You are on page 1of 4

RULES OF NETIQUETTE

What is netiquette?
The word netiquette is a combination of ’net’ (from internet) and ’etiquette’. It
means respecting other users’ views and displaying common courtesy when posting
your views to online discussion groups.
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always “another side of the coin.” The Internet is one
of the most dangerous places, especially if you do not know what you are doing.
How risky it is to share them
Tips on how to stay safe online
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
4. Know the security features of the social networking site you use. By keeping you
profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode,” a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “Rob my
house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one
antivirus software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer download (torrents) as the download is most likely not monitored
by ht e website owner.
14. But the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Think Before You Click
1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it? Once you post something on the web, you have no control of who
sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends
about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

COPYRIGHT INFRINGEMENT
• If you create something—an idea, an invention, a form of literary work, or a
research, you have the right of how it should be used by others. This is called
intellectual property.
Tips that help you avoid copyright infringement
1. Understand. Copyright protects literacy works, photographs, paintings, drawing
films, music etc…, but it generally does NOT protect underlying ideas and facts.
2. Be responsible. Even if a material does not say that it is not a copyrighted, it is
not valid defense against copyright.
3. Be creative. Ask yourself whether what you are making is something that came
from you or something made from somebody else’s creativity.
4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (for the author) plus 50 years.
Internet Threats

1. 1. MALWARE stands for malicious software

2. 1. MALWARE A. VIRUS – a malicious program designed to replicate itself and


transfer from one computer to another either through the Internet and local
networks or data storage like flash drives and CDs.

3. 1. MALWARE B. WORM– a malicious program that transfers from one


computer to another by any type of means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm (Love Bug Worm) created by a
Filipino.

4. 1. MALWARE C. TROJAN– a malicious program that is disguised as a useful


program but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.

5. 1. MALWARE C. TROJAN * Rogue security software - tricks the user into


posing that it is a security software. It asks the user to pay to improve his/her
security but in reality, they are not protected at all.

6. 1. MALWARE D. SPYWARE– a program that runs in the background without


you knowing it (thus called “spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.

7. 1. MALWARE D. SPYWARE * Key loggers- used to record the keystroke done


by the users. This is done to steal their password or any other sensitive
information. It can record email, messages, or any information you type using
your keyboard.

8. 1. MALWARE E. ADWARE– a program designed to send you advertisements,


mostly as pop-ups.

9. 2. SPAM Unwanted email mostly from bots or advertisers. It can be used to


send malware.

10. 3. PHISHING It goal is to acquire sensitive personal information like


passwords and credit card details. This is done by sending you an email that will
direct the user to visit a website and be asked to update his/her username,
password, credit card, or personal information.

11. 3. PHISHING Pharming – a more complicated way of phishing where it


exploits the DNS (Domain Name Service) system.

You might also like