0% found this document useful (0 votes)
30 views73 pages

Digital Cyber Literacyy

The document outlines the importance of digital literacy, cybersecurity, and proper online behavior, emphasizing the need for responsible internet usage and protection against cyber threats. It provides tips for personal safety, guidelines for good cyber citizenship, and the implications of cyberbullying and cybercrime. Additionally, it highlights the significance of information security and offers solutions for safeguarding computer networks.

Uploaded by

Klaris Makiling
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views73 pages

Digital Cyber Literacyy

The document outlines the importance of digital literacy, cybersecurity, and proper online behavior, emphasizing the need for responsible internet usage and protection against cyber threats. It provides tips for personal safety, guidelines for good cyber citizenship, and the implications of cyberbullying and cybercrime. Additionally, it highlights the significance of information security and offers solutions for safeguarding computer networks.

Uploaded by

Klaris Makiling
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 73

DIGITAL/CYBER

LITERACY
DIGITAL LITERACY

Digital literacy is the set of competencies required


for full participation in society that includes
knowledge, skills, and behavior involving the
effective use of digital devices for purposes of
communication, expression, collaboration and
advocacy.
Tips on how to protect
yourself against cyber traits

1. Monitor behavior on social media networks.


2. Keep device safe.
3. Understand how best to use passwords.
4. Handle unsafe content.
5. Consider safety for the future.
CYBER CITIZENSHIP

Citizenship is an old value that is now


applied to a new medium, the internet.
Cyber citizenship refers to being
responsible when using the internet.
CYBERSECURITY

Citizenship is the practice of protecting systems,


networks, and programs from digital attacks
(Cisco,n.d.). These cyber attacks are usually aimed at
accessing , changing, or destroying sensitive
information; extorting money from users; or interrupting
normal business processes.
Ways on How to be a Good Cyber Citizen

1. Be careful and critical for whatever you post online


that could be visible to the public even if on “private”
page through tagging by a friend.

2. If you have a problem with someone, go to that


person or an adult to help work it out, instead of
posting your expression online.
3. Use of the internet to help you with your schoolwork,
but give credit to the sources you use and critically
analyze everything you search online.

4. Use the internet purposefully to learn more about


anything you are interested in, to help you research
relevant and needed data or information and to stay
connected with friends throughout the world.
5. Make sure you verify an information before you share
it or use it in a project and check on accuracy and truth
in the information you search on the web.

6. Give out certain information only.

7. Don’t answer questions that make you


uncomfortable.
8. Always make sure you have told a reliable adult if you
decide to meet someone you knew through the internet.

9. Always be aware of copyright laws and give credit to


whom an article or a part of it is due.

10. Use only the computers that you are allowed to use.
Avoid hacking.
Importance of Cyber Citizenship

1. It keeps the internet free from hurtful statements.


2. It creates a culture of more reliable information.
3. It gives provisions for people to be given credit for
what they have created.
4. More criminals or bullies can be caught when kids
are honest and talk to adults.
5. It keeps information private.
PROPER NETIQUETTE

1. Make sure you have the correct address (with


proper spelling), correct link and you are sending the
information to the right person when doing it online.

2. Check information before sending or posting any


message and avoid false statements and
information on the web forwarding junk mail or chain
letters to family or friends.
3. Re-read what you wrote to make sure it is what you
want to say and the other person would interpret it the
same way.

4. Keep your comments clean and don’t confront others


online or say anything that could be hurtful to them.

5. Keep your personal and friends’ information private


and don’t forward information thaw was given to you
without his/her permission.
6. Watch out for spam and other fraud emails and never
reply to them.

7. If you are going to write something personal or


private, think twice because messages can get
misdelivered.

8. Adults should monitor kids’ messages, especially


when they are sending emails to others without
permission.
The Ten Commandments of Teacher
Cyber Citizenship

1. Thou shall not post any personal matter, confidential


information and obscene pictures and messages
online that can be accessed by students and
parents.

2. Thou shall not respond or thread to any personal


message created by students online other than
those school-related.
4. Thou shall not give your email password to students.

5. Thou shall not use concepts and information from


texts and references without the authors’ citation.

6. Thou shall not post to any social media account, for


whatever purposes, the pictures of students without their
or thier parents’ consent.
7. Thou shall not express sentiments, disappointments
and disagreements against superiors, colleagues,
students and their parents using their social media
accounts.

8. Thou shall not use data from internet sources in any


documents like lesson plans, researches and
requirements without the consent of the author.
9. Thou shall not give any personal data or others’
information to anyone unless for specific purposes and
given the consent.

