Week 2 Rules of Netiquette
Week 2 Rules of Netiquette
Module/Week 2:
DESCRIPTIVE TITLE: Online Safety, Security, and Rules of Netiquette
Sub-topics:
1. Online Security, safety, and ethics
2. Internet Threats
3. Protecting Reputations Online
4. Copyright
5. Contextualized online search and research skills
Learning Objectives:
At the end of the lesson, the students should be able to:
a. Consider one’s and others’ safety when sharing information using the internet;
b. Consider one’s and others’ reputation when using the internet;
c. Determine and avoid the dangers of the internet;
d. Be responsible in the use of social networking sites; and
e. Browse the internet efficiently and properly through proper referencing.
Discussion
INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
Internet security
Security Requirement Triad
Confidentiality
Data confidentiality Privacy
Integrity
Data integrity and System integrity
Availability
Threat Consequence Threat Action (Attack)
by an unauthorized entity.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
Masquerader
Hackers
Clandestine user
Parts of Virus
Infection mechanism
Trigger
PayloaD
Virus stages
Dormant phase - Virus is idle.
Propagation phase - Virus places an identical copy of itself into other programs or into certain system
areas on the disk.
Triggering phase - Virus is activated to perform the function for which it was intended. Caused by a
variety of system events
Execution phase - Function is performed
Internet Threats
1. Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
Rogue security software– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
Adware- a program designed to send you advertisement, mostly pop-ups.
2. Spam– unwanted email mostly from bots or advertisers.
3. Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
KEY TERMS:
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.
Page 4 of 6
Empowerment Technology_Week 2
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
- NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
Question
- a question may be entered in the search field of search engine
Advanced Feature
- are offered on many engines by going to an “Advanced search” page and making selections.
Effective in narrowing search returns to a specific topic or phrase.
Exploration #1
Privacy Policies
Visit a social networking site and look for the site’s privacy policy. The link is typically found at the
bottom of the page and sometimes labeled only as “Privacy”. Write a summary on how the website handles both
your private and public information.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
_________________________________________________________________________________________.
Exploration #2
Research for several news and events related to cybercrime. Using your cellphone or any video-
recording device, report it as if you were a newscaster. Present in 1-2 minutes recording. You can post your
video-recording report in your social media account to share and bring awareness to your friends or send it to
your instructors’ email address.
Thinking Exercise
1. Do you agree or disagree with the provisions of the copyright law? Defend your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________
Page 5 of 6
Empowerment Technology_Week 2
_______________________________________________________________________________________
______________________________________________________________________________________.
2. How would you feel if someone posted something embarrassing about you? What would you do?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
______________________________________________________________________________________.
Challenge
Create a campaign material promoting “Think before you click.” It could be in a form of small
infographics posted in your social media accounts. This campaign is an awareness program for the younger
batches in this generation.
Page 6 of 6