0% found this document useful (0 votes)
8 views

Week 2 Rules of Netiquette

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Week 2 Rules of Netiquette

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Empowerment Technology_Week 2

Module/Week 2:
DESCRIPTIVE TITLE: Online Safety, Security, and Rules of Netiquette
Sub-topics:
1. Online Security, safety, and ethics
2. Internet Threats
3. Protecting Reputations Online
4. Copyright
5. Contextualized online search and research skills
Learning Objectives:
At the end of the lesson, the students should be able to:
a. Consider one’s and others’ safety when sharing information using the internet;
b. Consider one’s and others’ reputation when using the internet;
c. Determine and avoid the dangers of the internet;
d. Be responsible in the use of social networking sites; and
e. Browse the internet efficiently and properly through proper referencing.

Discussion

INTERNET SAFETY- it refers to the online security or safety of people and their information when using
internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.

TEN RULES OF NETIQUETTE


• There are ten rules of Netiquette that everyone who goes online should follow.
• You should remember them every time you go online.
• Netiquette is a set of rules for behaving properly online.
Page 1 of 6
Empowerment Technology_Week 2

Rule No. 1: Remember the human


 You need to remember that you are talking to a real person when you are online.
 The internet brings people together who would otherwise never meet.
 Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
 You need to behave the same way online that you do in real life.
 You need to remember that you can get caught doing things you should not be doing online just like you
can in real life.
 You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
 Always take a look around when you enter a new domain when surfing the web.
 Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
 Remember people have other things to do besides read your email. You are not the center of their world.
 Keep your post and emails to minimum by saying what you want to say.
 Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
 Be polite and pleasant to everyone.
 Always check your spelling and grammar before posting.
 Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
 Ask questions online
 Share what you know online.
 Post the answers to your questions online because someone may have the same question you do.
Rule no. 7: Help keep flame wars under control
 Netiquette does not forbid flaming.
 Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group
down.
Rule no. 8: Respect other people’s privacy.
 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
 Do not take advantage of other people just because you have more knowledge or power than them.
 Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot see the person face to
face.

Ten Commandments of Computer Ethics


Ten Commandments taken from the User Guidelines and Netiquette by Arlene Rinaldi.
1. Thou shalt not use computer to harm people.
2. Thou shalt not interfere with other people’s work.
3. Thou shalt not snoop around other people’s files.
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software.
7. Thou shalt not use other people’s computer resources.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways they show consideration and respect.
Email Etiquette
• There are etiquette rules for email messages also. They are as follows:
• Check your email daily
Page 2 of 6
Empowerment Technology_Week 2

• Delete unwanted messages.


• Keep messages in your box to a minimum
• Mail messages can be downloaded and save for future references.
• Never assume that your Email can be read by no one but yourself.
• Remember there are always be lurking around online

Internet security
Security Requirement Triad

Confidentiality
Data confidentiality Privacy
 Integrity
Data integrity and System integrity
 Availability
Threat Consequence Threat Action (Attack)

Exposure: Sensitive data are directly released to an


unauthorized entity.
Interception: An unauthorized entity directly
accesses sensitive data traveling between
authorized sources and destinations.
Inference: A threat action whereby an
unauthorized entity indirectly accesses sensitive
data by reasoning from characteristics or
Unauthorized Disclosure byproducts of communications.
A circumstance or event whereby an Intrusion: an unauthorized entity gains access to
entity gains access to data for which sensitive data by circumventing a system’s security
the entity is not authorized. protections.

Incapacitation: prevents or interrupts system


operation by disabling a system component.
Corruption: Undesirably alters system operation
by adversely modifying system functions or data.
Obstruction: A threat action that interrupts
delivery of system services by hindering system
Disruption operation.
A circumstances or even that interrupts Masquerade: An unauthorized entity gains access
or prevents the correct operation of to a system or performs a malicious act by posing
system services and functions. as an authorized entity.
Deception Falsification: False data deceive an authorized
A circumstance or event that may entity.
result in an authorized entity receiving Repudiation: An entity deceives another by falsely
false data and believing it to be true. denying responsibility for an act.

Usurpation Misappropriation: An entity assumes


A circumstances or event that results in unauthorized logical or physical control of a
control of system services or functions system resource.
Page 3 of 6
Empowerment Technology_Week 2

by an unauthorized entity.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
 Masquerader
 Hackers
 Clandestine user

Parts of Virus
 Infection mechanism
 Trigger
 PayloaD
Virus stages
 Dormant phase - Virus is idle.
 Propagation phase - Virus places an identical copy of itself into other programs or into certain system
areas on the disk.
 Triggering phase - Virus is activated to perform the function for which it was intended. Caused by a
variety of system events
 Execution phase - Function is performed

Internet Threats
1. Malware- stands for malicious software.
 Virus- a malicious program designed to transfer from one computer to another in any means possible.
 Worms– a malicious program designed to replicate itself and transfer from one file folder to another and
also transfer to other computers.
 Trojan-a malicious program designed that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hacker to get your information.
 Rogue security software– is a form of malicious software and internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying money for a fake
malware removal tool.
 Spyware– a program that runs in the background without you knowing it. It has the ability to monitor
what you are currently doing and typing through key logging.
 Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other
sensitive information.
 Adware- a program designed to send you advertisement, mostly pop-ups.
2. Spam– unwanted email mostly from bots or advertisers.
3. Phishing- acquires sensitive personal information like passwords and credits card details.
 Pharming- a more complicated way of phishing where it exploits the DNS system.

KEY TERMS:
Cyber crime- a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is
punishable by law.

Page 4 of 6
Empowerment Technology_Week 2

Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.

Four search strategies


 Keyword searching
- Enter terms to search
- Use quotation marks to search as a phrase and keep the words linked together
- Common words are ignored (That, to, which, a, the …)
- + and – can be used to include or exclude a word
 Boolean
- AND – enter words connect with AND- it will include sites where both words and found
Uses: joining different topics (i.e. global warming AND California)
- OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse effect)

- NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
 Question
- a question may be entered in the search field of search engine
 Advanced Feature
- are offered on many engines by going to an “Advanced search” page and making selections.
Effective in narrowing search returns to a specific topic or phrase.

Exploration #1

Privacy Policies
Visit a social networking site and look for the site’s privacy policy. The link is typically found at the
bottom of the page and sometimes labeled only as “Privacy”. Write a summary on how the website handles both
your private and public information.
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
_________________________________________________________________________________________.

Exploration #2

Cyber News Report

Research for several news and events related to cybercrime. Using your cellphone or any video-
recording device, report it as if you were a newscaster. Present in 1-2 minutes recording. You can post your
video-recording report in your social media account to share and bring awareness to your friends or send it to
your instructors’ email address.

Thinking Exercise

1. Do you agree or disagree with the provisions of the copyright law? Defend your answer.
_______________________________________________________________________________________
_______________________________________________________________________________________

Page 5 of 6
Empowerment Technology_Week 2

_______________________________________________________________________________________
______________________________________________________________________________________.
2. How would you feel if someone posted something embarrassing about you? What would you do?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
______________________________________________________________________________________.

Challenge

Create a campaign material promoting “Think before you click.” It could be in a form of small
infographics posted in your social media accounts. This campaign is an awareness program for the younger
batches in this generation.

Page 6 of 6

You might also like