0% found this document useful (0 votes)
89 views

(Answer This) : Module 7: Policing The Internet

The document discusses online safety and privacy. It asks the student questions about their personal experiences with data theft and how safe they feel their internet privacy is. The student responds that they have never experienced data theft by keeping their personal details private and using incognito browsing. They also discuss steps they take to stay safe online like using incognito mode, a VPN, limiting personal information shared on social media, and avoiding unfamiliar links.

Uploaded by

Joanne Jimenez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

(Answer This) : Module 7: Policing The Internet

The document discusses online safety and privacy. It asks the student questions about their personal experiences with data theft and how safe they feel their internet privacy is. The student responds that they have never experienced data theft by keeping their personal details private and using incognito browsing. They also discuss steps they take to stay safe online like using incognito mode, a VPN, limiting personal information shared on social media, and avoiding unfamiliar links.

Uploaded by

Joanne Jimenez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Joanne Karla M.

Jimenez 2 BSABE C

MODULE 7: POLICING THE INTERNET

Activity: (ANSWER THIS)

Answer the following questions:

1. Have you ever been experienced your personal data was stolen through the
internet? How did you handle it?
First and foremost, I never experienced that my personal data was stolen
through internet because I keep my personal details private. In order to
avoid, whenever I log-in my social media accounts, I always used
incognito browser even in my own laptop so that I won’t leave any traces
of my saved accounts. Use social media sparingly. Giving too much
information on social media sites like Facebook, Twitter, and Instagram
can make it easier for cybercriminals to obtain identifying information,
allowing them to steal your identity or access your financial information.

2. How safe is your internet privacy?


My internet privacy is safe because I always search incognito or private
mode, use a VPN, restrict the personal details I post on social media, and,
most importantly, never click on a link that I don't recognize. I always
keep my phone safe, including my security passwords and files, and I
always use reliable antivirus software that is kept up to date.

Analysis: (ANSWER THIS)

Answer the following questions:

1. In your own way, how to stay safe online? Discuss your answer.
I always browse in incognito or private mode, uses vpn, limit the personal
information that I share on social media and above all – never visit a link
that I’m not familiar with. I always secure my phone too, from my security
passwords and files and always use a quality antivirus software and keep
it updated.
Application: (ANSWER THIS)

I. FILL IN THE BLANK

Data breach 1. A cybercrime in which a cybercriminal extracts data from a source and
usually it is done through remote network or through a physical access to a computer
or network

Ethics 2. It’s defined as what deals with moral principles, it is the understanding and
knowing the difference of what is good and bad.

Dilemma 3. To be able to complete any decision from the two results in a predictable
rate to a certain condition

Authentication 4. It should be only the user who can log in and run the application.
Only the valid information can reach this software

Online Safety 5. The knowledge of cultivating and maximizing the user's private
personal safety and security risks on their private information that is in the internet

AntiCybercrime Group 6. In the Philippine government, it is responsible to enforce laws


on cybercrime to attain effective cybercrime campaign

Online Security 7. A branch of security that takes on the internet field. Their purpose
and objective is to establish guidelines, dealings, and measures to use against the
occurrences that attack over the internet

Etiquette 8. It’s the way people behave in an orderly manner in a social setting, and it
refers to your polite behavior and good manners

Cryptography 9. Assurance of privacy to the user, unauthorized user should not be able
to edit, change, copy, or read the information inside the application. The security must
be strong enough to secure the application

Spyware 10. It is a program or software that will steal information and changing user
data

Spam 11. It is a message thru email that the receiver did not want or ask to receive a
message from the sender

Auditing 12. Recording and tracking the execution of the application. In tracking the
execution of the application, you will notice if there are any suspicious on the
application. Also, you should able to trail the events

Encryption 13. It is the process of encoding information wherein only the authorized
people can access those information
Authorization 14. It should be only the authorized user who can change, edit, and read
all the information inside the application. If there's any suspicious activity, the user or
the owner should be verified through email, personal phone number or any that can
reach that will notify the user

Netiquette 15. The combination of the two words network and etiquette. It refers to the
distinguished set of rules for what is considered to be acceptable as good online
behavior and it also emphasizes on what are tolerable usage of online resources

You might also like