0% found this document useful (0 votes)
44 views38 pages

Lesson 2 Rules of Netiquette 1

This document provides tips and guidelines for safe and responsible internet use. It discusses risks associated with sharing personal information online and how to protect one's reputation. It also covers copyright infringement and how to avoid it. The document aims to teach proper internet etiquette and safety.

Uploaded by

airaleighsaldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views38 pages

Lesson 2 Rules of Netiquette 1

This document provides tips and guidelines for safe and responsible internet use. It discusses risks associated with sharing personal information online and how to protect one's reputation. It also covers copyright infringement and how to avoid it. The document aims to teach proper internet etiquette and safety.

Uploaded by

airaleighsaldo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 38

LESSON 2:

Rules of
Netiquette
We e k 2
Lesson Objectives:
1. Consider one’s and other ’s safety when
sharing
information using the Internet;
2.Consider one’s and other ’s reputation when using the
Internet;
3. Determine and avoid the dangers of the Internet;
4.Be responsible in the use of social networking sites;
and
5. Browse the Internet efficiently and properly through
p r o p e r referencing.
Online Safety and Security

The Internet, truly, is a powerful


tool. It can be used to promote your
business, gain new friends, and stay in
touch with the old ones.
It is also a source of entertainment
through games, online communities, and
everything in between.
How Safe Are You?
Type of Information Risks
1. First name There is a risk in sharing your first name.
Chances are, a hacker m a y already k n o w
plenty of stuff about y o u even if y o u
only give out your first name.
2. Last name If sharing your first name is a small risk,
having both your first a n d last is mo re
risky. Yo u will be vulnerable to being
searched for using search engines, which
include image search.
Type of Information Risks
3. Middle name Sharing your middle name alone is
probably not the most risky of these
shared information, but sharing your full
n a me would be.
4. Current and previous Most people who steal identifies study
school(s) their subject. They can use this
information for verification purposes.

5. Your Cellphone Number Your cellphone n u mb er should never be


posted over the Internet. T h e
Internet is a public place. It is the same as
posting your number on a billboard.
6. The n a me of your mother Risky, yet not as risky as posting their
and father full names, especially your mother ’s
maiden name
Type of Information Risks
7. The name of your siblings Disclosing this is a huge risk. Strangers
m a y pretend or use their identity to dupe
you.
8. Your address Hopefully, you answered “no” to this one.
Giving the Internet your number is one
thing; giving them your address is a whole
other level.
9. Your h o m e phone n u mb e r This shared information is more risky
than sharing your personal phone
number.
10. Your birthday Letting people k n o w your birthday is
probably a must if you want to get as many
gifts as possible.
The Internet is defined as the
information superhighway. This
means that anyone has access to this
highway, can place information, and
can grab that information.
Any information, even things
that you have set privately, can be
accessed one w ay or another.
Tips to Stay Safe Online

1. Be mindful of what you share


online and what site you share it to.

2. D o not just accept terms and


conditions; read it.
Tips to Stay Safe Online

3. Check out the privacy policy page


of a website to learn h o w the website
handles the information you share.

4. K n o w the security features of the


social networking site you use. By keeping
your profile private, search engines will not
be able to scan your profile.
Tips to Stay Safe Online

5. D o not share your password with


anyone.

6. Avoid logging in to public


networks/Wi-Fi. Browsing in “incognito (or
private) mode,”
a feature of the browser, will not protect
you f r o m hackers.
Tips to Stay Safe Online

7. D o not talk to strangers whether


online or face-to-face.

8. Never post anything about a future


vacation. It is similar to posting, “Rob my
house at this date.”
Tips to Stay Safe Online

9. Add friends you know in real life.

10. Avoid visiting untrusted


websites.
Tips to Stay Safe Online

11. Install and update an antivirus


software on your computer. Use only one anti-
virus software to avoid conflicts.

12. If you have a Wi-Fi at home, make it a


private network by adding a password.
Tips to Stay Safe Online
13. Avoid downloading anything from
untrusted websites. Yo u are most vulnerable in
peer-to-peer downloads (torrents) as the download
is most likely not monitored by the site owner.

14.Buy the software; do not use pirated ones.

15. Do not reply or click links from


suspicious emails.
Internet
Threats
1. Malware – stands for
malicious software

a. Virus – a malicious program


designed to replicate itself an d transfer
from one computer to another either
through the Internet and local networks or
data storage like flash drives and CDs
Internet
Threats

b. Wo r m – a malicious program that


transfers from one computer to another b y
any type of means. Often, it uses a computer
network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm)
created by a Filipino.
The ILOVEYOU virus is a computer
w o r m that spread through email
attachments in 2000.

