0% found this document useful (0 votes)
19 views32 pages

Empowerment Technology Lesson 2

Empowerment-technology-Lesson-2

Uploaded by

jotarogtaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views32 pages

Empowerment Technology Lesson 2

Empowerment-technology-Lesson-2

Uploaded by

jotarogtaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

EMPOWERMENT TECHNOLOGY

Presented By: Aaron James M. De Mesa


QUICK ACTIVITY
 Guess the words:
1. M_L_ARE
2. V_R_S
3. S__M
4. _D_ ARE
5. PH_S_IN_
6. K _ _L O _ G _ R
7. C_BE_ A__A_K
8. _ Y _ E R S_ C _ R _ TY
9. P__SW_ R_
10. __SSC _DE
ONLINE SAFETY & SECURITY
The internet is very useful tool for all the digital natives and citizens in a
digital society, However this will also make you vulnerable to online threats
and attacks.
CYBER THREATS
the possibility of malicious attempt to damage or disrupt a computer
network or system.
TRIVIA:
In 2012 Roger A. Grimes named the top 5 cyber threats
• Social Engineered Trojans
• Unpatched Software
• Phishing
• Network Traveling Worms
• Advanced Persistent Treats
CYBERATTACKS
Cyberattacks are the exploitation of vulnerabilities that were brought about
by increased internet connectivity.
Let us discuss the types of cyberattacks users should avoid:
1. Malware – or malicious software is a program or file that can harm your
computer by stealing data or destroying something in your computer.
2. Phishing – it is a form of cyberattack to obtain sensitive information like
username and passwords through malicious e-mails.
3. Password Attacks – this can happen to a user if a third party Is trying to
gain access to your systems by cracking a user’s password
4. Denial-of-Service (DOS) – this occurs when a malicious actor stops
legitimate users from getting into specific computer systems, devices,
services or other digital resources.
CYBERATTACKS
5. Man in the Middle – this may happen by impersonating the endpoints in
an online information exchange via smartphone to a website.
6. Malvertising – are done by malicious actors that upload infected ads ro
different websites using an advertising network.
7. Rogue Software – malware that pretends to as legitimate software
designers make pop-up windows that look like legitimate alerts.
ONLINE THREATS

• Online threat is deemed any malicious act that attempts to gain


access to a computer network without authorization or permission
from the owners.
• The following are some threats you should be aware of:

1. Pharming happens when a hacker (or “pharmer”) directs an internet


user to a fake website instead of a legitimate one. These “spoofed”
sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on
their computer.
ONLINE THREATS

2. Internet Scam generally refers to someone using internet services or


software to defraud or take advantage of victims, typically for
financial gain.
3. Internet robots are also known as spiders, crawlers, and web bots.
It is a software application that is programmed to do certain tasks.
4. Spams are unsolicited emails, instant messages coming from recipients
that are not granted verifiable permission for the message to be
sent. Spam messages can be damaging if you open or respond to it.
5. Cyberstalking refers to the use of the internet or other electronic device
to harass or stalk individuals or organizations.
ONLINE THREATS
6. Cyberbullying refers to the act of tormenting, harassing, or
embarrassing another person using the internet.
7. Spoofing happens when someone or something pretends to be
something else to gain our confidence, get access to our systems,
steal data, steal money, or spread malware
CYBER SECURITY
What is Cyber Security?
- Refers to the body of technologies, processes and practices
designed to protect networks, computer programs and data from attack,
damage and unauthorized access.
Let us discuss some steps to keep you safe from cyber threats:
1. Make your password strong and unique
2. Get a Virtual Private Network (VPN) and use it
3. Turn on 2 factor authentication
4. Use passcodes even if they are optimal
5. Use different e mail address for different types of accounts
6. Clear your cache
7. Turn off ‘save password’ feature in browsers
8. Don’t fall prey to click bait
CYBER SECURITY
9. Explore the Security Tools You Install
- Security tools such as anti – virus software programs are a big help in
keeping not only your account but your devices safe from malware and data
breach.
- Before using one of these you have to make sure that it is safe to use, here
are some things you should check on before installing that software.
a) All inclusive protection – protects your device from malware from the web
and external devices attached to yours.
b) Reliable protection – it has to conduct regular security scans without user
trigger and automatically ejects data from unwanted sources.
CYBER SECURITY

c) Performance impact – some antivirus programs tend to make devices lag this
making it inefficient to use. Make sure to use software that will enhance yout
device’s performance instead of the other way around.
d) Easy to Use – in orde for you to maximize the capabilities of the program you
have to be able to understand all of its components just by navigating it. The
program must be able to present itself in a way that would be understood by
non technical users.
e) Available Support – sometimes even if the program’s user interface is well
done there are certain things that we still need help with support for the
program should always be available in case the user needs help
NETIQUETTE
• What is Netiquette?
• Netiquette or network etiqueutte is concerned with the proper manner of
communication in the online environment.

