0% found this document useful (0 votes)
733 views3 pages

Building and Enhancing New Literacies Across The Curriculum

Cyber/digital literacy and cybersecurity can be integrated into teaching and learning in the following ways: 1. Cyber/digital literacy refers to properly using technology while understanding its consequences, while cybersecurity prevents unauthorized access to networks and data. 2. Teachers can help students develop cyber citizenship through responsible technology use, and teach netiquette through examples like avoiding offensive posts and respecting privacy. 3. Common computer threats like viruses can be addressed through anti-virus software, firewalls, and user education, while an information security policy helps secure systems and data.

Uploaded by

Adora ortego
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
733 views3 pages

Building and Enhancing New Literacies Across The Curriculum

Cyber/digital literacy and cybersecurity can be integrated into teaching and learning in the following ways: 1. Cyber/digital literacy refers to properly using technology while understanding its consequences, while cybersecurity prevents unauthorized access to networks and data. 2. Teachers can help students develop cyber citizenship through responsible technology use, and teach netiquette through examples like avoiding offensive posts and respecting privacy. 3. Common computer threats like viruses can be addressed through anti-virus software, firewalls, and user education, while an information security policy helps secure systems and data.

Uploaded by

Adora ortego
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BUILDING AND ENHANCING NEW LITERACIES ACROSS THE CURRICULUM

Module Nine: Digital / Cyber Literacy


Activity 1

Instruction: Discuss and explain.

1. How do you define cyber/digital literacy and cybersecurity?


Cyber literacy refers to the capacity to properly use computer technologies while also comprehending the
consequences of those activities. It's also crucial to know where to go in cyberspace to find dependable and accurate
materials, sometimes known as cyber intelligence. This focuses on assisting students in locating these resources and
avoiding inaccuracies. Cybersecurity is the art of preventing unwanted access to networks, devices, and data, as well as
the practice of preserving the confidentiality, integrity, and availability of information and data against assault and harm.
Information technology security is another term for cyber security.

2. What do you mean by cyber citizenship?


Cyber citizenship refers to the responsible use of technology by everyone who engages with, on any level using
computers, the Internet, or digital gadgets.relates to using the internet in a responsible manner. This digital world's
power comes with a set of obligations and consequences. As a result, we may examine and traverse all of the material
available online; but, we must tread carefully when doing so. 

3. What are netiquette and the process of safe use of digital media? Give examples.
Netiquette is short for "Internet etiquette," and it is a rule of good behavior on the Internet, similar to how
etiquette is a code of polite behavior in life. These are some examples:
 Avoid posting inflammatory or offensive comments online (a.k.a flaming).
 Respect others' privacy by not sharing personal information, photos, or videos that another person may not
want published online.
 Never spam others by sending large amounts of unsolicited email.
 Show good sportsmanship when playing online games, whether you win or lose.
 Don't troll people in web forums or website comments by repeatedly nagging or annoying them.
 Stick to the topic when posting in online forums or when commenting on photos or videos, such
as YouTube or Facebook comments.
 Don't swear or use offensive language.
 Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive
post.
 If someone asks a question and you know the answer, offer to help.
 Thank others who help you online.
4. What are the common computer threats, and how can these be fixed?
In the context of computer security, a threat is something that has the potential to inflict significant harm. It is
something that may or may not happen, but has the potential to inflict major damage and lead to computer system and
network assaults. Cybercrime is increasingly becoming frightening in the lives of every individual and company to steal
data they may sell or trade, such as financial information, credit card information, and personal information or any other
information obtained through the use of computer networks.
The common threats are:
1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all computers, including
all servers, PCs and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released daily and so it
is essential that computers are protected by keeping the anti-virus software-up to-date.
3. Employ a firewall to protect networks. As computer viruses can spread by means other than email, it is
important that unwanted traffic is blocked from entering the network by using a firewall.
4. Filter all email traffic. Example of emails with certain file attachments commonly used by computer
viruses to spread themselves, such as .EXE, .COM and SCR files. These should be prevented from entering the
network.
5. Educate all users to be careful of suspicious emails. Ensure that all users know to never open an
attachment or to click on a link in an email they are not expecting.
6. Scan Internet downloads. Ensure that all files downloaded from the Internet are scanned against computer
viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted source for software requirements
to be installed and ensure it can be accounted for.
8. Implement a vulnerability management system. It is important to regularly review network and the
applications running on it for new vulnerabilities and a plan on how to manage them, either by patching or
upgrading them using tools, such as firewalls or Intrusion Detection Systems that should be put in place.
9. Make regular backups of critical data. There is a need to keep important files on removable media, such
as portable drives or tape for back-up in the event that the network is infected with a computer virus.
10. Develop an Information Security Policy. The creation and publication of an Information Security Policy
is key to ensuring that information security receives the profile it requires in order to secure the systems and
data.
11. Monitor logs and systems. Regular monitoring of network and system logs can assist in the early
identification of a computer virus infecting the network or other attacks by criminals.
12. Develop an Incident Response Plan. The incident response plan outlines the roles and responsibilities of
people in the event of a computer virus infecting the network or any other type of security breach.
13. Restrict end-user access to the systems. Where possible, end users are prohibited from access to the
system so that the virus will also be restricted.

