0% found this document useful (0 votes)
92 views29 pages

L2 Rules of Netiquette

This document discusses online safety and security. It provides information on various internet threats like spam, phishing, keyloggers, pharming, rogue security software, and different types of malware like viruses, worms, Trojans, spyware, and adware. It also discusses the importance of being aware of these threats and thinking before clicking on unknown links or downloading files from untrusted sources in order to protect personal information and devices from being compromised. The document encourages creating a poster to promote online safety and raise awareness among friends on social media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views29 pages

L2 Rules of Netiquette

This document discusses online safety and security. It provides information on various internet threats like spam, phishing, keyloggers, pharming, rogue security software, and different types of malware like viruses, worms, Trojans, spyware, and adware. It also discusses the importance of being aware of these threats and thinking before clicking on unknown links or downloading files from untrusted sources in order to protect personal information and devices from being compromised. The document encourages creating a poster to promote online safety and raise awareness among friends on social media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

LESSON 2

Rules of Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills
NETIQUETTE
Netiquette is a short for
"Internet etiquette," and it
is a code of appropriate
online behavior that is
similar to politeness in
society.
10 BEST RULES OF NETIQUETTE

The Golden Rule


( Treat others as you
would like to be
treated)
10 BEST RULES OF NETIQUETTE

No FLAMING
(Flame is a personal
insult communicated
through the internet
10 BEST RULES OF NETIQUETTE

Don’t type in ALL CAPS


( people may
misinterpret)
10 BEST RULES OF NETIQUETTE

Don’t SPAM
(it is any unsolicited
e-mail from
unknown sources)
10 BEST RULES OF NETIQUETTE

Don’t talk with people


you do not know
( do not arrange to meet
anyone you meet
online)
10 BEST RULES OF NETIQUETTE

Obey Copyright Laws


(Don’t steal someone
else’s idea, property
and rights)
10 BEST RULES OF NETIQUETTE

Use proper Grammar


and Spelling
(errors diminishes the
credibility of the
message)
10 BEST RULES OF NETIQUETTE

BE HONEST / Be yourself
(tell the truth, do not
pretend to be someone
else)
10 BEST RULES OF NETIQUETTE

Follow the TOS


(TOS- Term of Service)
(Rules and policy of
the sites
10 BEST RULES OF NETIQUETTE

SHOP SECURE SITES


(These are sites with
transport layer security
(TLS or SLS Socket
Layer Security
Online Safety and Security
The Internet, truly, is a powerful tool. It can
be used to promote your business, gain new
friends, and stay in touch with the old ones.
It is also a source of entertainment. But like
most things in this world, there is always
“another side of the coin.” The Internet is
one of the most dangerous places,
especially if you do not know what you are
doing.
Internet Threats:
1. Spam – unwanted email mostly from bots
or advertisers. Aside from being an
annoyance, spam emails are not a direct
threat, but many can contain malware.
2. Phishing – A type of fraudulent behavior in
its most basic form. Official-looking emails
impersonating a well-known source, such
as a bank, are frequently sent. It is the
purpose of these emails to acquire
people's passwords and credit card
information.
3. Key loggers – are similar to
spyware, record a user's keyboard
operations. The majority of key
loggers will hunt for easily
identifiable key entries, such as
bank card numbers and passwords.
Identity and intellectual property
theft are frequently tied to key
logging.
4. Pharming – A more sophisticated
form of phishing that takes advantage of
the DNS system. Pharmers frequently
construct web pages that look like those
of a reputable company, such as an
online banking log-in page. Users will
then submit their credentials, assuming
they are logging in to their regular
service, and the pharmer will steal their
credentials.
5. Rogue Security Software –
This is a form of malicious software
and internet fraud that misleads
users into believing there is a virus
on their computer and aims to
convince them to pay for a fake
malware removal tool that actually
installs malware on their computer.
6. Malware – stands for malicious
software
Types:
a. Virus - A piece of malicious
computer code that attaches itself to a
software program, email or computer file
without your permission. It is one
designed to propagate at an alarming
rate, they usually attach themselves
discreetly to downloads.
b. Worm - When a worm
infects your computer, it will most
likely send itself to every email
account on your machine. Your
email will appear innocent to the
recipient until they read it and
find themselves infected by the
same worm.
c. Trojan - Trojans leave your
computer vulnerable to hackers,
allowing them to steal any data on
your computer. Trojans frequently
disguise themselves as harmless
computer programs in order for
hackers to gain access to your
computer without being detected by
you.
d. Spyware – It is an all-
encompassing internet ailment that is
commonly associated with downloading
file pop-ups. Spyware can monitor your
keystrokes, read, and destroy your files,
reformat your hard drive, and access
your apps once it is installed on your
computer. Without your knowledge, the
individual in charge of the spyware has
access to your personal information.
e. Adware – When a person surfs
the internet, adware is a sort of virus that
displays unwanted advertisements. A valid
technique of generating advertising money
that help fund development is frequently
included in many shareware or freeware
downloads. Some websites, on the other
hand, are tainted with dangerous adware
that is downloaded to your computer
automatically.
PERFORMANCE TASK #2
Create a poster promoting “Think
before you click”. Post it in your
social media site as an awareness
program for your friends. (If internet
connection is not available, do your
poster on a long bond paper and
submit it to your teacher).

You might also like