You are on page 1of 3

LIVING IN THE IT ERA A netiquette is a set of ideal rules and conduct

that a netizen should observe in communicating and/or


Online Safety, Security, Ethics, And Etiquette
publishing information and materials over the World
Type of Risk Wide Web and in ICT in general.
Information
1. First name There is a risk sharing your first name. Tips to Stay Safe Online
Chances are, a “hacker” may already  Be mindful of what you share online and what site
know plenty of stuff about you even if you share it to.
you give out your first name
 Do not just accept terms and conditions; read it.
2. Last name If sharing your first is a small risk,
having both your first and last name is  Check out the privacy policy page of a website to
more risky. You will be vulnerable to learn how the website handles the information you
being searched for using search share.
engines, which include image search.  Know the security features of the social networking
Matching a name with a face is a site you use. By keeping your profile private, search
modus to several cybercrimes like engines will not be able to scan your profile
“Identity Theft”  Do not share your password with anyone.
3. Middle Sharing your middle name alone is  Avoid logging in to public networks/Wi-Fi. Browsing
name probably not the most risky of these in “incognito (or private) mode,” a feature of the
shared information, but sharing your
browser, will not protect you from hackers.
full name would be.
 Do not talk to strangers whether online or face-to-
4. Current Most people who steal identities study
and their subject. They can use this face.
previous information for verification purposes.  Never post anything about a future vacation. It is
schools similar to posting, “Rob my house at this date.”
5. Your Your cellphone number should never  Add friends you know in real life.
cellphone be posted over the Internet. The  Avoid using untrusted websites.
number Internet is a public place.  Install and update an antivirus software on your
6. The name Risky, yet not as risky as posting their computer. Use only one anti-virus software to avoid
of your full names, especially your mother’s conflicts.
mother maiden name.
 If you have a Wi-Fi at home, make it private network
and father
by adding a password.
7. The name Disclosing this is a huge risk.
of your Strangers may pretend or use their  Avoid downloading anything from untrusted
siblings identity to dupe you. websites. You are most vulnerable in peer-to-peer
8. Your Giving the Internet your number is one downloads (torrents) as the download is most likely
address thing; giving them your address is a not monitored by the site owner.
whole other level. It will be much  Buy the software; do not use pirated ones.
easier for criminals to find you.  Do not reply or click links from suspicious emails.
9. Your This shared information is more risky
home than sharing your personal phone Internet Threats
phone number. Scams usually use this 1. MALWARE - stands for malicious software.
number information to deceive you, one of
which is when stranger pretends to
a. Virus – a malicious program designed to replicate
know your parents or pretends to be
itself and transfer one computer to another either
you.
10. Your Letting people know your birthday is through the Internet and local networks or data
birthday probably a must if you want to get as storage like flash drives and CDs.
many gifts as possible. Not having it in
profile makes you vulnerable to identity b. Worm – a malicious program that transfers from
theft. one computer to another by any type of means.
Often, it uses a computer network to spread itself.
For example, the ILOVEYOU worm (Love Bug
The Internet is defined as the “Information
Worm) created by a Filipino.
Superhighway.”
c. Trojan – a malicious program that is disguised as
a useful program but once downloaded or installed,
Netiquette
leaves your PC unprotected and allows hackers to
The term “netiquette” is a coined or portmanteau get your information.
term of network and etiquette.
*Rogue Security Software – tricks the user into Copyright Infringement
posing that it is a security software. It asks the user
If you create something – an idea, an invention,
to pay to improve his/her security but in reality, they
a form of literary work, or a research, you have the right
are not protected at all.
as to how it should be used by others. This is called
Intellectual Property.
d. Spyware – a program that runs in the background
without you knowing it (thus called “spy”). It has the In other words, the copyright law includes your
ability to monitor what you are currently doing and rights over your work, and anyone who uses it without
typing through keylogging. your consent is punishable by the law.
Tips that could help avoid copyright infringement:
*Keyloggers – used to record the keystroke done
by the user. This is done to steal their password or 1. UNDERSTAND – express something using your
any other sensitive information. It can record email, own words. You should give credit to the source.
messages, or any information you type using your 2. BE RESPONSIBLE – know if something has
keyboard. copyright.
3. BE CREATIVE – add your own creative genius.
e. Adware – a program designed to send you 4. KNOW THE LAW
advertisements, mostly as pop-ups.
Online Research
2. SPAM – unwanted email mostly from bots or Tips on conducting online research
advertisements. It can be used to send malware. 1. Have a question in mind.
2. Narrow it down.
3. PHISHING – its goal is to acquire sensitive personal 3. Advanced search.
information like passwords and credit card details. 4. Look for credible source.
This is done by sending you an email that will direct 5. Give credit.
the user to visit a website and be asked to update
his/her username, password, credit card, or personal To properly cite a reference, you may use the format
information. below:
Name of the person or organization (the author of the
*Pharming – a more complicated way of information). Title of the home page in italics (title is
phishing where it exploits the DNS (Domain Name shown in title bar but is sometimes missing or unrelated).
Service) System. URL. Date last seen.
Phishing Examples:
- the illegal act of sending emails or messages that Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.”
appear to come from authentic sources, but really http://oleader.penz.com/random/bananalove.htm. Viewed on
come from spammers. Phishers often try to get September 7, 2015.
people to send them their personal information,
“Accounting: What you should know.” Jargon Online Network.
everything from account numbers to passwords. http://www.jargononline.com/accounting101.html. Viewed on
Protecting Reputations Online April 12, 2015.

1. Before you post something on the web, ask these Google Techniques
questions to yourself: Would you want your parents  Find the Hidden calculator – a gray, calculator-like
or grandparents to see it? Would you want your tool pops up as the search result.
future boss to see it? Once you post something on  Definitions and more – simply add the word
the web, you have no control of who sees your “define” before a search term.
posts.
 Age-Appropriate Results – Google SafeSearch
2. Your friends depend on you to protect their
and YouTube’s Safety Mode.
reputation online. Talk to your friends about this
 Time-Zone Challenged – “time” and a city’s name
serious responsibility.
into the search bar.
3. Set your post to “private.” In this way, search
 The Perfect Search – URL of the website followed
engines will not be able to scan that post.
by your query.
4. Avoid using names. Names are easy for search
 Photo Magic – upload any photo to Google Images
engines to scan.
and hit “search.”
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it down  Just for Fun
or report as inappropriate. http://www.google.com/doodles#archives
http://www.google.com/#q=do+a+barrel+roll

You might also like