E Tech Lesson 2
E Tech Lesson 2
SCUERTIY
SECURITY
EITEUQTET
ETIQUETTE
RSUIV
VIRUS
TAF S EY
SAFETY
CSTHIE
ETHICS
EILNNO
ONLINE
SWSAPDRO
PAS S W O R D
R E TAS T H
T H R EAT S
TAT I N O E R PU
R E PU TAT I O N
Empowerment
Technologies
Online Safety, Security, Ethics, and Etiquette
Week 2
After going through this
lesson, you are expected
to:
1. name the various online
threats;
2. identify the online safety
measures; and
3. consider one’s and others’
reputation when using the
Internet.
What’s New!
Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we
share online. Identify which of the following information you have shared online and list down your
answers on the separate sheet of paper.
What’s New Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we share online.
Identify which of the following information you have shared online and list down your answers on the separate sheet of paper.
ONLINE SAFETY AND SECURITY
The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in
touch with the old ones. It is also a source of
entertainment through games, online communities, and
everything in between. But like most things in this world,
there is always “other side of the coin”.
• Be mindful of what you share online and what site you share it to.
• Do not just accept terms and conditions; read it.
• Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
• Do not share your password with anyone.
TIPS TO STAY SAFE ONLINE
• Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or
private) mode will NOT protect you from hackers.
• Do not talk to strangers whether online or face-to-face/
• Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update antivirus software on your computer. Use only one
anti-virus software to avoid conflicts.
TIPS TO STAY SAFE ONLINE
• If you have Wi-Fi at home, make it a private network by adding a
password.
• Avoid downloading anything from untrusted websites.
• Buy the software, do not use pirated ones.
• Do not reply or click links from suspicious emails.
• Make Online Purchases from Secure Sites
• Most people would dispute that there is no such thing as private over the
Internet and they may be right. Some hackers can find a backdoor even if
your profile is already set to private. You have no control over whoever is
looking at your friend's screen whenever they open your profile or chat
with you.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a
computer user.
• Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks)
INTERNET THREATS
• Worm - a malicious program that transfers from one computer to another
by any type of means.
Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their
password or any other sensitive information. The key logger software typically uses a log file
to store its recording.
INTERNET THREATS
Rogue security software designers make pop-up windows that look like legitimate
alerts. These alerts advise the user to download a security software, agree to terms or
update their current to system to stay protected. By clicking "YES" to any of these
scenarios, the rogue software is downloaded to your computer.
An updated firewall is best defense. It is also good to install a trusted anti-virus or anti-
spyware software program that can detect threats like rogue software.
A STRONG PASSWORD
Use a mix of alphabetical and numeric, a mixture of upper and lowercase, and special
characters when creating your unique passphrase. Use unique passwords or passphrases: You
should have a unique password for each of your accounts. This way, if one of your accounts
is compromised, your other accounts remain secure. See the photo below for the sample of a
weak and strong passwords:
PROTECTING REPUTATIONS ONLINE
Here are the things you might want to consider before
posting something over the internet:
1. Before your post something on the web, ask these
questions to yourself: Would you want your
parents or grandparents to see it? Would you want
your future boss to see it?
2. If you feel that a post can affect your or another’s
reputations, ask the one who posted it to pull it
down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
It is the use of works protected by copyright law
without permission for a usage where such
permission is required.
Here are some tips that could help you avoid
copyright infringement: