Lesson 2
Lesson 2
EMPOWERMENT TECHNOLOGIES
GRADE 11
Lesson 2: ONLINE SAFETY, SECURITY AND NETIQUETTE
The internet is the guiding technology of the Information Technology Age just as the electrical
engine was of the Industrial Age. In these times, more and more people are already engaged in the use of
technology.
These people who are raised in a digital, media-saturated world are called digital natives. No doubt,
the Internet has been very useful to us but with the rise of instant messaging, chat rooms, emails and social
networking sites, it can also bring trouble - from cyber bullying to more serious Internet dangers, including
exposure to sexual predators. Thus, internet safety is always our primary concern.
Online safety refers to the practices and precautions that should be observed when using
the internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet.
To avoid these online crimes, follow the following online safety measures:
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service. To make sure that you are in a secured network, the website
address should begin with “https://’ as opposed to “http://”. Never access your accounts by
following an email link, instead type your URL by yourself.
NETIQUETTES
In this generation, people are dependent on the internet. Like how people socialize face to face, we
should follow etiquette at all times as it mirrors our personality. Being on different platforms, we should be
aware of our actions and protect ourselves at the same time. Remember that once something has been shared
online, it cannot be deleted.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised as an email from a
legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or
confidential information.
Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of
a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually
focus on websites in the financial sector, including banks, online payment platforms, or other e-
commerce destinations.
Internet Scam generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain. Cybercriminals may contact potential victims
through personal or work email accounts, social networking sites, dating apps, or other methods in
attempts to obtain financial or other valuable personal information. Online scams may come in
various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to
name a few.
The Internet has made our lives easier especially in terms of doing research. By browsing the
internet, we can access limitless topics. Web-based catalogs are available in many libraries to assist
researchers in locating printed books, journals, government documents and other materials. The biggest
obstacle facing all researchers on the internet is how to effectively and efficiently access the vast amount of
information available (The Internet: Research Tools, 2013).
Name: _________________________________
YES NO Name:
YES NO
__________________________________
1. First Name 1. First Name
2. Favorite Color 2. Favorite Color
3. Last Name 3. Last Name
4. Middle Name 4. Middle Name
5. Ambition 5. Ambition
6. School 6. School
7. Mother and Fathers 7. Mother and Fathers
Name Name
8. Contact Number 8. Contact Number
9. Home Address 9. Home Address
10. Device Specifications 10. Device Specifications
11. Birthdate 11. Birthdate
12. LRN 12. LRN
13. Device IP Address 13. Device IP Address
14. Favorite Number 14. Favorite Number
15. Monthly Expenses 15. Monthly Expenses
Note: If you can’t make this Performance Task because you don’t have any available
technological devices at home, you can draw this poster in a short bond paper and submit it on the
next distribution of module.
YES NO YES NO
1. First Name 1. First Name
2. Favorite Color 2. Favorite Color
3. Last Name 3. Last Name
4. Middle Name 4. Middle Name
5. Ambition 5. Ambition
6. School 6. School
7. Mother and Fathers 7. Mother and Fathers
Name Name
8. Contact Number 8. Contact Number
9. Home Address 9. Home Address
10. Device Specifications 10. Device Specifications
11. Birthdate 11. Birthdate
12. LRN 12. LRN
13. Device IP Address 13. Device IP Address
14. Favorite Number 14. Favorite Number
15. Monthly Expenses 15. Monthly Expenses
j a c c _ M S U - W A O C H S (S.Y 2022-2023) EMPOWERMENT TECHNOLOGIES Page 7