Empowerment Technologies LESSON 2
Empowerment Technologies LESSON 2
4. Show good
sportsmanship when
playing online
games, whether you
win or lose.
Examples of rules for
Good Netiquette
5. Stick to the topic
when posting in
online forums or
when commenting
on photos or videos,
such as YOUTUBE
or Facebook
comments.
Examples of rules for
Good Netiquette
6. Don’t swear or
use offensive
language.
Examples of rules for
Good Netiquette
7. Avoid replying to
negative comments
with more negative
comments. Instead
break the cycle
with a positive post.
Examples of rules for
Good Netiquette
8. If someone asks a
questions and you
know the answer,
offer to help.
Examples of rules for
Good Netiquette
9. Thank others
who help you
online.
Teenagers like you are exposed to many
things powered by the internet because
they are mostly into socializing, playing
games, reading sports news, shopping, etc.
The internet has given you the most powerful
tools that your parents did not enjoy during
their early days. For this reason, you must
observe proper internet usage.
Online Safety and Security
Internet is a powerful tool used to promote
business, gain new friends, and stay in touch with
the old ones. It is also a source of entertainment
through games, online communities, and
everything in between.
But there is always the “other side of the coin”.
Internet is one of the most dangerous places
especially if you are unaware of what you are
doing with it.
Types of Information
Risks
First name A big possibility that a hacker may already know plenty of stuff about you
even if you only give out your first name
Last name Having both your first and last is a more risky. You will be vulnerable to being
searched for using search engines, which include image search. Matching a
name with a face can lead to several cyber crimes like identity theft.
Middle name Sharing just your middle name is probably not the most risky of this shared
information, but sharing your entire full name would be.
Current and Most people who steal identities study their subject. They can use this
previous school(s) information for verification purposes.
Your cellphone This should never be posted because internet is a public place. It is the same
number as posting your number on a billboard. You would not random strangers to
text or call you, or worse, pretend that they are someone else.
Types of Information
Risks
Your Risky, yet not as risky as posting their full names, especially your mother’s
Mother/Father’s maiden name. In fact if you have already encountered many websites that
name require your mother’s maiden name as an answer to a secret question
whenever you lose your password.
Your siblings This is a huge risk, especially if you have younger siblings. Strangers may
pretend or use their identity to dupe you.
Your Address Giving the internet your address is a whole other level. It would much be
easier for criminals to find you.
Your home phone This shared information is more risky than sharing your personal mobile
number number. Scams usually use this information to deceive you, one of which is
when a stranger pretends to know your parents or pretends to be you
Your birthday Letting people know your birthday is probably a must if you want to get as
much gifts as possible. But having it in your profile makes you vulnerable to
Internet is defined as the information
superhighway means that anyone has access to
this highway, can place information, and can
grab that information.
Therefore, everyone is a prospect to cybercrime
threats. We may not experience it now but
whatever information we share today could
affect our future. With this reason, social
networking sites like Facebook continue to
improve their security features.
Internet Threats
-is a malicious act
that seeks to
damage data, steal
data, or disrupt
digital life in
general.
3 Types of
Internet
Threats
1. Malware
-Stands for malicious
software.
-Malware is any piece
of software that was
written with the intent
of doing harm to data,
device or people.
Types of
Malware
A. Virus
-Design to replicate
itself and transfer from
one computer to
another either through
the internet and local
networks or data
storage like flash drives
and CDs.
B. Worm
-Malicious program
that transfers from
one computer to
another by any type of
means. Often, it uses a
computer network to
spread itself.
C. Trojan
-Malicious program
that disguised as a
useful program but
once downloaded or
installed, leaves your PC Rogue security software – tricks the
user into posing that is a security
unprotected and allows software. It asks the user to pay to
hackers to get your improve the security but in reality
information. they are not protected at all.
D. Adware
-A program designed
to send
advertisements, mostly
as popups.
-Source of virus,
malware, worm and
etc.
E. Spyware
-A program that runs in the
background without you
knowing it. It has ability to
monitor what you are
currently doing and typing
through keylogging.
Keylogger – It is a malware that
saves your activity and password like
a history logs
2. Spam
-Internet threats that
floods untrue email.
-AKA junk mail
-Usually not dangerous
but can be time and
space consuming.
-Dangerous ones can
carry viruses and other
malicious software
(Malware)
How to get rid of
JUNK MAILS?
Delete all EMAIL SPAM,
Unsubscribe, filter
3. Phishing and Pharming
-It goals to acquire
sensitive personal
information like
password and credit
cards and use these to
steal their money
electronically or use the
credit cards of the
victims.
What is the best way to get
rid someone who is trying
to phish or pharm you?
•Talk to your
friends about this
responsibility.
3. Set your post
to private.
• In this way, search
engines will not be able
to see that post.
4. Avoid using names.
• Names are easy for
search engines to scan.
5. If you feel that a
post can affect you or
other’s reputation,
ask the one who
posted it to take it
down or report it as
inappropriate.
Copyright
Infringement
Copyright Infringement
-Is the use or production of copyright-protected material without the
permission of the copyright holder.
-The rights over your work, and anyone who uses it without our
consent is punishable by law.
-If you create something an idea, an invention, a form literary works or
research, you have the right as to how it should be used by others it is
called intellectual property.
-As a responsible user of the internet, you have to consider that not
everything out there is free for you to use.
-Individuals and companies who develop new works register for copyright
protection to ensure that they can profit from their efforts.
Tips to avoid Copyright Infringement
1. Understand. Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography, and
sculptures, but it does not protect underlying ideas and facts.
2. Be responsible enough to know if something has a copyright.
3. Be creative. Ask yourself whether what you are making is something
that came from you, or something made from somebody else’s
creativity. It is important to add your own creative genius in everything
that will be credited to you.
4. Know the law. There are limitations to copyright laws. For instance,
in the Philippines, copyrights only last a lifetime (of the author) plus 50
years. There are also provisions for “fair use” which mean that an
intellectual property may be used without a consent as long as it is used
in commentaries, criticisms, search engines, parodies, news reports,
research, library archiving, teaching, and education.
Activity #2
1.Do you agree or disagree with the provisions of
the copyright law? Defend your answer.
2. How would you feel if someone posted
something embarrassing about you? What would
you do?
3. Make your own three (3) Do’s and Don’ts in a
table form when using social networking site like
Facebook.
I have learned that:
1.To stay safe online, I must
_________________________________________.
2. There are several internet threats which include
____________________.
3. Malwares could be in the form of a
_________________________________.
4. It is our responsibility to protect other’s reputation
online so we should be ___________.
5. It is important for everyone to understand the laws
particularly on Copyright Infringement in order to
_________________.