Lesson 2 em Tech

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Ms.

Maria Eloiza Tomaquin


PREPARED BY:
ONLINE SAFETY AND SECURITY
• The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in
touch with the old ones.
• It is also a source of entertainment through games,
online communities, and everything in between. But
like most things in this world, there is always "other
side of the coin".
• The internet is one of the most dangerous places
especially if you do not know what you are doing with it.
TYPE OF INFORMATION AND RISK
1. FIRST NAME 2. LAST NAME 3. MIDDLE NAME

There is still a risk in If sharing your first name Sharing just your middle
sharing your first name. is a small risk, having name is probably not the
Chances are, a hacker both your first and last is most risky of these shared
already knows plenty of a more risky. You will be information, but sharing
stuff about you even if you vulnerable to being your entire full name
only give out your first searched for using would be.
name. You cannot just walk search engines, which
in a room and start include image search.
introducing yourself to Matching a name with a
everyone. You do not know face can led to several
whom you can come cybercrimes like identity
across with. theft.
TYPE OF INFORMATION AND RISK
4. CURRENT AND 5. YOUR CELLPHONE
PREVIOUS SCHOOL(S) NUMBER
Most people who steal Your cellphone number should never
identities study their subject. be posted over the Internet. The
They can use this information Internet is a public place. It is the same
for verification purposes. as posting your number on a billboard.

6. WHO YOUR MOTHER


AND FATHER ARE

Risky, yet not as risky as posting their full names, especially your
mother's maiden name. In fact, if you have already encountered many
websites that require your mother's maiden name as an answer to a
secret question whenever you lose your password.
TYPE OF INFORMATION AND RISK
7. WHO YOUR SIBLINGS 9. YOUR HOME PHONE
ARE NUMBER
This is a huge risk, especially Scams usually use this information
if you have younger siblings. to deceive you, one of which is
Strangers may pretend or use when a stranger pretends to know
their identity to deceive you. your parents or pretends to be you.

8. YOUR ADDRESS 10. YOUR BIRTHDAY

Giving the Internet your Letting people know your birthday


number is one thing, giving is probably a must if you want to
them your address is a whole get as many gifts as possible. But
other level. It would be much having it in your profile makes you
easier for criminals to find you. vulnerable to identity theft.
TIPS TO STAY SAFE ONLINE
The Internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and can
grab that information.
It is a public place and it is up to you to protect yourself. Here are some
tips to help you stay safe when using the internet.

Be mindful Do not just Know the security Do not share


features of the social
of what you accept networking site you your
share online terms and use. By keeping your password
and what conditions; profile private, with anyone.
site you read it. search engines will
not be able to scan
share it to. your profile.
TIPS TO STAY SAFE ONLINE

Never post
Avoid logging in to anything about a
future vacation. It
public networks/Wi- is similar to
Fi. Browsing in posting, "Rob my
"incognito (or house at this
Do not talk Add friends
private) mode will date."
NOT protect you to strangers you know in
from hackers. whether real life.
online or
face to face.
TIPS TO STAY SAFE ONLINE

If you have Wi-


Avoid visiting Fi at home,
untrusted make it private
websites. network by
adding a
Install and update password. Avoid
an antivirus downloading
software on your anything
computer. Use from
only one anti- untrusted
virus software to websites.
avoid conflicts.
TIPS TO STAY SAFE ONLINE

Buy the software, Make online


do not use purchases
pirated ones Do not reply or from secure
click links from sites.
suspicious
emails.
THE CORE RULES OF NETIQUETTE
BY: VIRGINIA SHEA
NETIQUETTE is a combination of the words network and etiquette. It is a
set of rules for behaving online.

Remember the Adhere to the Know where


Human Rule. same standards you are in
of behavior cyberspace.
online that you
follow in real
life.
THE CORE RULES OF NETIQUETTE
BY: VIRGINIA SHEA

Respect other Share expert


people’s time and knowledge.
bandwidth. Make yourself
look good
online.
THE CORE RULES OF NETIQUETTE
BY: VIRGINIA SHEA

Help keep flame Don’t abuse


wars under your power.
control.

Respect other Be forgiving of


people’s the other’s
privacy. mistakes.
INTERNET THREATS
Here are some of the threats you should be aware of when
using the Internet:
1. MALWARE - or malicious software, is any program or
file that is harmful to a computer user.

TYPES:

a. Virus d. Spyware
b. Worm e. Adware
c. Trojan f. Ransomware
TYPES OF MALWARE

A. VIRUS
a malicious program
designed to replicate itself
and transfer from one
computer to another
(internet, local networks,
FDs, CDs, etc.) and causes
damage to data and
software.
TYPES OF MALWARE
B. WORM
a malicious program that
transfers from one computer
to another by any type of
means.
Ex. ILOVEYOU Worm - The
malware originated in the
Pandacan neighborhood of
Manila in the Philippines on
May 5, 2000.
TYPES OF MALWARE
C. TROJAN
a malicious program that
disguises as a useful
program but once
downloaded or installed,
leaves your PC
unprotected and allows
hackers to get your
information.
Ex. Rogue security software - tricks
user into posing that it is a security
software.
TYPES OF MALWARE
D. SPYWARE
a program that runs in the
background without you knowing it
(thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.

Ex. Keylogger – used to record


keystrokes done by the user. This
is done to steal their password or
any other sensitive information.
The key logger software typically
uses log file to store its
recording.
TYPES OF MALWARE
E. ADWARE
a program designed to
send you
advertisements, mostly
as pop-ups.
TYPES OF MALWARE
F. RANSOMWARE
or ransom software is a
type of malicious software
from cryptovirology that
threatens to publish the
victim's data or perpetually
block access to it unless a
ransom is paid.
INTERNET THREATS
Here are some of the threats you should be aware of when
using the Internet:
2. SPAM - an unwanted email mostly from bots or advertisers. It
can be used to send malware.
3. PHISHING - its goal is to acquire sensitive personal information
like passwords and credit card details. This is done by sending you
an e-mail that will direct the user to visit a fake website and be
asked to update his/her username, password, credit card or
personal information.
PHARMING - a more complicated way of phishing where it exploits
the DNS (Domain Name Service) system.
INTERNET THREATS
Here are some of the threats you should be aware of when
using the Internet:
Cyberbullying is when someone uses technology to
harass, threaten, embarrass, or target another person.
It happens on devices like smartphones, computers,
tablets, and gaming systems.

Cyberstalking is a type of stalking conducted using


technology. It’s characterized by repeated unwanted
messages, using technology to monitor the victim’s
activities and location, threats to expose confidential
information and threats to the victim’s safety.
PROTECTING REPUTATIONS ONLINE
Here are the things you might want to consider before
posting something over the internet:

1. Before your post something on the


web, ask these questions to yourself:
Would you want your parents or
grandparents to see it? Would you want
your future boss to see it?
2. If you feel that a post can affect you
or other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT
It is the use of works protected by copyright law without permission
for a usage where such permission is required.
Here are some tips that could help you avoid copyright infringement:

2. Do not copy,
share or alter 4. Consider
without buying
1. Always content. 5. Give credit
seeking to the original
assume that
permission. 3. Review author of the
the work is
copyrighted and retain page or
licensing information
agreements.
FAIR USE
In its most general sense, a fair use
is any copying of copyrighted
material done for a limited and
“transformative” purpose, such as
to comment upon, criticize, or
parody a copyrighted work.

Such uses can be done without


permission from the copyright
owner. In other words, fair use is a
defense against a claim of
copyright infringement.

You might also like