The document covers online safety, security, and netiquette, emphasizing the importance of protecting personal information while using the internet. It outlines ten core rules of netiquette and discusses various types of system intruders and malware, including viruses, worms, and spyware. Additionally, it addresses cybercrime, phishing, and the significance of privacy policies and copyright laws.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
2 views
LESSON-2-Copy (1)
The document covers online safety, security, and netiquette, emphasizing the importance of protecting personal information while using the internet. It outlines ten core rules of netiquette and discusses various types of system intruders and malware, including viruses, worms, and spyware. Additionally, it addresses cybercrime, phishing, and the significance of privacy policies and copyright laws.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24
ICT – EMPOWERMENT TECHNOLOGY
LESSON 2 – Online Safety,
Security and Rules of Netiquette Internet Safety It refers to the online security or safety of people and their information when using internet. HTTPS (Hypertext Transfer Protocol Secure) Is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network, and is widely used on the Internet. NETIQUETTE
Is network etiquette, the do’s and don’ts of
online communication. TEN CORE RULES OF NETIQUETTE (SHEA, 1994) •Rule No. 1: Remember they are also human •Rule No. 2: Adhere to the same standards of behavior online that you follow in real life. •Rule no. 3: Know that you are in cyberspace. •Rule no. 4: Respect other people’s time and bandwidth. •Rule no. 5: Make yourself look good online. TEN CORE RULES OF NETIQUETTE (SHEA, 1994)
•Rule no. 6: Share expert knowledge
•Rule no. 7: Help keep flame wars under control •Rule no. 8: Respect other people’s privacy. •Rule no. 9: Don’t abuse your power. •Rule no. 10: Be forgiving of other people’s mistake. MISUSE Causes a system component to perform a function or service that is detrimental to system security.
It includes hacking, spreading malware, and
unauthorized conducts such as alteration of software or data, changing passwords and interfering with the normal operation of the computer system SYSTEM INTRUDERS • Anyone that tries to get access to any part of your computer system. • An intruder is typically referred to as a hacker.
Hackers are known to use automated computer programs to
compromise your computer's security system. They are very smart and know a lot about technology and security. Types of System Intruders • Masquerader - An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account • Misfeasor - A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges • Clandestine user - An individual who seize supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection MALWARE • stands for MALicious softWARE. • A set of instructions that run on your computer and make your system do something that an attacker wants it to do
What it is good for?
1. Steal personal information 2. Delete files 3. Click fraud 4. Steal software serial numbers 5. Use your computer as relay DIFFERENT KINDS OF MALWARE 1. VIRUS (Computer Virus) - A malicious program designed to transfer from one computer to another in any means possible. - A piece of malicious computer code that attaches itself to a software program, email or computer file without your permission. - It can transfers through the internet and local networks or data storage like flash drives and CD’s. PHASES OF THE COMPUTER VIRUS LIFECYCLE • Dormant phase - Virus is idle. • Propagation phase - Virus places an identical copy of itself into other programs or into certain system areas on the disk. • Triggering phase - Virus is activated to perform the function for which it was intended. Caused by a variety of system events • Execution phase - Function is performed. 2. WORMS A malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers. 3. TROJAN A malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
Rogue security software - is a form of malicious
software and internet fraud that misleads users into believing there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool. 4. SPYWARE A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
Keyloggers - used to record the keystrokes done
by user. This is done to steal passwords or any other sensitive information. 5. ADWARE A program designed to send you advertisement, mostly pop-ups. SPAM Unwanted email mostly from bots or advertisers. Refers to the transmission of unsolicited messages from various origins using electric messaging system. Cybercrime A crime committed or assisted through the use of the Internet. PHISHING
A type of social engineering attack often
used to steal user data, including login credentials and credit card numbers PHARMING
a more complicated way of
phishing where it exploits the DNS (Domain Name Service) system. Privacy Policy/Terms of Services (ToS)
It tells the user how
the website will handle its data. Copyright A part of law, wherein you have the rights to work, anyone who uses it without your consent is punishable by law. Fair Use It means that an intellectual property may be used without consent as long as it is used in commentaries, criticism, parodies, research and etc.