Lesson 2 em Tech
Lesson 2 em Tech
Lesson 2 em Tech
There is still a risk in If sharing your first name Sharing just your middle
sharing your first name. is a small risk, having name is probably not the
Chances are, a hacker both your first and last is most risky of these shared
already knows plenty of a more risky. You will be information, but sharing
stuff about you even if you vulnerable to being your entire full name
only give out your first searched for using would be.
name. You cannot just walk search engines, which
in a room and start include image search.
introducing yourself to Matching a name with a
everyone. You do not know face can led to several
whom you can come cybercrimes like identity
across with. theft.
TYPE OF INFORMATION AND RISK
4. CURRENT AND 5. YOUR CELLPHONE
PREVIOUS SCHOOL(S) NUMBER
Most people who steal Your cellphone number should never
identities study their subject. be posted over the Internet. The
They can use this information Internet is a public place. It is the same
for verification purposes. as posting your number on a billboard.
Risky, yet not as risky as posting their full names, especially your
mother's maiden name. In fact, if you have already encountered many
websites that require your mother's maiden name as an answer to a
secret question whenever you lose your password.
TYPE OF INFORMATION AND RISK
7. WHO YOUR SIBLINGS 9. YOUR HOME PHONE
ARE NUMBER
This is a huge risk, especially Scams usually use this information
if you have younger siblings. to deceive you, one of which is
Strangers may pretend or use when a stranger pretends to know
their identity to deceive you. your parents or pretends to be you.
Never post
Avoid logging in to anything about a
future vacation. It
public networks/Wi- is similar to
Fi. Browsing in posting, "Rob my
"incognito (or house at this
Do not talk Add friends
private) mode will date."
NOT protect you to strangers you know in
from hackers. whether real life.
online or
face to face.
TIPS TO STAY SAFE ONLINE
TYPES:
a. Virus d. Spyware
b. Worm e. Adware
c. Trojan f. Ransomware
TYPES OF MALWARE
A. VIRUS
a malicious program
designed to replicate itself
and transfer from one
computer to another
(internet, local networks,
FDs, CDs, etc.) and causes
damage to data and
software.
TYPES OF MALWARE
B. WORM
a malicious program that
transfers from one computer
to another by any type of
means.
Ex. ILOVEYOU Worm - The
malware originated in the
Pandacan neighborhood of
Manila in the Philippines on
May 5, 2000.
TYPES OF MALWARE
C. TROJAN
a malicious program that
disguises as a useful
program but once
downloaded or installed,
leaves your PC
unprotected and allows
hackers to get your
information.
Ex. Rogue security software - tricks
user into posing that it is a security
software.
TYPES OF MALWARE
D. SPYWARE
a program that runs in the
background without you knowing it
(thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
2. Do not copy,
share or alter 4. Consider
without buying
1. Always content. 5. Give credit
seeking to the original
assume that
permission. 3. Review author of the
the work is
copyrighted and retain page or
licensing information
agreements.
FAIR USE
In its most general sense, a fair use
is any copying of copyrighted
material done for a limited and
“transformative” purpose, such as
to comment upon, criticize, or
parody a copyrighted work.