0% found this document useful (0 votes)
824 views8 pages

Empowerment Technologies: Lesson 2: Online Safety, Security and Rules of Netiquette

The document discusses internet safety, security and netiquette. It provides 10 rules of netiquette including remembering the human, behaving the same online as offline, respecting others' privacy and time, and forgiving mistakes. It also discusses internet security concepts like confidentiality, integrity and availability as well as types of threats and intruders.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
824 views8 pages

Empowerment Technologies: Lesson 2: Online Safety, Security and Rules of Netiquette

The document discusses internet safety, security and netiquette. It provides 10 rules of netiquette including remembering the human, behaving the same online as offline, respecting others' privacy and time, and forgiving mistakes. It also discusses internet security concepts like confidentiality, integrity and availability as well as types of threats and intruders.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

EMPOWERMENT TECHNOLOGIES

Sunday, March 19, 2017

LESSON 2: ONLINE SAFETY, SECURITY AND RULES


OF NETIQUETTE

INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.

NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.


TEN RULES OF NETIQUETTE

Rule No. 1: Remember the human

 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.

Rule No. 2: Adhere to the same standards online that you follow in real life.

 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be
doing online just like you can in real life.
 You are still talking to a real person with feelings even though you can’t see them.

Rule no. 3: Know where you are in cyberspace.

 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

 Remember people have other things to do besides read your email. You are not the center
of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

 Be polite and pleasant to everyone.


 Always check your spelling and grammar before posting.
 · Know what you are talking about and make sense saying it.

Rule no. 6: Share expert knowledge

 Ask questions online


 Share what you know online.
 Post the answers to your questions online because someone may have the same
question you do.

Rule no. 7: Help keep flame wars under control


 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are flaming to hurt discussion groups by
putting the group down.

Rule no. 8: Respect other people’s privacy.

 Do not read other people’s mail without their permission.


 Going through other people’s things could cost you, your job or you could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

 Do not take advantage of other people just because you have more knowledge or power
than them.
 Treat others as you would want them to treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

 Do not point out mistakes to people online.


 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot see
the person face to face.

Internet security

Security Requirement Triad


Confidentiality
Data confidentiality
Privacy
 Integrity
Data integerity System integrity
 Availability
Threat Consequence Threat Action ( Attack)

Unauthorized Disclosure Exposure: Sensitive data are directly released to an


unauthorized entity.
A circumstance or event whereby an
entity gains access to data for which the Interception: An unauthorized entity directly accesses
entity is not authorized. sensitive data traveling between authorized sources
and destinations.

Inference: A threat action whereby an unauthorized


entity indirectly accesses sensitive data by reasoning
from characteristics or byproducts of communications.

Intrusion: an unauthorized entity gains access to


sensitive data by circumventing a system's security
protections.

Disruption Incapacitation: prevents or interrupts system operation


by disabling a system component.
A circumstances or even that interrupts or
prevents the correct operation of system Corruption: Undesirably alters system operation by
services and functions. adversely modifying system functions or data.

Obstruction: A threat action that interrupts delivery of


system services by hindering system operation.
Deception
Masquerade: An unauthorized entity gains access to a
A circumstance or event that may result in
system or performs a malicious act by posing as an
an authorized entity receiving false data
authorized entity.
and believing it to be true.
Falsification: False data deceive an authorized entity.

Repudiation: An entity deceives another by falsely


denying responsibility for an act.

Usurpation
A circumstances or event that results in Misappropriation: An entity assumes
control of system services or functions by unauthorized logical or physical control of a
an unauthorized entity. system resource.

Misuse: Causes a system component to perform a


function or service that is detrimental to system
security.

Types of System Intruders


 Masquerader
 Hackers
 Clandestine user

Parts of Virus
 Infection mechanism
 Trigger
 Payload

Virus stages
 Dormant phase Virus
is idle.
 Propagation phase Virus
places an identical copy of itself into other programs or into certain system areas on t the disk.
 Triggering phase Virus
is activated to perform the function for which it was intended. Caused by a
variety of system events
 Execution
phase Function is performed

Key Terms

Cyber crime- a crime committed or assisted through the use of the Internet.

Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.

Malware- stands for malicious software.

Virus- a malicious program designed to transfer from one computer to another in any means possible.

Worms- a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.

Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.

Spyware- a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.

Adware- a program designed to send you advertisement, mostly pop-ups.

Spam- unwanted email mostly from bots or advertisers.

Phishing- acquires sensitive personal information like passwords and credits card details.

Pharming- a more complicated way of phishing where it exploits the DNS system.

Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.

Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.

Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.

Rogue security softwares- is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Four search strategies

 Keyword searching
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together

Common words are ignored (That, to, which, a, the ...)

+ and – can be used to include or exclude a word

 Boolean
AND - enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)

OR - requires at least one of the terms is found.

Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

NOT - searches for the first term and excludes sites that have the second term.

(i.e. Washington NOT school)

 Question

a question may be entered in the search field of search engine

 Advanced

Features are offered on many engines by going to an "Advanced search" page and making selections.
Effective in narrowing search returns to a specific topic or phrase.

GROUP1 ABM-B at 9:54 AM


Share
No comments:
Post a Comment


Home

View web version


About Me

GROUP1 ABM-B

View my complete profile

Powered by Blogger.

You might also like