0% found this document useful (0 votes)
2 views

LESSON-2-Copy (1)

The document covers online safety, security, and netiquette, emphasizing the importance of protecting personal information while using the internet. It outlines ten core rules of netiquette and discusses various types of system intruders and malware, including viruses, worms, and spyware. Additionally, it addresses cybercrime, phishing, and the significance of privacy policies and copyright laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

LESSON-2-Copy (1)

The document covers online safety, security, and netiquette, emphasizing the importance of protecting personal information while using the internet. It outlines ten core rules of netiquette and discusses various types of system intruders and malware, including viruses, worms, and spyware. Additionally, it addresses cybercrime, phishing, and the significance of privacy policies and copyright laws.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

ICT – EMPOWERMENT TECHNOLOGY

LESSON 2 – Online Safety,


Security and Rules of Netiquette
Internet Safety
It refers to the online security or safety of
people and their information when using
internet.
HTTPS (Hypertext Transfer Protocol
Secure)
Is an extension of the Hypertext
Transfer Protocol. It is used for
secure communication over a
computer network, and is widely
used on the Internet.
NETIQUETTE

Is network etiquette, the do’s and don’ts of


online communication.
TEN CORE RULES OF NETIQUETTE
(SHEA, 1994)
•Rule No. 1: Remember they are also human
•Rule No. 2: Adhere to the same standards of behavior online
that you follow in real life.
•Rule no. 3: Know that you are in cyberspace.
•Rule no. 4: Respect other people’s time and bandwidth.
•Rule no. 5: Make yourself look good online.
TEN CORE RULES OF NETIQUETTE
(SHEA, 1994)

•Rule no. 6: Share expert knowledge


•Rule no. 7: Help keep flame wars under control
•Rule no. 8: Respect other people’s privacy.
•Rule no. 9: Don’t abuse your power.
•Rule no. 10: Be forgiving of other people’s mistake.
MISUSE
Causes a system component to perform a function or
service that is detrimental to system security.

It includes hacking, spreading malware, and


unauthorized conducts such as alteration of software or
data, changing passwords and interfering with the
normal operation of the computer system
SYSTEM INTRUDERS
• Anyone that tries to get access to any part of your computer
system.
• An intruder is typically referred to as a hacker.

Hackers are known to use automated computer programs to


compromise your computer's security system. They are very
smart and know a lot about technology and security.
Types of System Intruders
• Masquerader - An individual who is not authorized to use the
computer and who penetrates a system’s access controls to exploit a
legitimate user’s account
• Misfeasor - A legitimate user who accesses data, programs, or
resources for which such access is not authorized, or who is
authorized for such access but misuses his or her privileges
• Clandestine user - An individual who seize supervisory control of
the system and uses this control to evade auditing and access
controls or to suppress audit collection
MALWARE
• stands for MALicious softWARE.
• A set of instructions that run on your computer and make your system
do something that an attacker wants it to do

What it is good for?


1. Steal personal information
2. Delete files
3. Click fraud
4. Steal software serial numbers
5. Use your computer as relay
DIFFERENT KINDS OF MALWARE
1. VIRUS (Computer Virus)
- A malicious program designed to transfer
from one computer to another in any means
possible.
- A piece of malicious computer code that
attaches itself to a software program, email
or computer file without your permission.
- It can transfers through the internet and local
networks or data storage like flash drives and
CD’s.
PHASES OF THE COMPUTER VIRUS
LIFECYCLE
• Dormant phase - Virus is idle.
• Propagation phase - Virus places an
identical copy of itself into other programs
or into certain system areas on the disk.
• Triggering phase - Virus is activated to
perform the function for which it was
intended. Caused by a variety of system
events
• Execution phase - Function is performed.
2. WORMS
A malicious program
designed to replicate itself
and transfer from one file
folder to another and also
transfer to other computers.
3. TROJAN
A malicious program designed that is disguised
as a useful program but once downloaded or
installed, leaves your PC unprotected and allows
hacker to get your information.

Rogue security software - is a form of malicious


software and internet fraud that misleads users
into believing there is a virus on their computer,
and manipulates them into paying money for a
fake malware removal tool.
4. SPYWARE
A program that runs in the background without
you knowing it. It has the ability to monitor what
you are currently doing and typing through key
logging.

Keyloggers - used to record the keystrokes done


by user. This is done to steal passwords or any
other sensitive information.
5. ADWARE
A program designed to
send you advertisement,
mostly pop-ups.
SPAM
Unwanted email mostly from bots
or advertisers. Refers to the
transmission of unsolicited
messages from various origins
using electric messaging system.
Cybercrime
A crime committed or assisted
through the use of the Internet.
PHISHING

A type of social engineering attack often


used to steal user data, including login
credentials and credit card numbers
PHARMING

a more complicated way of


phishing where it exploits the
DNS (Domain Name Service)
system.
Privacy Policy/Terms of Services
(ToS)

It tells the user how


the website will
handle its data.
Copyright
A part of law, wherein you have the
rights to work, anyone who uses it
without your consent is punishable
by law.
Fair Use
It means that an intellectual
property may be used without
consent as long as it is used in
commentaries, criticism,
parodies, research and etc.

You might also like