• Core Rules of Netiquette


• Rule 1 Remember the Human
• Rule 2 Adhere to the same standards of behavior online that you follow in real life.
• Rule 3 Know where you are in cyberspace
• Rule 4 Respect others people’s time and bandwith
• Rule 5 Make yourself look good online
NETIQUETTE

• Core Rules of Netiquette


• Rule 6 – Share expert knowledge
• Rule 7 Help keep the flame wars under control
• Rule 8 Respect other people’s privacy
• Rule 9 Don’t abuse your power
• Rule 10 Be forgiving of other peoples mistake
ONLINE NAVIGATION
The manner of collectively searching for and saving requested
information through the computer from databanks that are online is known
as online navigation.
CONTEXTUALIZED ONLINE SEARCH

Contextualized search on the Internet is different from the


traditional way of getting information that returns a list of papers or
documents relevant to the request of the user.
Here are some tips in conducting an online research:

1. Have a question in mind. Focus on a question you want to be


answered. If it is a series of questions, start with one. Never search
everything on one go. Do it one at a time.
2. Narrow it down. Be specific. Search engines like Google, Bing, or Yahoo
use several filters to determine the most appropriate result for you.
CONTEXTUALIZED ONLINE SEARCH
3. Advanced Search. The best way to filter information you get from
search engines is by using the advanced search. This will allow you
to filter out information you do not need.
STEPS IN ADVANCED SEARCH

1. In your desktop, laptop or smartphone, open the browser and search


Google or any search engine (but we will use google for now) and type
the word, phrase of though you want to search.
STEPS IN ONLINE NAVIGATION

2. On the right side of the page look for the gear icon and click it
STEPS IN ADVANCED SEARCH

3. Click on the advanced search.


STEPS IN ADVANCED SEARCH

4. Type the keywords that you would like to search and clikc the
advanced search button. You can search through all the words that
you’ve typed, or you can narrow it down to a specific word
STEPS IN ADVANCED SEARCH
5. Alternatively you can also search advanced search or google
advanced search and the first search result will lead you to the same
page.
CONTEXTUALIZED ONLINE SEARCH

4. Look for a credible source. Some wikis, though filled with updated
information are not credible sources. This is because anyone can
edit its content. When using wikis, check out the link of the cited text
(indicated by superscript number) to be navigated to the footnote
where the list of sources is located.
CONTEXTUALIZED ONLINE SEARCH
CONTEXTUALIZED ONLINE SEARCH
5. Give credit. If you are going to use the information from a
source for educational purposes, give credit to the original author of
the page or information.

Example is in the next slide


CONTEXTUALIZED ONLINE SEARCH
RESEARCH SKILLS

In order to achieve or access what you are looking for, you need to
improve yourself. As the old saying goes, “Practice Makes Perfect”. Good
research skills is a product of multiple and continuous searches.

On the next slide are some skills you can use to improve or adapt your
research skills
RESEARCH SKILLS

1. Critical thinking – As you search through the web, you must think very
carefully about the information you have gathered. Critical thinking
involves the ability to reflect on the information presented to you.
2. Data Organization – A good researcher can organize his/her collected
data. As you collect those data, be sure to track where specific
information is gathered.
3. Research Presenting – Part of your research is the actual writing, be
creative and reflective in writing your search, explain every detaila and
step into achieving your objective.
RESEARCH SKILLS

• Remember that not all searchers are good ones, some are considered as
satirical or untrue. Here are some tips in identifying good searchers from
satirical searches.
1. If the contents of the source are to impossible to happen or too good to be
true then there must be something wrong.
2. If the site started as a false site for public figures such as TV personalities or
political figures, then uploaded stories from different sources, it is a satirical
one.
3. If the site is unfamiliar and continuously popping ads, then it is satirical.
RESEARCH SKILLS

• Examples of satirical news


1. The 2 years in K – 12 Curriculum for Senior High School has been Removed
2. You can win 1 million pesos just by answering a given survey.
3. A certain actress/actor is alleged as pregnant being in another country for a
long time
4. There’s a high chance that hot singles in your area want to meet you read
here to find out more.
ADDITIONAL INFORMATION
• Copyright infringement
• If you create something – an idea, an invention, a form of literary work, or a
research, you have the right as to how it should be used by others. This is
called intellectual property. The copyright law includes your rights over your
work, and anyone who uses it without your consent is punishable by law.
• Here are some tips to help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings,
drawings, films, music and lyrics, choreography, and sculptures, but
generally does not protect underlying ideas and facts. This means that you
can express something using your own words, but you should give credit to
the source.
ADDITIONAL INFORMATION

2. Be responsible. Even if the material does not say that it is copyrighted,


it is not a valid defense against copyright. Be responsible enough to
know if something has a copyright.
3. Be Creative. Ask yourself whether what you are making is something that
came from you or something made from somebody else’s creativity. It is
important to add your creative genius in everything that will be credited to
you
4. Know the Law. There are some limitations to copyright laws. In the
Philippines, copyrights only last a lifetime (of the author) plus 50 years.
Another limitation is the Fair Use.
• Fair Use - means that an intellectual property may be used without consent if
it is used in commentaries, criticisms, search engines, parodies, news reports,
research, library archiving, teaching and in education.
END OF LESSON 2

You might also like