0% found this document useful (0 votes)
10 views7 pages

Lesson 2

The document discusses online safety, security, and netiquette, emphasizing the importance of protecting personal information and being aware of online threats such as phishing, malware, and cyberbullying. It outlines safety measures to avoid online crimes and provides core rules of netiquette for respectful communication in digital environments. Additionally, it highlights the various types of online threats and encourages responsible internet usage among digital natives.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

Lesson 2

The document discusses online safety, security, and netiquette, emphasizing the importance of protecting personal information and being aware of online threats such as phishing, malware, and cyberbullying. It outlines safety measures to avoid online crimes and provides core rules of netiquette for respectful communication in digital environments. Additionally, it highlights the various types of online threats and encourages responsible internet usage among digital natives.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Republic of the Philippines

Mindanao State University


WAO COMMUNITY HIGH SCHOOL
Wao, Lanao del Sur

EMPOWERMENT TECHNOLOGIES
GRADE 11
Lesson 2: ONLINE SAFETY, SECURITY AND NETIQUETTE
The internet is the guiding technology of the Information Technology Age just as the electrical
engine was of the Industrial Age. In these times, more and more people are already engaged in the use of
technology.

These people who are raised in a digital, media-saturated world are called digital natives. No doubt,
the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social
networking sites, it can also bring trouble - from cyber bullying to more serious Internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.
Online safety refers to the practices and precautions that should be observed when using
the internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet.

Below are personal information that must be kept confidential.

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 1


There are numerous delinquencies that can be committed on the internet such as stalking, identity
theft, privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never access your accounts by
following an email link, instead type your URL by yourself.

Here are some ways you can check if a website is trustworthy.

Reliable Websites Unreliable Websites

Usually end in .edu or .gov Might end in .com

Don’t have errors Have errors

Are up to date Are outdated

Use facts Use opinions

Use experts Use unreliable sources

Never open messages or attachments from someone you do not know.


Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.
When using a public computer terminal, be sure to delete your browsing data before leaving.
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cell phone that is unknown
to you.

NETIQUETTES
In this generation, people are dependent on the internet. Like how people socialize face to face, we
should follow etiquette at all times as it mirrors our personality. Being on different platforms, we should be
aware of our actions and protect ourselves at the same time. Remember that once something has been shared
online, it cannot be deleted.

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 2


Core Rules of Netiquette
Netiquette, or network etiquette, is concerned with the “proper” manner of communication in the
online environment. Whatever you communicate in the virtual world, consider the following “rules “adapted
from Virginia Shea’s Core Rule of Netiquette.
Rule 1: Remember the Human.
When communicating electronically, whether through email, instant message, discussion post, text or
another method, practice the Golden Rule: Do unto others as you would have others do unto you.
Remember, your written words are read by real people, all deserving of respectful communication. Before,
you press “send” or “submit” ask yourself, “Would I be okay with this if someone else had written it?”
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
While it can be argued that standards of behaviour may be different in the virtual world, they
certainly should not be lower. You should do your best to act within the laws and ethical manners of society
whenever you inhabit “cyberspace”. Would you behave rudely to someone face-to-face? On most occasions,
NO. Neither should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace.
“Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual
world, the same written communication can be acceptable in one area, where it might be considered
inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or
colleague.
Rule 4: Respect other people’s time and bandwidth.
Electronic communication takes time: time to read and time in which to respond. Most people today
lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion
posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading
your words isn’t wasted. Make your written communication meaningful and to on point, without extraneous
text or superfluous graphics or attachments that may take forever to download.

Rule 5: Make yourself look good online.


One of the virtual world’s best things is the lack of judgment associated with your physical
appearance, the sound of your voice, or the clothes you wear. The quality of your writing will judge you, so
keep the following tips in mind:
Always check for spelling and grammar errors.
Know what you’re talking about and state it clearly.
Be pleasant and polite.
Rule 6: Share expert knowledge.
The internet offers many benefits: one is the ease in which information can be shared or accessed,
and in fact, this “information sharing” capability is one of the reasons the internet was founded. So in the
spirit of the Internet’s “founding fathers”, share what you know! When you post a question and receive
intelligent answers, share the results with others. Are you an expert at something? Post resources and
references for your subject matter. You have recently expanded your knowledge about a subject that might
be of interest to others? Share that as well.
Rule 7: Help keep flame wars under control.
What is meant by “flaming” and “flame wars”? Flaming is what people do when they express
strongly held opinion without holding back any emotion. As an example, think of the kinds of passionate
comments you might read on a sports blog. While “flaming” is not necessarily forbidden in virtual
communication, “flame wars”, is when two or three people exchange angry posts between one another. It
must be controlled or else the camaraderie of the group could be compromised. Don’t feed the flames;
extinguish them by guiding the discussion back to a more productive direction.
Rule 8: Respect other people’s privacy.

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 3


Depending on what you are reading in the virtual world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed to some private or personal information that needs to be
handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a
situation at work. What do you think would happen if this information “got into the wrong hands?”
Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so you
should respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to
discuss virtual communication.
Rule 9: Don’t abuse your power.
Like in-face-to-face situations, there are people in cyberspace who have more “power” than others.
They have more expertise in technology or have years of experience in a particular skill or subject matter.
Maybe it is you who possesses all of this knowledge and power! Just remember: knowing more than others
do or having more power than others may have does not give you the right to take advantage of anyone.
Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people’s mistakes.
Not everyone has the same amount of experience working in the virtual world. And not everyone
knows the rules of Netiquette. At some point, you will see a stupid question, read an unnecessarily long
response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you
would hope someone would do if you had committed the same offense. If it’s minor “offense”, you might
want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a
public forum.

