Chapter 8 Information Age Part 4 of 4
Chapter 8 Information Age Part 4 of 4
Chapter 8 Information Age Part 4 of 4
websites and
applications which focus
on communication and
sharing of information,
ideas, personal
messages, etc.
Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=1167618">Gerd
Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&utm_medium=referral&utm_campaign=image&utm_content=1167618">Pixabay</a>
first introduced in 1997 with the launching of
Six Degrees, a smaller version of AOL Instant Messenger
Facebook, allowed users to create and allowed users to talk in
a profile and connect with friends real time
SNAPCHAT
online platform for uploading, sharing
Video
Sharing
videos or live streaming their own
Site videos to the internet; can be for the
general public to watch, or particular
users on a shared network
an online publishing platform
that blend features of both
Social
Blogging traditional blogging and
Site social networking
WordPress.org
online discussion forum that
Social provides platform for different
Community
online communities where users can
& Discussion
Site anonymously share content and
discuss various subjects
Group work
Brainstorm on the 5 members
advantages and
disadvantages of
social media use
to students.
Prepare a list.
Crime that use Crime that
computer to target computer
advance other networks or
illegal activities devices
v cyberstalking
v identity theft v viruses attack
v spamming v Malware attack
v hacking v denial-of-service
v phishing (DoS) attacks
Social Engineering
ü manipulation of people into divulging
confidential or sensitive information
ü most done over email but regularly
carried out over the phone
unsolicited bulk messages sent to multiple
recipients who did not ask for them
Distribute advertisement: Distribute malware
Commercial spam or virus
religious spam
political spam
What spam does
Phishing Hacking
Physhing is masquerading as a trustworthy source in an
spamming
attempt to bait a user to surrender sensitive information
such as a username, password, credit card number, etc.
phishing
Vishing/smishing Hacking is using exploits to
is phishing done via gain access to something you do
hacking
voice calls or text not normally have access to
messaging to trick
users in giving personal A phish, which is ultimately a hack, occurs when a user is
information. baited with an email, phone call, or, perhaps, a text message
and tricked into “voluntarily” responding with information.
Cybercrime
President
Benigno Aquino Republic Act
Prevention
signed into law No. 10175 Act of the
in 2012 Philippines
C urrency
When was the article written?
What about the sources they are using?
R elevancy/Reliability
Are they using appropriate sources & data?
Are there quotations with references?
Who wrote it?
A uthority Are they credible?
Are they a real person?
P urpose/Point of view
Why is it being written?
Is it fact or opinion?
President Duterte on
I N F O D E M I C