5. What is meant by cyberbullying and cybercrimes?


Cyberbullying refers to a specific type of cybercrime: bullying. When a person is bullied online, usually
through social media, it is referred to as cyberbullying. Bullying is defined as any harsh, threatening action that is
intended to disturb or damage another person's feelings. It can take place on mobile devices, through text, applications,
or online in social media, forums, and games where individuals can see, engage in, or exchange material. It involves
emailing, posting, or spreading defamatory, false, or malicious information about another person.
The cybercrime refers to a variety of crimes that may be carried out utilizing the Internet as a key tool. Hacking
into accounts, fraud, theft, and the spread of computer viruses are only a few examples. Any criminal conduct involving
computers or the internet is referred to as cybercrime. Cybercriminals utilize phishing, social engineering, and various
types of malware in their cyber attacks, which range from rogue individuals to organized crime organizations to state-
sponsored factions.
6. How can you practice the processes of internet exploration, source citation, research and data-gathering protocols, and
website evaluation.
The Internet is a worldwide computer network that allows computers to communicate and share information.
global information It allows individuals all around the world to communicate and share ideas in real time. Geographical
zones and places However, because cyberspace is such a vast domain, it might be difficult to keep track of the 
finding the information we require.  As a result, having techniques in place for exploring the Internet is the most
effective approach to do it in conducting research on the internet and reviewing websites. Here are some strategies for
pinpointing the best, most relevant content include the following:
 Vary your search engine: in fact, get used to using several, as they have different strengths.
 Use specific keywords: be as specific as you can in your wording.
 Simplify your search terms: strip out unnecessary stop words and avoid suffixes.
 Use quotation marks: this narrows searches down to particular words and phrases.
 Remove unhelpful words: remove confusing or misdirecting terms from your searches with the - (minus)
operator.
 Refine your search using operators: use operators to search specific sites, related sites, and particular
combinations of terms.
 Avoid search pitfalls: the internet is a selling tool as well as a fantastic resource. Be sure that you only view
advertisements if you want to.

7. How can cyber/digital literacy be integrated into the teaching-learning process?

It is very important to integrate cyber/digital literacy into the teaching-learning process because digital literacy it
mezn dapitmeans being able to understand and use technology. It is the ability to comprehend and use technology they  can utilize
their digital literacy abilities to access, consume, and create information online in a productive and beneficial way. Understanding
digital literacy allows us to utilize technology securely and avoid its risks. Effective and appropriate
Teommunication. In order to fully learn digitally, students must possess the skills. Allowing pupils to be creative and include their
particular interests and styles into their work empowers them and prepares them for the future. Allowing pupils to be creative and include
their specific interests and styles into their work empowers them and prepares them for the future.

You might also like