Lesson 15
Lesson 15
I. Introduction
In today's digital age, the internet plays a vital role in education, communication, and entertainment.
However, with its many benefits come risks and responsibilities. Internet safety involves protecting personal
information, avoiding harmful content, and being cautious of online threats such as cyberbullying and
scams. Alongside safety, ethical use of technology means using digital tools responsibly, respecting others'
rights, and avoiding plagiarism, piracy, and inappropriate behavior. By practicing internet safety and ethical
use, individuals can create a positive and secure online environment for everyone.
II. Objectives
At the end of this lesson, students should be able to:
a. Identify online threats and respond appropriately.
b. Demonstrate safe practices when using computers and browsing the internet.
c. Understand and apply netiquette in digital communication.
d. Practice responsible and ethical use of email and digital content.
e. Recognize the importance of managing screen time and maintaining physical well-being while using
devices.
III. Content
A. Online Safety
Refers to the practices and precautions that should be observed when using the internet to ensure that the
users as well as their computers and personal information are safe from crimes associated with using
internet.
Numerous delinquencies that can be committed on the internet:
Stalking
Indentity theft
Privacy violations
Harassment
Online Safety Measures
Never give any personal information out about yourself over the internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable business
having a secure service. To make sure that you are in a secured network the website address should
begin with https:// as opposed to http://. Never access your accounts by following an email link,
instead type the URL by yourself.
Never open messages or attachments from someone you do not know.
Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.
When using a public computer terminal, be sure to delete your browsing data before leaving.
Keep your software updated to avoid security holes.
Do not download or install software or anything on your computer or cell phone that is unknown to
you.
B. Online Threats
An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally
browses or steal someone’s information.
Type of Threats
1. Phishing – An email sent from an internet criminal disguised as an email from legitimate, trustworthy
source. The message is meant to lure you into revealing sensitive or confidential information.
2. Pharming - A malicious website that resembles a legitimate website, used to gather usernames and
passwords.
3. Internet Scam – A type of scam that misleads the user in many ways attempting to take lead of them. The
purpose of this scam is to cheat the target of their personal property directly rather than private information
through fabricated promises, confidence tricks and many more.
4. Internet Bots – A network of zombie computers that have been taken over by a robot or bot that performs
large – scale malicious acts for the creator of the botnet. Captcha technology is used to avoid this type of
security threats.
5. Malware – A generic term for spyware and adware. It is a malicious software disguise as real software
often secretly installed, intended to transfer and gather private information, like passwords, without the
user’s permission.