10. Thou shall not post any student data publicity online
including academic rankings, school records, class
outputs and record of grades.
INTERNET SAFETY

Internet safety, online safety or cyber safety means


trying to be safe on the internet. It is maximizing the
user's personal safety and security risks to private
information and property associated with using the
Internet, including self-protection from computer
crime.
Information
security
Information security. Sensitive information, such
as personal information, identity and passwords
are often associated with personal property and
privacy and may present security concerns if
leaked. Unauthorized access and usage of
private information may result in consequences,
such as identity and property theft.
Common causes of
information security
breaches include:
1. Phishing
2. Internet scams
3. Malware
Personal safety and
threats
The growth of the internet gave rise to
many important services accessible to
anyone with a connection, such us digital
communication. While it allows
communication with others, it is also being
grabbed by malicious users for bad intent.
The following are
common threats to
personal safety
1. Cyberstalking
2. Cyberbullying
3. Online predation
4. Obscene/offensive content
5. Sextortion
CYBERSTALKING

It is the use of Internet or other electronic means


to stalk or harass an individual, group or
organization through false accusations,
defamation, slander and libel, intentional
monitoring, identity theft, threats, vandalism,
solicitation for sex, or gathering information that
may be used to threaten, embarrass or harass.
CYBERBULLYING
It is the use of electronic means, such as instant
messaging, social media, email and other forms
of online communication with the intent to abuse,
intimidate, or overpower an individual or group.
ONLINE PREDATION
It is the act of engaging an underage minor into
inappropriate sexual relationship through the
internet.
OBSCENE/OFFENSIVE
CONTENT
Various websites on Internet contain material that
may deem offensive, distasteful or explicit, which
may often not be of the user's liking.
SEXTORTION
It is the use of webcams for flirting and cybersex. Often,
this involves a cybercriminal posing as someone else,
such as an attractive person initiating communication of a
sexual nature with the victim.
Computer Threats and Fixing
Solutions
• The realm of information Technology (IT) security
professionals and computer security has become an
issue and concern for many people (Honan,2014).
• Cybercrime is now becoming alarming in the life of
every individual and the organization as they intend to
steal information that they can sell or trade, such as
financial details, credit card information, personal
details, or any other information using computer
networks.
Computer Threats and Fixing
Solutions
• Likewise, while email has been the main method for the
spread of computer viruses, it can also enter a network
by the USB device, Internet download, visiting an
infected website, instant messaging or messaging in
social media platforms, file transfer and file-sharing
programs, or by remote users connecting directly to the
corporate network with an infected PC. Once a
computer virus gets into a network, it can spread from
computer to computer in multiple ways.
The following are ways on how to
ensure that computer networks
can be protected
1. Install antivirus software .
2. Ensure that the anti-virus software is up-to-date.
3. Employ a firewall to protect network.
4. Filter all email traffic.
5. Educate all users to be careful of suspicious e-mails.
6. Scan Internet downloads.
7. Do not run programs of unknown origin.
The following are ways on how
to ensure that computer
networks can be protected
8. Implement a vulnerability management system.
9. Make regular backups of critical date.
10. Develop an information Security Policy.
11. Monitor logs and systems.
12. Develop an Incident Response Plan.
13. Restric end-user acces.
CYBERBULLYING

• Cyberbullying, cyberharassment or online bullying is a


form of bullying or harassment using electronic means
usually among minors in a school setting and has
become increasingly common, especially among
teenagers.
• It is an aggressive, intentional act or behavior that is
carried out by a group or an individual using electronic
forms of contact, repeatedly against a victim who
cannot easily defend him or herself
CYBERBULLYING

• The National Crime Prevention Council defines


it as a process of using the Internet, cell
phones or other devices to send or post texts
or images that intend to hurt or embarrass
another person.
• Cyberbullying is similar to traditional bullying, It
is just that victims may not know the identity of
their bully and the reason for bullying them.
Cyberbullying types. There are various
types pf cyberbullying and research has
revealed serious profound consequences on
victims.
1. Internet trolling is a common form of bullying
over the internet in an online community to elicit a
reaction, disruption or intentionally provoke and
offend ithers.
2. Cyberstalking is another form of bullying that
uses electronic communication to stalk a victim
an pose a credible to harass him/her
Implications of bullying in
schools.
• Schools should initiate various anti-bullying programs and
campaigns to protect students from being threatened or victimized by
such offense.
• More so, teachers should be oriented and trained in handling
bullying cases and executing teaching strategies to address and
reduce bullying cases in class.
• Also, schools should conduct student empowerment activities that
can be engaged in by students, including the bullies to divert their
attention and energy into something worthwhile and engagements
that they can be busy about.
Cybercrime
• Avast defines cybercrime as any criminal activity carried out using computers
or the Internet. Cybercrime uses tools like phishing, viruses, spyware,
ransomware and social engineering to break the law (https://
www.avast.com/c-cybercrime).
• On the other hand, cybercrime is defined by Techopedia as a crime with the
computer as the object of the crime (i.e. hacking, phishing, spamming) or is
used as a tool to commit an offense (i.e. child pornography, hate crimes).
Cybercriminals may use computer technology to access personal and
confidential information or use the Internet for exploitative or malicious
purposes.
• Cybercrime may also be referred to as computer crime practiced by those
who have technological skills and use the Internet to achieve their bad motive.

You might also like