0% found this document useful (0 votes)
107 views4 pages

Ict Grade 11 Empowerment Technologies: Subject Code Subject Title Lesso N Numb ER Lesson Title

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views4 pages

Ict Grade 11 Empowerment Technologies: Subject Code Subject Title Lesso N Numb ER Lesson Title

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Page 1 of 4 MODULE: Week 2 Lesson 3

SUBJECT CODE ICT GRADE 11


SUBJECT TITLE EMPOWERMENT TECHNOLOGIES
LESSO 003 LESSON Online safety, security, ethics, and etiquette
N TITLE
NUMB
ER

Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their
specific professional tracks

Objectives: At the end of this activity, the students are expected to be able to:
1. Consider one’s and other’s safety when sharing information using the internet
2. Consider one’s and others’ reputation when using the internet
3. Determine and avoid the dangers of internet
4. Be responsible in the use of social networking sites; and

Requirements:
1. Microsoft office (MS word)
2. Smart Phone / Laptop / Desktop Pc
3. Internet

Resources/Reference
1. Empowerment Technologies First Edition by Rex Book Store.
2. Online Published Articles. (Internet)
3. PowerPoint Presentation.

Procedure
1. Read lesson Rules of Netiquette Page 17 and 25.
a. Tips to stay safe online
b. Internet Threats
2. *For module: Use pen and the activity sheet to answer the questions and exercise. Write your name, Subject
and Lesson number. *For online: Create a document Lesson(number)_name_lastname. Answer the question and
exercise and send to the LMS using your account.
3. Keep the project files for record as they may be requested by the instructor.

Discussion

How many hours do you spend on the Internet per day? Can you live without the Internet for a week? How many
aspects of your life depend on the Internet? How many times have you complained about your Internet connection
speed?
As teenagers, you are all exposed to many things powered by the Internet. Whether it is socializing, playing
games, reading sports news, shopping, etc., the Internet has given you one of the most powerful tools that your parents,
during their teenage years, did not have. Because of this, do you not think that it is also important to wield this powerful
tool properly? Without proper training, a swordsman can easily injure himself when wielding a sword; the same could be
said for you whenever you use the Internet.

The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch
with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But
like most things in this world there is always the other side of the coin. The Internet is one of the most dangerous places
especially if you do not know what you are doing with it. But there is no need to worry; is never that late. Hopefully, by the
end of this lesson, you are able to consider how you go about your use of the Internet.
Page 2 of 4 MODULE: Week 2 Lesson 3
SUBJECT CODE ICT GRADE 11
SUBJECT TITLE EMPOWERMENT TECHNOLOGIES
LESSO 003 LESSON Online safety, security, ethics, and etiquette
N TITLE
NUMB
ER

The Internet is defined as the information superhighway. This means that anyone has access to this highway, can
place information, and can grab that information. Any information, even things that you have set privately, can be
accessed one way or another. This is why social networking sites like Facebook continue to improve their security features.
The threat of cybercrime is very real. While you may not experience the threat now, whatever information we share today
could affect our future.

TIPS TO STAY SAFE ONLINE


The Internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using
the Internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the information you share.
4. Know the security features of the social networking site you use. By keeping your profile private, search engines
will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode," a feature of the browser, will
not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, "Rob my house at this date."
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads
(torrents) as the download is most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Most people would dispute that there is no such thing as private over the Internet and they may be right. There are
hackers who can find a backdoor even if your profile is already set to private. You have no control of whoever is looking at
your friend's screen whenever they open your profile or chat with you. You have no control over people getting access to
your friend's account and seeing your private stuff.

INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware - stands for malicious software
a. Virus - a malicious program designed to replicate itself and transfer from one computer to another either
through the Internet and local networks or data storage like flash drives and CDs.
b. Worm - a malicious program that transfers from one computer to another by any type of means. Often, it
uses a computer network to spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by
a Filipino.
c. Trojan - a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information
*Rogue security software - tricks the user into posing that it is a security software. It asks the user to pay
to improve his/her security but in reality, they are not protected at all.
Page 3 of 4 MODULE: Week 2 Lesson 3
SUBJECT CODE ICT GRADE 11
SUBJECT TITLE EMPOWERMENT TECHNOLOGIES
LESSO 003 LESSON Online safety, security, ethics, and etiquette
N TITLE
NUMB
ER

d. Spyware - a program that runs in the background without you knowing it (thus called "spy"). It has the
ability to monitor what you are currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any
other sensitive information. It can record email, messages, or any information you type using your
keyboard.
e. Adware - a program designed to send you advertisements, mostly as pop- ups
2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - Its goal is to acquire sensitive personal information like passwords and credit card details. This is done
by sending you an email that will direct the user to visit a website and be asked to update his/her username,
password, credit card, or personal information.
*Pharming - a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

Protecting Reputations Online


In the past, doing something embarrassing was not much of a big deal. It happened; people would laugh at it, and
they would move on. Nowadays, embarrassing moments are captured using any device you could imagine. What is worse
is that people can easily upload it to the Internet, where it can be stored forever. This could impact not only your
reputation but also the people around you. What is worse is that people tend to ignore this fact, and suffer from it later in
their life.
Once you post something over the Internet, search engines keep them in their archive for search results. This
makes anything you post to last forever even if you delete it in your page. Something you and your friends find funny
today may be something that could ha someone's reputation later.

Before hiring, companies do a background check on the applicant, and the easiest way to check your background
is to visit pages that are related to you. Thus, if they find disreputable information about you, it may harm your reputation
even if this information has been discarded.

Think Before You Click


Here are things you might want to consider before posting something over the Internet:
1. Before you post something on the web, ask these questions to yourself: Would you want your parents or
grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no
control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious
responsibility.
3. Set your post to "private." In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other's reputation, ask the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT
If you create something—an idea, an invention, a form of literary work, or a research, you have the right as to how it
should be used by others. This is called intellectual property. In other words, the copyright law includes your rights over
your work, and anyone who uses it without your consent is punishable by law. Try grabbing any book then browse its first
few pages and you will find a page with a disclaimer with the words: "No part of this book may be copied,
reproduced..."That is a copyright page.
Page 4 of 4 MODULE: Week 2 Lesson 3
SUBJECT CODE ICT GRADE 11
SUBJECT TITLE EMPOWERMENT TECHNOLOGIES
LESSO 003 LESSON Online safety, security, ethics, and etiquette
N TITLE
NUMB
ER

As a responsible user of the Internet, you have to consider that not everything out there is free for you to use. Just like
your own, contents that you see from websites have their respective copyrights. There are several instances where
employees or business owners face copyright infringement and are sentenced to a huge fine due to reckless copying of
materials.

Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does NOT protect underlying ideas and facts. This means that you
can express something using your own words, but you should give credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be
responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something that came from you or something made
from somebody else's creativity. It is important to add your own creative genius in everything that will be credited
to you.
4. Know the law. There are some limitations to copyright laws. For instance, in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also provisions for "fair use" which mean that an intellectual
property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching, and education. If you have doubts that what you are doing
does not fall under the policy of fair use, seek permission first.
5. Online Research Have you ever searched the Internet for certain information where the search engine returned a
different result? For example, if you were to search for "The Madonna" as the representation of Mary in the form
of an art, you would probably use the keyword "Madonna" to search for it on the net. But if you use that same
keyword nowadays, you are more likely to stumble upon "Madonna,” the music artist instead. And if you used
"The Madonna" to search for "The Madonna" in the first place, you will be directed in the right place.

You might also like