Kinds of Online Threats


There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the
years, many internet predators have been playing on vulnerabilities to attack computers and retrieve
sensitive data from individuals. Half the time, we aren’t even aware it is happening until it is too late.
Online threat is deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners. These are usually done by computer hackers who use
the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of
which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as
links in email or Instant Messaging apps, or any malware attachments on servers that access the Web. They
benefit cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets.
Web threats pose a broad range of risks, including financial damages, identity theft, loss of confidential
information/data, theft of network resources, damaged brand/personal reputation, and erosion of consumer
confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:
 Phishing happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.
 Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of
a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually
focus on websites in the financial sector, including banks, online payment platforms, or other e-
commerce destinations.
 Internet Scam generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain. Cybercriminals may contact potential victims
through personal or work email accounts, social networking sites, dating apps, or other methods in
attempts to obtain financial or other valuable personal information. Online scams may come in
various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to
name a few.

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 4


 Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is
programmed to do certain tasks. Bots are automated, which means they run according to their
instructions without a human user. Some bots are useful, such as search engine bots that index
content for search or customer service bots that help users. Other bots are "bad" and are programmed
to break into user accounts, scan the web for contact information for sending spam, or perform other
malicious activities. If it's connected to the Internet, a bot will have an associated IP address.
 Malware or malicious software, is any program or file that is harmful to a computer user. Here are
the most common offenders in the rogues’ gallery of malware:
Adware (advertising supported software) is unwanted software designed to throw
advertisements up on your screen. Example, pop-up ads and banner ads.
Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author. Example is a keylogger.
Virus and Worms are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and
infecting them with its own bits of code.
Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Once it’s on your system, the
attackers behind the Trojan gain unauthorized access to the affected computer. From there,
Trojans can be used to steal financial information or install threats like viruses and
ransomware.
Ransomware is a form of malware that locks you out of your device and/or encrypts your
files, then forces you to pay a ransom to get them back.
 Spams are unsolicited emails, instant messages coming from recipients that are not granted
verifiable permission for the message to be sent. Spam messages can be damaging if you open or
respond to it.
 Cyberstalking refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.
 Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the
internet.
 Spoofing happens when someone or something pretends to be something else to gain our confidence,
get access to our systems, steal data, steal money, or spread malware.

The Internet has made our lives easier especially in terms of doing research. By browsing the
internet, we can access limitless topics. Web-based catalogs are available in many libraries to assist
researchers in locating printed books, journals, government documents and other materials. The biggest
obstacle facing all researchers on the internet is how to effectively and efficiently access the vast amount of
information available (The Internet: Research Tools, 2013).

Prepared by: Checked by:

JHON ANTHONY C. CATINOY RACHEL C. TAMBANILLO


Subject Teacher SHS Coordinator

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 5


Name: _________________________________ Name:
YES NO YES NO
1. First Name 1. First Name
2. Favorite Color 2. Favorite Color
3. Last Name 3. Last Name
4. Middle Name 4. Middle Name
5. Ambition 5. Ambition
6. School 6. School
7. Mother and Fathers Name 7. Mother and Fathers
8. Contact Number Name
9. Home Address 8. Contact Number
10. Device Specifications 9. Home Address
11. Birthdate 10. Device Specifications
12. LRN 11. Birthdate
13. Device IP Address 12. LRN
14. Favorite Number 13. Device IP Address
15. Monthly Expenses 14. Favorite Number
__________________________________ 15. Monthly Expenses

Name: _________________________________
YES NO Name:
YES NO
__________________________________
1. First Name 1. First Name
2. Favorite Color 2. Favorite Color
3. Last Name 3. Last Name
4. Middle Name 4. Middle Name
5. Ambition 5. Ambition
6. School 6. School
7. Mother and Fathers 7. Mother and Fathers
Name Name
8. Contact Number 8. Contact Number
9. Home Address 9. Home Address
10. Device Specifications 10. Device Specifications
11. Birthdate 11. Birthdate
12. LRN 12. LRN
13. Device IP Address 13. Device IP Address
14. Favorite Number 14. Favorite Number
15. Monthly Expenses 15. Monthly Expenses

j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 6


Name: _________________________________ Name:
__________________________________

ELECTRONIC LIBEL AND CYBERCRIME PREVENTION ACT OF 2012

Performance Task 3: E-Posters


Create a poster showing the Netiquette rules with examples of how you can use them in your daily
life, primarily online. The poster should use an interactive online tool like Canva, Glogster, Piktochart, etc.
You may choose from any of the Core Rules of Netiquette as your baseline idea in crafting your E-posters.
Once done, send your E-posters to our GC.

Note: If you can’t make this Performance Task because you don’t have any available
technological devices at home, you can draw this poster in a short bond paper and submit it on the
next distribution of module.

YES NO YES NO
1. First Name 1. First Name
2. Favorite Color 2. Favorite Color
3. Last Name 3. Last Name
4. Middle Name 4. Middle Name
5. Ambition 5. Ambition
6. School 6. School
7. Mother and Fathers 7. Mother and Fathers
Name Name
8. Contact Number 8. Contact Number
9. Home Address 9. Home Address
10. Device Specifications 10. Device Specifications
11. Birthdate 11. Birthdate
12. LRN 12. LRN
13. Device IP Address 13. Device IP Address
14. Favorite Number 14. Favorite Number
15. Monthly Expenses 15. Monthly Expenses
j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 7

You might also like