0% found this document useful (0 votes)
7 views28 pages

Empowerment Technology Week 2 Lesson 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views28 pages

Empowerment Technology Week 2 Lesson 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Online Safety Security

and Netiquette
Empowerment technologies – lesson 2

Start
!
M
Objectives

01 02
Identify different Analyze the scenario W
online threats. of netiquette.

03 T

Create virtual
commandments for
the end-user. F
Sample Scenario 1

An online citizen, excited about their vacation in Boracay, decides to


share every detail of their trip on Facebook. They post multiple updates,
including pictures of their flight, the hotel they’re staying at, and even real- 2
time activities they are doing. In one post, they share an exact timeline of
when they’ll be returning home and mention their house is empty.

Suddenly, a thief who’s been monitoring their social media accounts sees
the opportunity to break into their house. With knowledge of the family’s 3
absence, the thief waits for the right time and then robs their home, taking
valuable items like the TV, car, money, and jewelry.

WHAT ARE YOUR THOUGHTS ON THIS?


4
Online Safety 1

refers to the
practices and 2

precautions that
should be observed 3

when using the


internet.
4
NETIQUETTE 1

set of rules for 2

behaving properly
online. 3

4
M
Empowerment technologies – lesson 2

ONLINE W

THREATS T

F
Online threats 1

malicious act that


attempts to gain 2

access to a computer
network without
authorization or 3

permission from the


owners.
4
Online threats 1

Malware Spam 2

Phishing Cyberbullying
3

Internet Scam
4
Contents of This Template
Here’s what you’ll find in this Slidesgo template:

1. A slide structure based on a multi-purpose presentation for education, which you can easily
adapt to your needs. For more info on how to edit the template, please visit
Slidesgo School or read our FAQs.
2. An assortment of graphic resources that are suitable for use in the presentation can be
found in the alternative resources slides.
3. A thanks slide, which you must keep so that proper credits for our design are given.
4. Two resources slides, where you’ll find links to all the elements used in the template.
5. Instructions for use.
6. Final slides with:
● The fonts and colors used in the template.
● A selection of illustrations. You can also customize and animate them as you wish
with the online editor. Visit Storyset to find more.
● More infographic resources, whose size and color can be edited.
● Sets of customizable icons of the following themes: general, business, avatar,
creative process, education, help & support, medical, nature, performing arts, SEO &
marketing, and teamwork.

You can delete this slide when you’re done editing the presentation.
Malware 1

any program or file that is


2
harmful to a computer user.

Example: a Computer Virus


called “ILOVEYOU VIRUS” in 3
the year 2000 created by a
Filipino named Onel de
Guzman. 4
Types of Malware 1

VIRUS TROJAN 2

SPYWARE ADWARE
3

RANSOMWARE
4
Virus 1

a malicious 2
program designed
to transfer from one
computer to 3

another in any
means possible. 4
Trojan 1

2
a malicious
program designed
that is disguised as 3

a useful program.
4
Spyware 1

2
a program that runs
in the background
without you 3

knowing it.
4
Adware 1

2
a program
designed to send
you advertisement, 3

mostly pop-ups.
4
RANSOMWARE 1

a form of malware
that locks you out of 2

your device and/or


encrypts your files,
3
then forces you to
pay a ransom to get
them back. 4
SPAM 1

are unsolicited emails, 2


instant messages
coming from recipients
that are not granted
3
verifiable permission
for the message to be
sent.
4
Phishing 1

2
an email sent from an
internet criminal
disguised as an email
3
from a legitimate,
trustworthy source.

4
Cyberbullying 1

2
refers to the act of
tormenting, harassing,
or embarrassing
3
another person using
the internet.

4
Internet Scam 1

refers to someone
using internet services 2
or software to defraud
or take advantage of
victims, typically for
3
financial gain.

For Ex. Blackmailing


online. 4
M

Here are 5 tips for using W

technology safely and avoiding


scams, viruses, or hacking: T

F
1. Use Strong, Unique Passwords 1

Tip: Create strong,


unique passwords
for each account
2
using a mix of
letters, numbers,
and symbols.
3
Example: Instead of
using "password123,"
use something like "T!
m3s@f3@2024!" to 4
make it harder for
hackers to guess.
2. Enable Two-Factor Authentication (2FA) 1

Tip: Use two-factor


authentication for
2
accounts that offer it,
adding an extra layer of
security.
3
Example: When logging into
your email, you enter your
password and then verify
with a code sent to your
4
phone.
3. Be Cautious with Email Links and Attachments 1

Tip: Avoid clicking on


links or downloading
attachments from 2
unknown or suspicious
emails.

Example: If you get an email 3


from a bank asking for
account information, don’t
click the link; go directly to
the bank's website instead. 4
4. Update Software Regularly 1

Tip: Keep your operating


system, antivirus
software, and apps up to 2
date to protect against
security vulnerabilities.

Example: Regularly updating 3


your phone or computer
ensures you're protected
from known security flaws
that hackers exploit. 4
5. Avoid Public Wi-Fi for Sensitive Transactions 1

Tip: Don't log into


sensitive accounts
(like banking) or
2
make purchases on
public Wi-Fi networks.

Example: Use your


3
mobile data or a VPN
when shopping online
instead of connecting to
an open Wi-Fi network in
4
a coffee shop.
𝐴ctivity!
M

F
𝐴ctivity! Show me how your hashtag! 1

Direction:
Look at the following images and create a hashtag 2
based on the type of online threat represented by
each image. Write your answer on your notebook.
Random person will be called to share his/her answer.
3

You might also like