SlideShare a Scribd company logo
1 of 70
Download to read offline
Picture Analysis
Questions:
• What do you think the picture is
portraying?
• Have you experienced something
similar on what is being portrayed
in the picture?
Online Safety, Security,
Ethics, and Netiquette
ONLINE SAFETY AND SECURITY TIPS AND
THREATS TO ONLINE SAFETY
Objectives:
1.Point out what are the best practices for searching.
2.Reflect on the importance of observing netiquettes and
avoiding plagiarism when searching.
3.Discuss and appreciate the importance of avoiding web
threats
Online Safety Concepts
Data Privacy
• Data privacy is the right to protect
your personal information from
unauthorized access, use, or
disclosure. It is also the right to control
how your personal information is
collected, stored, and used.
• Personal information is any
information that can be used to
identify you as an individual, such as
your name, address, date of birth,
Social Security number, financial
information, and medical information.
Republic Act No. 10173/Data Privacy Act
of 2012 (DPA)
• The Data Privacy Act of 2012 (DPA) is a
comprehensive law that governs the
collection, use, disclosure, storage, and
disposal of personal data in the
Philippines. It covers both public and
private sector entities.
• The DPA requires entities to obtain the
consent of individuals before collecting or
processing their personal data. Entities
must also have a legitimate purpose for
collecting and using personal data, and
they must take reasonable steps to protect
the data from unauthorized access, use, or
disclosure.
Plagiarism
• Plagiarism is the act of passing off
someone else's work as your own. This
can include copying someone else's
words, ideas, or structure without
giving them proper credit. Plagiarism
can be intentional or unintentional,
but it is always wrong.
Types of Plagiarism
Direct plagiarism: This is the most common type of plagiarism, and it involves
copying someone else's work word-for-word without giving them credit.
Paraphrasing plagiarism: This type of plagiarism involves copying someone else's
ideas and putting them into your own words without giving them credit.
Self-plagiarism: This type of plagiarism involves reusing your own work without
properly citing yourself.
Mosaic plagiarism: This type of plagiarism involves copying and pasting pieces of
text from different sources together to create a new work without giving credit to
the original authors.
Online Safety Tips
Online Safety Tips
• Keep Personal Information Professional and Limited
• Keep Your Privacy Settings On
• Practice Safe Browsing
• Make Sure Your Internet Connection is Secure, Use a
Secure VPN Connection
• Be Careful What You Download
Online Safety Tips
• Choose Strong Passwords
• Make Online Purchases From Secure Sites
• Be Careful What You Post
• Be Careful Who You Meet Online
• Keep Your Antivirus Program Up To Date
Activity: 5 Online Safety Tips for Students
Activity: 5 Online Safety
Tips for Students
List down 5 online safety tips that will be helpful for a student
like you consider the lifestyle and internet browsing
tendencies of students when making the list. You can use
your personal experiences in crafting your list. After the
activity, some students will share their list to the class.
Category 4 points 3 points 2 points 1 point
Accuracy All tips are accurate. Most tips are accurate. Some tips are accurate.
Few or no tips are
accurate.
Relevance
All tips are relevant to
students.
Most tips are relevant
to students.
Some tips are relevant
to students.
Few or no tips are
relevant to students.
Clarity
Tips are clear and easy
to understand.
Tips are mostly clear
and easy to understand.
Tips are somewhat
clear and easy to
understand.
Tips are not clear or
easy to understand.
The “I LOVE YOU” VIRUS
The ILOVEYOU virus comes in an
email with "ILOVEYOU" in the subject
line and contains an attachment
that, when opened, results in the
message being re-sent to everyone
in the recipient's Microsoft Outlook
address book. Perhaps more
seriously, it results in the loss of
every JPEG, MP3 and certain other
files on all recipients' hard disks.
Onel De Guzman, creator of the virus
Online Safety, Security,
Ethics, and Netiquette
INTERNET THREATS AND ITS TYPES
Objectives:
1. Determine and avoid the dangers of the
internet.
2. Identify the different internet threats.
Internet Threats and Its Types
Internet Threats
• An internet threat is anything that can harm your computer or your
personal information when you are using the internet. These threats can
come from a variety of sources, including hackers, cybercriminals, malware,
and even other users.