ILOVEYOU was created by Onel


de G u z m a n of the Philippines.
Infecting
45 million machines worldwide,
leading to more than $8 billion in damages.
c. Trojan – a malicious program that is
distinguished as a useful program but
once downloaded or installed, leaves
your P C unprotected and allows
hackers to get your information
~ Rogue security software – tricks
the user into posting that it is a security
software. It asks the user to pay to
improve his/her security but in reality,
they are not protected at all.
d. Spyware – a program that runs in
the background without you knowing
it (thus called “spy”). It has the ability
to monitor what you are currently
doing and typing through keylogging.
~ Keyloggers – used to record
the keystroke done by the users. This is
done to steal their password or any
other sensitive information. It can
record email, messages, or any
information you type using your
keyboard.
e. Adware – a program
designed to send you
advertisements, mostly as
p o p -ups.
2. Spam – unwanted
email mostly from
bots or advertisers. It
can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive
personal information like passwords a n d
credit card details. This is done by sending
you an email that will direct the user to visit
a website and be asked to update his/her
username, password, credit card, or
pe r sonal i nf or m a t i on.
~ Pharming – a more complicated way
of phishing where it exploits the D NS
(Domain Name Service) system.
Protecting Reputations Online

Nowadays, embarrassing moments are


captured using an y device y o u could
imagine. What is worse is that people can easily
upload it to the Internet, where it can be stored
forever.
O n c e you post something over the
Internet, search engines keep them in their
archives for search results. This makes
anything you post to last forever.
Think Before You Click
1. Before y o u post something o n the w eb, ask these
questions to yourself:

Would you want your parents or grandparents to see it? Would you want your
future boss to see it? Once you post something on the web, you have no control of who
sees your posts.
Think Before You Click

2. Your friends depend on you to


protect their reputation online.
Talk to your friends about this
serious responsibility.
Think Before You Click

3. Set your post to “private”.


In this way, search
engines will not be able to scan that
post.

4. Avoid using names.


Names are easy for
search engines to scan.
Think Before You Click

5. If you feel that a post can affect


you or other’s reputation, ask the
one who posted it to pull it down or
report it as inappropriate.
Copyright Infringement
If you create something – an idea, an
invention, a form of literary work, or a
research, you have the right as to how it
should be used by others.
This is called intellectual property.
In other words, the copyright law includes
yourrights over your work, and anyone
w h o uses it without your consent is
punishable by law.
Tips to avoid copyright infringement:
1. Understand – Copyright protects literary works,
photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does N O T
protect underlying ideas a n d facts.

2. Be responsible. Even if material does not say that it is


copyrighted, it is not a valid defense against copyright.
Tips to avoid copyright infringement:
3. Be creative – Ask yourself whether you are making is
something that came from you or something made from
somebody else’s creativity.

4. K n o w the law – There are some limitations to copyright


laws. For instance in the Philippines, copyrights only last a
lifetime (of authors) plus 50 years. There are also provisions
for “fair use” which mean that intellectual property may be
used without a consent.
Online Research
What is the difference between “Madonna”
and the Madonna”?

Madonna The Madonna


1. Have a question in mind.

Focus on a question you want answered. If it is a series of


questions, start with one. Never search everything on one
go.
2. Narrow it down.
Search engines like Google,
Bing, or Yahoo use several filters to
determine the most appropriate
result for you.
For example, if you were to
look for Tom Sawyer, the animation
series, you would better use the
keywords “Tom Sawyer animation”
rather than just “Tom Sawyer”.
3. Advanced Search.

The best way to filter


i n f o r m a t i o n y o u g e t f r o m s e a rc h
e n g i n e s is b y u s i n g t h e a d v a n c e d
s e a rc h . T h i s wi l l a l l o w y o u to filter
out information you do not need.
3. Advanced Search.
4. Look for credible source

Some wikis, are not a credible


source. This is due to the fact that
anyone can edit its content.
The more credible sources
are scientific journals, websites,
online encyclopedias a n d
scholarly databases.
5. Give credit.
If you are going to use information from a source for education
purposes, give credit to the original author of the page or information.
To properly cite a reference, you may use the format below:

Na m e of the person or organization (the author of the


information). Title of the home page in italics (title is shown in the
title bar but is sometimes missing or unrelated). URL. Date last seen.
Examples:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas”.


http://oleander.penz.com/random/bananalove.htm . Vi e w e d o n
September 7, 2015.

“Accounting: What you should know”. Jargon Online Network.


http://www. jargononline.com/accounting101.html. Vi e we d on
April 13, 2015.

You might also like