ETech Q1 M2
ETech Q1 M2
Technologies
Quarter 1 – Module 2:
Online Safety, Security,
Ethics, and Etiquette
For the learner:
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a learner
is capable and empowered to successfully achieve the relevant competencies and
skills at your own pace and time. Your academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.
2
Assessment This is a task which aims to evaluate your
level of mastery in achieving the learning
competency.
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
This module was designed and written with you in mind. It is here to help you master
the Online Safety, Security, Ethics and Etiquette. The scope of this module permits
it to be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
3
What I Know
Choose the letter of the best answer. Write the chosen letter on a separate sheet of
paper.
1. What type of file does key logger software typically use to store its recording?
a. Data Files
b. Virus Files
c. Text Files
d. Log Files
2. Raffy is using a technique that tries to take information from the user. He
commonly takes things like credit cards, usernames, passwords, and home
address. What type of threat is depicted in the scenario?
a. Fishing
b. Scam
c. Spam
d. Phishing
4
Lesson
Online Safety, Security,
2 Ethics and Etiquette
What’s In
From the previous lesson, we've learned that there are three versions of Web
Technologies: Web 1.0, Web 2.0, and Web 3.0. Further, we said that as the world of
ICT continues to evolve, the industry has developed several innovations that cater to
the needs of the people whether it is for business or personal use. These trends in
ICT in today's generation focuses on technological convergence, social media, mobile
technologies, and assistive media.
The internet has radically changed the way people interact with the world. They have
accounts on different online platforms; some have unlimited Internet access, and
some are active users of the web. Yet along this opportunity are the new risks or
threats that the Internet may bring. Hence, online safety or Internet safety is an
emergent concern for children.
Read the headlines found below and try to reflect on the questions that follow.
ABS-CBN News Topic Page on Identity-theft. Retrieved from https://news.abs-cbn.com/list/tag/identity-theft.
5
Reflect on the following questions:
What is common among the headlines above?
Are your social y ou may not be a victim of these things?
What type of information do you share in your social media
accounts?
There's almost no limit to what you can do online. The Internet makes it possible
to access information quickly, communicate around the world, and much more.
Unfortunately, the Internet is also home to certain risks, such as malware, spam, and
phishing. If you want to stay safe online, you'll need to understand these risks and
learn how to avoid them.
What’s New
Most of us use the Internet every day. Sometimes, we do not pay attention to how
much information we share online. Identify which of the following information you
have shared online and list down your answers on the separate sheet of paper.
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
How many information you have shared? You probably shared the first two items. If
that is the case, try using a search engine like Google then type your first and last
name. Did you get links to your profile page? Try switching to image search. Did your
pictures appear? If you have a unique name, chances are, it did. Do not feel bad if it
6
did not appear though; in fact, it is probably for your best interest not to have
pictures of yourself in a search engine.
So how did these things happen? How can search engines locate me? Is there any
danger of being found by search engines?
What is It
Let us go back to the previous activity. Let us visit each item and see how risky it is
to share them.
7
The Internet is defined as the information superhighway. This means that anyone
has access to this highway, can place information, and can grab that information.
This is why social networking sites like Facebook continue to improve their security
features. The threat of cybercrime is very real. Whatever information we share today
could affect our future.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my
house at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one anti-
virus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over the Internet
and they may be right. Some hackers can find a backdoor even if your profile is
already set to private. You have no control whoever is looking at your friend's screen
whenever they open your profile or chat with you.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where
such permission4 is required.
Here are some tips that could help you avoid copyright infringement:
9
What’s More
Transcript
One day I downloaded this particular program, and after that my computer
seemed to be a lot slower. It was taking forever for pages to load and even normal
things like writing an email or writing a Word document would take a long time. I
didn’t think too much of it ‘cos my computer was getting pretty old and I had heaps
of stuff on it. But then my home page got changed to some free download site and
when I checked my internet settings I found that they’d all been changed. But
things kept on getting worse. Whenever I went online to the internet I got
bombarded with pop-ups and, like, my computer would just crash and I would
have to manually reset it.
Then things got really serious. I couldn’t log-in to my email account and I
discovered that someone was using my internet banking. I had anti-virus software
installed onto my computer but it just wasn’t picking up anything.
What I didn’t realize at the time was that when I’d downloaded this free
program a couple of months ago, a smaller program downloaded and installed
itself onto my computer. But, I had no idea.
This spyware program monitored all my internet activity and the keylogger
recorded all the keystrokes I made on the computer such as my log-in, my
passwords and all the emails I sent to my mates. It then sent all this information
to the software developer. I ended up taking my machine to a computer specialist
who was able to find and remove all the spyware. I had to contact my bank and
my ISP to change my account details.
10
You know, even free stuff comes at a cost nowadays and I know it sounds
corny, but if it’s too good to be true then it probably is. Before I download anything
now I make sure there’s no adware or spyware associated with it and I read the
user agreement statement. There are websites online that, sort of, help you out
with this and can offer great reviews and advice on the program and company that
you’re downloading from. If it’s free, there’s usually a catch. I guess I learnt the
hard way.” - Brian
Brian complains that his virus protection doesn’t work. What do you think has gone
wrong?
Activity 2
Choose at least three of the mentioned online safety tips and explain.
11
What I Have Learned
12
From all you have learned in Lesson 2, why is there a need to “think before
you click?”
_________________________________________________________________________
_________________________________________________________________________
_____________________________________________________________
4. Your parents bought you your first cellphone. How will you share your cellphone
number?
a. Do not share your cellphone number to anyone.
b. Post your cellphone number in your social media account.
c. Share your cellphone number only in person.
13
d. Post your cellphone number in your group chat.
5. Your social media friends list should only be composed of _______.
a. Your favorite brands.
b. Family and friends
c. Anyone who sends you a friend request
d. Foreigners
14
What I Can Do
Share an experience that you have always tend to do but later did you discover that
it is not a standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
15
Assessment
16
Additional Activities
Solve the crossword below. Write your answers on the separate sheet of paper.
17