Types of Internet Threats
▪ Malware: Malware is a type
of software that is designed
to harm your computer or
steal your personal
information. Malware can
include viruses, worms,
Trojans, keyloggers, and
spyware.
Types of Internet Threats
▪ Computer Virus: It is a
program that duplicates
itself and then infects the
computer. It spreads like a
biological virus.
▪It can be transferred by the
use of removable storage
media devices.
Types of Internet Threats
Computer Worm: It is a
dangerous computer
program that replicates itself
through a network.
It is usually spread through
email and running of
attachments from suspicious
sources.
Types of Internet Threats
Computer Bug: A
malfunction on a computer
system through its runtime
Types of Internet Threats
Spyware: A computer program
that is installed covertly on a
personal computer to collect
information or even take control
over the computer without the
knowledge of the user.
It can monitor and collect
information about the user’s
internet habits and practices.
It can also affect the performance
and setting of the computer.
Types of Internet Threats
Trojan Horse: A malware fronting
to perform a good task, but
covertly performs undesirable
function with the intention of
entering the computer without
the user’s consent.
It can disable the computer’s
defenses, opening it to
unauthorized entry. It can erase
data, can corrupt files, allow access
to computer, and
Types of Internet Threats
Adware: This program
automatically sends pop-ups
advertisements.
Types of Internet Threats
▪ Ransomware: Ransomware is a
type of malware that encrypts
your files and demands a ransom
payment in exchange for the
decryption key.
Types of Internet Threats
▪ Phishing: Phishing is a type of
scam where attackers try to trick
you into revealing confidential
information, such as your
passwords or credit card
numbers. Phishing attacks often
involve sending fake emails or
text messages that appear to be
from legitimate companies.
Types of Internet Threats
▪ Pharming: This is a dangerous
hacker attack on a website which
directs all traffic to that website to
another fictitious website.
The main objective is to obtain
username and passwords, as well
as credit cards ad financial
information, and use these to steal
their money electronically or use
the credit cards of the victims.
It is a major concern of many online
banking and electronic commerce
transactions.
Types of Internet Threats
Email Spam: AKA Junk mail
Usually unsolicited commercial
email sent from an unknown
source with identical message
sent to multiple recipients.
Usually not dangerous but can
be time and space consuming.
Dangerous ones can carry
viruses and other malicious
software (Malware)
Types of Internet Threats
Email Spoofing: It is a
deceitful email practice in
which the sender address is
changed, so that it would
appear to have come from a
different source which is
usually someone you know.
Email spoofing is usually used
by spammers to hide the origin
of the spam.
Types of Internet Threats
Internet Bots: A network of
zombie computers that have
been taken over by a robot or
bot that performs large scale
malicious acts for the creator
of the bot net.
Types of Internet Threats
Sexting: It is a term used to
describe inappropriate
photos or text sent via
cellphone or mobile phone.
Types of Internet Threats
Internet Scam: A type of scam
that misleads the users in
many ways attempting to
take lead of them.
Types of Internet Threats
Non-Delivery of
Merchandise: A deceiving act
which the culprit posted a
product or service on the
Internet. Once the victim
placed its payment, the
culprit does not give the item
or service.
Types of Internet Threats
Cyber Stalking: The use of
the internet or other
electronic device to harass or
stalk individual, group or
organization
Types of Internet Threats
Cyber Bullying: The act of
tormenting, threatening,
harassing or embarrassing
another person using the
internet or other
technologies
Types of Internet Threats
Hacking: It is unauthorized
accessing of data from a
computer network. Mostly,
hackers attack commercial and
government sites to cause an
alarm or to threat someone.
Hacker: This is a person who is
able to enter and control other
people’s computer without
authorization.
Types of Internet Threats
Electronic Harassment: An
anonymous criminal who
harass, abuse, threat, or
annoy other people.
Types of Internet Threats
Child Pornography: Based on
Republic Act no 9775 or known
as Anti-Child Pornography Act
of 2009, it is an act of real or
simulated explicit sexual
activities that involves any child
aged 18 and below and it is
penalized depending on the
offender. If it is the parent or
relative of the child, they’ll
receive the maximum penalty.
Types of Internet Threats
Prostitution: It is an illegal
act engage in any sexual
activities.
Types of Internet Threats
Criminal Copyright
Infringement: It is an
unauthorized use or stealing
of intellectual property, such
as movies and music, for
profitable benefit.
Sometimes, students violate
it through plagiarism.
Types of Internet Threats
▪ Denial-of-service (DoS) attacks: DoS attacks are designed to
overwhelm a website or server with traffic, making it unavailable
to legitimate users.
Types of Internet Threats
▪ Man-in-the-middle attacks: Man-in-the-middle attacks are where an
attacker intercepts communication between two parties and
impersonates one of them. This can be used to steal personal
information or to spread malware.
Activity: Internet Threats Table
Activity: Internet Threats
Table
Fill up the table with the right
information. After that, produce
prevention tips to avoid internet
threats.
Category Definition Target Platforms Prevention Tips
Phishing
Ransomware
Man-in-the-middle
attacks
Denial of Service
Attacks
Green Flag or Red Flag
WHAT ARE SOME OF YOUR RED FLAGS WHEN IT COMES TO
INTERNET BEHAVIOR?
Pressures others to do
things they're not
comfortable with online.
Uses emojis and GIFs to
add humor and
personality to their
messages.
Is honest about their
identity and age online.
Creates fake profiles to
catfish people.
Takes break from social
media to avoid burnout.
Online Safety, Security,
Ethics, and Netiquette
PART I: NETIQUETTE
Objectives:
Understand the concept of netiquette.
Create a slogan promoting awareness of netiquette.
Value the importance of netiquette when using the
Internet.
In recent news . . .
Rendon Labador’s facebook and tiktok account got deleted.
What is netiquette?
Netiquette
Netiquette is defined as “network
etiquette” the code of conduct for
online communication. Netiquette is
important for maintaining a positive
and productive online environment,
whether it's in emails, social media,
forums, chat rooms, or any other
online platform.
Common Principles of
Netiquette
Common Principles of Netiquette
Respect others: Treat others with
the same respect and courtesy
you would in face-to-face
interactions. Avoid offensive
language, insults, or harassment.
Use proper grammar and spelling:
Clear and well-structured
communication is essential for
effective online communication. Avoid
excessive use of abbreviations and
acronyms that others may not
understand.
Common Principles of Netiquette
Be Concise: Keep your messages
and comments brief and to the
point. Avoid writing
unnecessarily long messages that
may lose the
Use appropriate tone and language:
Choose your words carefully and avoid
using all caps, which can be
interpreted as shouting. Be mindful of
cultural differences and potential
misunderstandings.
Common Principles of Netiquette
Be cautious with humor and
sarcasm: Humor and sarcasm can
be easily misinterpreted online.
Use emoticons or emojis to
clarify your tone when necessary.
Respect privacy: Don't share personal
information about others without their
consent. Be mindful of data privacy
and security when discussing sensitive
topics.
Common Principles of Netiquette
Stay on topic: When
participating in online
discussions or forums, stick to
the topic at hand. Avoid derailing
conversations with unrelated
comments.
Use meaningful subject lines: In
emails and forum posts, provide clear
and descriptive subject lines to help
others understand the content of your
message.
Common Principles of Netiquette
Avoid spam: Don't flood forums
or email inboxes with irrelevant
or unsolicited messages. Be
mindful of the frequency and
relevance of your
communication.
Read and follow community
guidelines: Different online platforms
may have their own rules and
guidelines for conduct. Familiarize
yourself with these rules and abide by
them.
Common Principles of Netiquette
Use private channels for
personal matters: When
discussing personal or sensitive
issues, use private messaging or
email rather than public forums
or social media.
Be patient and tolerant: Not everyone
online will share your views or
opinions. Be open to constructive
criticism and engage in civil discussions
when disagreements arise.
Watch this:
What would you do?
What would you do?
You notice a heated argument between two users on a forum. How would you
intervene to promote a more respectful and constructive discussion while respecting
netiquette principles?
Your friend posts a potentially embarrassing photo of you on their social media
without your consent. How would you address this situation while adhering to
netiquette guidelines?
You receive an email from a colleague with multiple spelling errors and a rude tone.
How would you respond professionally, keeping in mind the principles of netiquette?
What would you do?
During an online game, a teammate starts using offensive language and insults
others. How would you handle the situation to maintain a positive gaming
environment in line with netiquette?
You've been chatting with someone you met on a dating app, and they suddenly
stop responding. How would you follow up or handle the situation without violating
netiquette or making the other person uncomfortable?
