  • 12. TYPES OF INFO WITH RISK Mother and Fathers Name Siblings Name Address Home Phone Number Birthday Email Address
  • 13. TYPES OF INFO WITH RISK First Name Last Name Middle Name Current and Previous School Cellphone Number
  • 14. SOME TIPS TO STAY SAFE ONLINE: Be mindful of what you share online Do not just accept terms and conditions, read it. Do not share your password with anyone.
  • 15. SOME TIPS TO STAY SAFE ONLINE: Do not talk to strangers whether online or face-to- face. Never post about future vacation. Add Friends you know in real life.
  • 16. SOME TIPS TO STAY SAFE ONLINE: Avoid visited untrusted websites. If you have Wi-Fi at home make it private by adding a password. Install and update an antivirus software on your computer
  • 17. SOME TIPS TO STAY SAFE ONLINE: Avoid downloading anything from untrusted websites. Buy the software. Do not use the pirated ones. Do not reply or click links from suspicious emails.
  • 18.
  • 19. 1. Malware – stands for malicious software 5 types of malware a. Virus - a malicious program designed to replicate itself to transfer from one computer to another (internet, local networks, FD’s, CD’s , etc.) INTERNET THREATS
  • 20. 5 types of malware b. Worm – a malicious program that transfers from one computer to another by any types of means. Ex. ILOVEYOU Worm INTERNET THREATS
  • 21. INTERNET THREATS 5 types of malware c. Trojan – a malicious program disguises as a useful program but once downloaded or install leave your PC unprotected and allows hackers to get your information. INTERNET THREATS
  • 22. INTERNET THREATS 5 types of malware d. Spyware – a program that runs in the background without you knowing it (that’s called spy”). It has the ability to monitor what you are currently doing and typing through key logging. INTERNET THREATS
  • 23. INTERNET THREATS 5 types of malware e. Adware – a program designed to send you advertisements, mostly as pop-ups.
  • 24. INTERNET THREATS 2. Spam – an unwanted email from bots or advertisers. It can be used to send malware.
  • 25. 3. Phishing – an unwanted acquisition of sensitive personal information like passwords and credit card details. INTERNET THREATS
  • 26. 4. Botnet – group of compromised computer connected to a network (“zombie”).
  • 27. 5.Denial of Service Attack - disrupts computer access to internet services.
  • 28. TEN CORE RULES OF NETIQUETTE  Remember the Human  Be Ethical  Know where you are  Respect other people time and data limits  Make yourself look good online  Share expert knowledge  Keep disagreement healthy  Respect other people’s privacy  Don’t abuse your power  Be forgiving for other people’s mistake