E Tech
E Tech
1. Never give any personal information out about yourself over the internet.
2. Do not give any banking or sensitive information unless you are sure that
it is a reputable business having a secure service. To make sure that you
are in a secured network, the website address should begin with “https://’
as opposed to “http://”. Never access your accounts by following an email
link, instead type your URL by yourself.
3. Never open messages or attachments from someone you do not know.
4. Regularly review your privacy settings in your online accounts to make
sure you are not sharing important personal information.
5. When using a public computer terminal, be sure to delete your browsing
data before leaving.
6. Keep your software updated to avoid security holes.
7. Do not download or install software or anything on your computer or cell
phone that is unknown to you.
Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:
Kinds of Online Threats
• Online threat is deemed any malicious act that attempts to gain access to
a computer network without authorization or permission from the owners.
These are usually done by computer hackers who uses the World Wide Web to
facilitate cybercrime.
• Web threats use multiple types of malware and fraud, all of which utilize HTTP
or HTTPS protocols, but may also employ other protocols and components,
such as links in email or Instant Messaging apps, or any malware attachments
on servers that access the Web.
• They benefit cybercriminals by stealing information for subsequent sale and
help absorb infected PCs into botnets.
• Web threats pose a broad range of risks, including financial damages, identity
theft, loss of confidential information/data, theft of network resources,
damaged brand/personal reputation, and erosion of consumer confidence in
e-commerce and online banking.
Phishing
happens when an email is sent from an internet criminal
disguised as an email from a legitimate, trustworthy source.
The message is meant to lure you into revealing sensitive or
confidential information.
Pharming
happens when a hacker (or “pharmer”) directs an internet
user to a fake website instead of a legitimate one. These
“spoofed” sites can capture a victim’s confidential
information, including usernames, passwords, and credit card
data, or install malware on their computer. Pharmers usually
focus on websites in the financial sector, including banks,
online payment platforms, or other e-commerce destinations.
Internet Scam
Cyberstalking
Spoofing happens when someone or something pretends to be
something else to gain our confidence, get access to our systems,
steal data, steal money, or spread malware.
Effective Internet Research
The Internet has made our lives easier especially in terms of doing research.
By browsing the internet, we can access limitless topics. Web-based catalogs
are available in many libraries to assist researchers in locating printed books,
journals, government documents and other materials. The biggest obstacle
facing all researchers on the internet is how to effectively and efficiently
access the vast amount of information available (The Internet: Research
Tools, 2013)
Effective Internet Research
websites used for retrieval of data, files, or
Search Engines documents from data bases. Some search engines
we use today are
Effective Internet Research
A URL is one type of Uniform Resource Identifier (URI).
Anatomy of a URL It is a generic term for all types of names and
addresses that refer to objects on the world wide web.
Knowing the URL endings will give you clues to who is
sponsoring the website and help evaluate the sources
3. Plus (+) – indicates that the word after the sign is a required word
must be found in search. Example: +fire
4. Minus (–) sign – indicates to exclude a word from your search that is
not required on the result. Example: Jaguar speed –car
Search Skills and Tools
5. Ampersand (@) is used to find social tags. Example: @SteveJobs
7. Finding Documents – using the filetype refines the search for documents on
the web.
o filetype:pdf o filetype:doc o filetype:xls
02 Purpose- The purpose of the information presented in the site should be clear.
Some sites are meant to inform, persuade, state an opinion, entertain, or parody
something or someone.
03 Coverage- This refers to how comprehensive the website is in their discussion of certain
topics.
04 Currency- It refers to: (1) how current the information presented is, and (2) how often
the site is updated or maintained. It is important to know when a site was created, when
it was last updated, and if all of the links are current.
THANK
YOU
Prepared by: Ms. Ivy L. Bello