Activity: Creating a
Slogan
Slogan Making on Netiquette
The students will create a
slogan promoting the
importance of netiquette.
They will design and
create a slogan promoting
the awareness and
practice of netiquette.
Criterion Points Description
Creativity 10
The slogan is original and unique and uses creative
language to convey its message.
Clarity 10
The slogan is clear and concise, and its message is easy
to understand.
Relevance 10
The slogan is relevant to the topic of netiquette and its
importance.
Impact 10
The slogan is memorable and thought-provoking, and
it effectively conveys its message.
Overall 10
The slogan is well-written and effective in promoting
netiquette.

More Related Content

Similar to wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldExpeed Software
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 

Similar to wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus (20)

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
techalpha07
techalpha07techalpha07
techalpha07
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Recently uploaded

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus

  • 1. Picture Analysis Questions: • What do you think the picture is portraying? • Have you experienced something similar on what is being portrayed in the picture?
  • 2. Online Safety, Security, Ethics, and Netiquette ONLINE SAFETY AND SECURITY TIPS AND THREATS TO ONLINE SAFETY
  • 3. Objectives: 1.Point out what are the best practices for searching. 2.Reflect on the importance of observing netiquettes and avoiding plagiarism when searching. 3.Discuss and appreciate the importance of avoiding web threats
  • 5. Data Privacy • Data privacy is the right to protect your personal information from unauthorized access, use, or disclosure. It is also the right to control how your personal information is collected, stored, and used. • Personal information is any information that can be used to identify you as an individual, such as your name, address, date of birth, Social Security number, financial information, and medical information.
  • 6. Republic Act No. 10173/Data Privacy Act of 2012 (DPA) • The Data Privacy Act of 2012 (DPA) is a comprehensive law that governs the collection, use, disclosure, storage, and disposal of personal data in the Philippines. It covers both public and private sector entities. • The DPA requires entities to obtain the consent of individuals before collecting or processing their personal data. Entities must also have a legitimate purpose for collecting and using personal data, and they must take reasonable steps to protect the data from unauthorized access, use, or disclosure.
  • 7. Plagiarism • Plagiarism is the act of passing off someone else's work as your own. This can include copying someone else's words, ideas, or structure without giving them proper credit. Plagiarism can be intentional or unintentional, but it is always wrong.
  • 8. Types of Plagiarism Direct plagiarism: This is the most common type of plagiarism, and it involves copying someone else's work word-for-word without giving them credit. Paraphrasing plagiarism: This type of plagiarism involves copying someone else's ideas and putting them into your own words without giving them credit. Self-plagiarism: This type of plagiarism involves reusing your own work without properly citing yourself. Mosaic plagiarism: This type of plagiarism involves copying and pasting pieces of text from different sources together to create a new work without giving credit to the original authors.
  • 10. Online Safety Tips • Keep Personal Information Professional and Limited • Keep Your Privacy Settings On • Practice Safe Browsing • Make Sure Your Internet Connection is Secure, Use a Secure VPN Connection • Be Careful What You Download
  • 11. Online Safety Tips • Choose Strong Passwords • Make Online Purchases From Secure Sites • Be Careful What You Post • Be Careful Who You Meet Online • Keep Your Antivirus Program Up To Date
  • 12. Activity: 5 Online Safety Tips for Students
  • 13. Activity: 5 Online Safety Tips for Students List down 5 online safety tips that will be helpful for a student like you consider the lifestyle and internet browsing tendencies of students when making the list. You can use your personal experiences in crafting your list. After the activity, some students will share their list to the class. Category 4 points 3 points 2 points 1 point Accuracy All tips are accurate. Most tips are accurate. Some tips are accurate. Few or no tips are accurate. Relevance All tips are relevant to students. Most tips are relevant to students. Some tips are relevant to students. Few or no tips are relevant to students. Clarity Tips are clear and easy to understand. Tips are mostly clear and easy to understand. Tips are somewhat clear and easy to understand. Tips are not clear or easy to understand.
  • 14. The “I LOVE YOU” VIRUS The ILOVEYOU virus comes in an email with "ILOVEYOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book. Perhaps more seriously, it results in the loss of every JPEG, MP3 and certain other files on all recipients' hard disks. Onel De Guzman, creator of the virus
  • 15. Online Safety, Security, Ethics, and Netiquette INTERNET THREATS AND ITS TYPES
  • 16. Objectives: 1. Determine and avoid the dangers of the internet. 2. Identify the different internet threats.
