0% found this document useful (0 votes)
36 views35 pages

E Tech Lesson 2

LECTURE OF EMPOWERMENT TECHNOLOGY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views35 pages

E Tech Lesson 2

LECTURE OF EMPOWERMENT TECHNOLOGY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

REVIEW

SCUERTIY
SECURITY
EITEUQTET
ETIQUETTE
RSUIV
VIRUS
TAF S EY
SAFETY
CSTHIE
ETHICS
EILNNO
ONLINE
SWSAPDRO
PAS S W O R D
R E TAS T H
T H R EAT S
TAT I N O E R PU
R E PU TAT I O N
Empowerment
Technologies
Online Safety, Security, Ethics, and Etiquette

Week 2
After going through this
lesson, you are expected
to:
1. name the various online
threats;
2. identify the online safety
measures; and
3. consider one’s and others’
reputation when using the
Internet.
What’s New!
Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we
share online. Identify which of the following information you have shared online and list down your
answers on the separate sheet of paper.

What’s New Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we share online.
Identify which of the following information you have shared online and list down your answers on the separate sheet of paper.
ONLINE SAFETY AND SECURITY
The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in
touch with the old ones. It is also a source of
entertainment through games, online communities, and
everything in between. But like most things in this world,
there is always “other side of the coin”.

The internet is one of the most dangerous places especially


if you do not know what you are doing with it. But there is
no need to worry; it is never that late. Hopefully, by the
end of this lesson, you can consider how you go about your
use of the Internet.
Let us SEE each item below and see how risky it is to share them.
Let us SEE each item below and see how risky it is to share them.
Let us SEE each item below and see how risky it is to share them.
Let us SEE each item below and see how risky it is to share them.
TIPS TO STAY SAFE ONLINE
The Internet is a public place, and it is up to you to protect yourself. Here
are some tips to help you stay safe when using the internet.

• Be mindful of what you share online and what site you share it to.
• Do not just accept terms and conditions; read it.
• Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
• Do not share your password with anyone.
TIPS TO STAY SAFE ONLINE
• Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or
private) mode will NOT protect you from hackers.
• Do not talk to strangers whether online or face-to-face/
• Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update antivirus software on your computer. Use only one
anti-virus software to avoid conflicts.
TIPS TO STAY SAFE ONLINE
• If you have Wi-Fi at home, make it a private network by adding a
password.
• Avoid downloading anything from untrusted websites.
• Buy the software, do not use pirated ones.
• Do not reply or click links from suspicious emails.
• Make Online Purchases from Secure Sites
• Most people would dispute that there is no such thing as private over the
Internet and they may be right. Some hackers can find a backdoor even if
your profile is already set to private. You have no control over whoever is
looking at your friend's screen whenever they open your profile or chat
with you.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a
computer user.

• Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks)
INTERNET THREATS
• Worm - a malicious program that transfers from one computer to another
by any type of means.

Ex. ILOVEYOU Worm - The malware originated in the Pandacan


neighborhood of Manila in the Philippines on May 5, 2000.
INTERNET THREATS

• Trojan - a malicious program that disguises itself as a useful


program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
INTERNET THREATS
• Spyware - a program that runs in the background without you knowing it (thus called
“spy”). It has the ability to monitor what you are currently doing and typing through
keylogging.

Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their
password or any other sensitive information. The key logger software typically uses a log file
to store its recording.
INTERNET THREATS

• Adware - a program designed to send you advertisements, mostly


as pop-ups.

• Ransomware - or ransom software is a type of malicious software


from cryptovirology that threatens to publish the victim's data or
perpetually block access to it unless a ransom is paid.
INTERNET THREATS
2.Spam - an unwanted email mostly from bots or advertisers. It
can be used to send malware.
INTERNET THREATS
3. Phishing - its goal is to acquire sensitive personal information
like passwords and credit card details. This is done by sending
you an e-mail that will direct the user to visit a fake website and
be asked to update his/her username, password, credit card or
personal information.
INTERNET THREATS
4. Password Attacks - this happens when a third party is trying
to to gain access to your systems by cracking a user's password.
This type of attack does not usually require any type of
malicious code or software to run on the system. Attackers use
software to try and crack you password. This can be prevented
by using a strong password to keep you from this attack.
INTERNET THREATS
5. Malvertising - this is done by malicious actors that upload
infected ads to different websites using an advertising network.
These malicious ads are then disseminated to sites that match
certain keywords and search criteria.
INTERNET THREATS
6. Rogue Software - is a malware that pretends as legitimate and necessary security
software that will keep your system safe.

Rogue security software designers make pop-up windows that look like legitimate
alerts. These alerts advise the user to download a security software, agree to terms or
update their current to system to stay protected. By clicking "YES" to any of these
scenarios, the rogue software is downloaded to your computer.

An updated firewall is best defense. It is also good to install a trusted anti-virus or anti-
spyware software program that can detect threats like rogue software.
A STRONG PASSWORD
Use a mix of alphabetical and numeric, a mixture of upper and lowercase, and special
characters when creating your unique passphrase. Use unique passwords or passphrases: You
should have a unique password for each of your accounts. This way, if one of your accounts
is compromised, your other accounts remain secure. See the photo below for the sample of a
weak and strong passwords:
PROTECTING REPUTATIONS ONLINE
Here are the things you might want to consider before
posting something over the internet:
1. Before your post something on the web, ask these
questions to yourself: Would you want your
parents or grandparents to see it? Would you want
your future boss to see it?
2. If you feel that a post can affect your or another’s
reputations, ask the one who posted it to pull it
down or report it as inappropriate.
COPYRIGHT INFRINGEMENT
It is the use of works protected by copyright law
without permission for a usage where such
permission is required.
Here are some tips that could help you avoid
copyright infringement:

1.Always assume that the work is copyrighted.


2.Do not copy, share or alter without seeking
permission.
3.Review and retain licensing agreements.
4.Consider buying content.

You might also like