  • 17. Internet Threats and Its Types
  • 18. Internet Threats • An internet threat is anything that can harm your computer or your personal information when you are using the internet. These threats can come from a variety of sources, including hackers, cybercriminals, malware, and even other users.
  • 19. Types of Internet Threats ▪ Malware: Malware is a type of software that is designed to harm your computer or steal your personal information. Malware can include viruses, worms, Trojans, keyloggers, and spyware.
  • 20. Types of Internet Threats ▪ Computer Virus: It is a program that duplicates itself and then infects the computer. It spreads like a biological virus. ▪It can be transferred by the use of removable storage media devices.
  • 21. Types of Internet Threats Computer Worm: It is a dangerous computer program that replicates itself through a network. It is usually spread through email and running of attachments from suspicious sources.
  • 22. Types of Internet Threats Computer Bug: A malfunction on a computer system through its runtime
  • 23. Types of Internet Threats Spyware: A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. It can monitor and collect information about the user’s internet habits and practices. It can also affect the performance and setting of the computer.
  • 24. Types of Internet Threats Trojan Horse: A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt files, allow access to computer, and
  • 25. Types of Internet Threats Adware: This program automatically sends pop-ups advertisements.
  • 26. Types of Internet Threats ▪ Ransomware: Ransomware is a type of malware that encrypts your files and demands a ransom payment in exchange for the decryption key.
  • 27. Types of Internet Threats ▪ Phishing: Phishing is a type of scam where attackers try to trick you into revealing confidential information, such as your passwords or credit card numbers. Phishing attacks often involve sending fake emails or text messages that appear to be from legitimate companies.
  • 28. Types of Internet Threats ▪ Pharming: This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main objective is to obtain username and passwords, as well as credit cards ad financial information, and use these to steal their money electronically or use the credit cards of the victims. It is a major concern of many online banking and electronic commerce transactions.
  • 29. Types of Internet Threats Email Spam: AKA Junk mail Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software (Malware)
  • 30. Types of Internet Threats Email Spoofing: It is a deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know. Email spoofing is usually used by spammers to hide the origin of the spam.
  • 31.
  • 32. Types of Internet Threats Internet Bots: A network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts for the creator of the bot net.
  • 33. Types of Internet Threats Sexting: It is a term used to describe inappropriate photos or text sent via cellphone or mobile phone.
  • 34. Types of Internet Threats Internet Scam: A type of scam that misleads the users in many ways attempting to take lead of them.
  • 35. Types of Internet Threats Non-Delivery of Merchandise: A deceiving act which the culprit posted a product or service on the Internet. Once the victim placed its payment, the culprit does not give the item or service.
  • 36. Types of Internet Threats Cyber Stalking: The use of the internet or other electronic device to harass or stalk individual, group or organization
  • 37. Types of Internet Threats Cyber Bullying: The act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies
  • 38. Types of Internet Threats Hacking: It is unauthorized accessing of data from a computer network. Mostly, hackers attack commercial and government sites to cause an alarm or to threat someone. Hacker: This is a person who is able to enter and control other people’s computer without authorization.
  • 39. Types of Internet Threats Electronic Harassment: An anonymous criminal who harass, abuse, threat, or annoy other people.
  • 40. Types of Internet Threats Child Pornography: Based on Republic Act no 9775 or known as Anti-Child Pornography Act of 2009, it is an act of real or simulated explicit sexual activities that involves any child aged 18 and below and it is penalized depending on the offender. If it is the parent or relative of the child, they’ll receive the maximum penalty.
  • 41. Types of Internet Threats Prostitution: It is an illegal act engage in any sexual activities.
  • 42. Types of Internet Threats Criminal Copyright Infringement: It is an unauthorized use or stealing of intellectual property, such as movies and music, for profitable benefit. Sometimes, students violate it through plagiarism.
  • 43. Types of Internet Threats ▪ Denial-of-service (DoS) attacks: DoS attacks are designed to overwhelm a website or server with traffic, making it unavailable to legitimate users.
  • 44. Types of Internet Threats ▪ Man-in-the-middle attacks: Man-in-the-middle attacks are where an attacker intercepts communication between two parties and impersonates one of them. This can be used to steal personal information or to spread malware.
  • 46. Activity: Internet Threats Table Fill up the table with the right information. After that, produce prevention tips to avoid internet threats. Category Definition Target Platforms Prevention Tips Phishing Ransomware Man-in-the-middle attacks Denial of Service Attacks
  • 47. Green Flag or Red Flag WHAT ARE SOME OF YOUR RED FLAGS WHEN IT COMES TO INTERNET BEHAVIOR?
  • 48. Pressures others to do things they're not comfortable with online.
  • 49. Uses emojis and GIFs to add humor and personality to their messages.
  • 50. Is honest about their identity and age online.
  • 51. Creates fake profiles to catfish people.
  • 52. Takes break from social media to avoid burnout.
  • 53. Online Safety, Security, Ethics, and Netiquette PART I: NETIQUETTE
  • 54. Objectives: Understand the concept of netiquette. Create a slogan promoting awareness of netiquette. Value the importance of netiquette when using the Internet.
  • 55. In recent news . . . Rendon Labador’s facebook and tiktok account got deleted.
  • 57. Netiquette Netiquette is defined as “network etiquette” the code of conduct for online communication. Netiquette is important for maintaining a positive and productive online environment, whether it's in emails, social media, forums, chat rooms, or any other online platform.
  • 59. Common Principles of Netiquette Respect others: Treat others with the same respect and courtesy you would in face-to-face interactions. Avoid offensive language, insults, or harassment. Use proper grammar and spelling: Clear and well-structured communication is essential for effective online communication. Avoid excessive use of abbreviations and acronyms that others may not understand.
  • 60. Common Principles of Netiquette Be Concise: Keep your messages and comments brief and to the point. Avoid writing unnecessarily long messages that may lose the Use appropriate tone and language: Choose your words carefully and avoid using all caps, which can be interpreted as shouting. Be mindful of cultural differences and potential misunderstandings.
  • 61. Common Principles of Netiquette Be cautious with humor and sarcasm: Humor and sarcasm can be easily misinterpreted online. Use emoticons or emojis to clarify your tone when necessary. Respect privacy: Don't share personal information about others without their consent. Be mindful of data privacy and security when discussing sensitive topics.
  • 62. Common Principles of Netiquette Stay on topic: When participating in online discussions or forums, stick to the topic at hand. Avoid derailing conversations with unrelated comments. Use meaningful subject lines: In emails and forum posts, provide clear and descriptive subject lines to help others understand the content of your message.
  • 63. Common Principles of Netiquette Avoid spam: Don't flood forums or email inboxes with irrelevant or unsolicited messages. Be mindful of the frequency and relevance of your communication. Read and follow community guidelines: Different online platforms may have their own rules and guidelines for conduct. Familiarize yourself with these rules and abide by them.
  • 64. Common Principles of Netiquette Use private channels for personal matters: When discussing personal or sensitive issues, use private messaging or email rather than public forums or social media. Be patient and tolerant: Not everyone online will share your views or opinions. Be open to constructive criticism and engage in civil discussions when disagreements arise.
  • 67. What would you do? You notice a heated argument between two users on a forum. How would you intervene to promote a more respectful and constructive discussion while respecting netiquette principles? Your friend posts a potentially embarrassing photo of you on their social media without your consent. How would you address this situation while adhering to netiquette guidelines? You receive an email from a colleague with multiple spelling errors and a rude tone. How would you respond professionally, keeping in mind the principles of netiquette?
  • 68. What would you do? During an online game, a teammate starts using offensive language and insults others. How would you handle the situation to maintain a positive gaming environment in line with netiquette? You've been chatting with someone you met on a dating app, and they suddenly stop responding. How would you follow up or handle the situation without violating netiquette or making the other person uncomfortable?
  • 70. Slogan Making on Netiquette The students will create a slogan promoting the importance of netiquette. They will design and create a slogan promoting the awareness and practice of netiquette. Criterion Points Description Creativity 10 The slogan is original and unique and uses creative language to convey its message. Clarity 10 The slogan is clear and concise, and its message is easy to understand. Relevance 10 The slogan is relevant to the topic of netiquette and its importance. Impact 10 The slogan is memorable and thought-provoking, and it effectively conveys its message. Overall 10 The slogan is well-written and effective in promoting netiquette.