You are on page 1of 5

University of Makati

Empowerment Technology Higher School ng UMak


Lesson 1.1.
ONLINE SAFETY, SECURITY, ETHICS AND
NETIQUETTE STANDARDS

Time started: ____________


Time Ended: ____________
LEARNING OBJECTIVES
At the end of the lesson, the students should be able to:

1. prioritize one’s and others’ reputation when using the internet;


2. evaluate the dangers of the internet;
3. determine once responsibility in the use of social networking sites;
4. cite the importance of one’s and others’ safety when sharing information using the internet.

KNOWLEDGE BOOSTER
Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we
share online. Below is a questionnaire about how much information you have shared so far. Put a check
(✓) under Shared or Not Shared.

Type of Information Shared Not Shared


First name
Last name
Middle name
Current and Previous School
Your Cellphone Number
The name of your mother and father
Name of your sibling
Your address
Your home phone number
Your birthday

How many checks did you have for shared? You probably shared in the first two items. If that is the
case, try using a search engine like Google then type your first and last name. Did you get your profile
page? Try to switch to image search, did your pictures appear? If you have a unique name, chances are, it
did. Do not feel bad if it did not appear though; in fact, it is probably your best interest not to have pictures
of yourself in a search engine.

So how do these happen? How can search engines locate me? Is there any danger of being found by
search engines?

Tips to Stay Safe Online

Here are some tips to help you stay safe when using the Internet.

1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone. Treat your password like a toothbrush. Don’t let
anybody use it and get a new one every six months.
6. Avoid logging in to public networks/Wi-Fi. One of the biggest threats with free Wi-Fi is the
ability for hackers to position themselves between you and the connection point. So,
instead of talking directly with the hotspot, you end up sending your information to the
hacker. ... Any information you share or access on these networks is as good as gone.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. You are inviting the burglar to rob your house
at that date.
9. Add friends you know in real life.

1|Page Technical-Vocational Department


S/Y 2020-2021
University of Makati
Higher School ng UMak

10. Avoid visiting untrusted websites.


11. Install and update an antivirus software on your computer. Use only one antivirus
software to avoid conflict.
12. If you have a Wi-Fi at home, make it a private network by adding a password.
13. Avoid downloading anything from untrusted websites. Some websites carry malwares that
can infect your computer.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

It is your responsibility to secure your information online because there are hackers who can
find a backdoor even if your profile is already set to private. A hacker may steal information to
hurt people via identity theft, damage or bring down systems and, often, hold those systems
hostage to collect ransom.

What is Netiquette?
Netiquette is short for "Internet etiquette" just like etiquette is a code of polite behavior in society,
netiquette is a code of good behavior on the internet. This includes several aspects of the internet, such as
email, social media, online chat, web forums, website comments, multiplayer gaming, and other types of
online communication.

Rules of Netiquette
1. Avoid posting inflammatory or offensive comments online (A.K.A flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that
another person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or
annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or
videos, such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break
the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online communities,
and everything in between. But like most things in this world, there is always the "other side of the coin."
The internet is one of the most dangerous places, especially if you don't know what are you doing with it.
But there is no need to worry; it is never that late. Hopefully, by the end of this lesson, you can consider
how you go about your use of the Internet.

2|Page Technical-Vocational Department


S/Y 2020-2021
University of Makati
Higher School ng UMak

Let us go back to the "How Safe Are You?" test. Let us visit items and how risky it is to share them.

Type of Information Shared


First name There is a risk of sharing your first name. Chances are, a
hacker may already know plenty of stuff about you even if
you only give out your name. Likewise, you cannot just walk
in a room and start introducing yourself to everyone. You
do not know whom you can come across.
Last name If sharing your first name is a small risk, having both your
first and last is riskier. You will be vulnerable to being
searched for using search engines, which include image
search. Matching a name with a face is modus to several
cybercrimes like identity theft.
Middle name Sharing your middle name alone is probably not the riskiest
of this shared information, but sharing your full name
would be.
Current and Previous School Most people who steal identities study their subjects. They
can use this information for verification purposes.
Your Cellphone Number Your cellphone number should never be posted on the
internet. The internet is a public place. It is the same as
posting your number on a billboard. You would not want a
random stranger to text or call you, or worse, pretend that
they are someone else.
The name of your mother and father Risky, yet not as risky as posting their full name, especially
your mother's maiden name. You may have already
encountered many websites that require your mother's
maiden name as an answer to a secret question whenever
you lose your password.
Name of your sibling Disclosing this is a huge risk, strangers may pretend or use
their identity to dupe you.
Your address Hopefully, you answered “no” to this one. Giving the
Internet your number is one thing; giving them your
address is a whole other level. It would be much easier for
criminals to find you.
Your home phone number This shared information is riskier than sharing your phone
number. Scams usually use this information to deceive you,
one of which is when stranger pretends to know your
parents or pretends to be you.
Your birthday Letting people know your birthday is probably a must if you
want to get as many gifts as possible. But having it in your
profile makes you vulnerable to identity theft.

The Internet is defined as the Information superhighway. This means that anyone has access to this
highway, can place information, and can grab that information. Any information, even things that have set
privately, can be accessed one way or another. This is why social networking sites like Facebook continue
to improve their security features. The threat of cybercrime is very real. While you may not experience that
threat now, whatever information we share today can affect our future.

Internet Threats

Here are some of the threats you should be aware of when using the internet:

1. Malware
Malware is the collective name for several malicious software variants, including viruses,
ransomware, and spyware. Shorthand for malicious software, malware typically consists of code
developed by cyber attackers, designed to cause extensive damage to data and systems or to gain
unauthorized access to a network. Malware is typically delivered in the form of a link or file over email
and requires the user to click on the link or open the file to execute the malware.

3|Page Technical-Vocational Department


S/Y 2020-2021
University of Makati
Higher School ng UMak

Malware has been a threat to individuals and organizations since the early 1970s when the Creeper
virus first appeared. Since then, the world has been under attack from hundreds of thousands of
different malware variants, all with the intent of causing the most disruption and damage as possible.

1. Types of Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another either through the internet and local networks or data storage like flash drives
and CDs.
b. Worm – a malicious program that transfers from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU
worm (Love Bug Worm) created by Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information
• Rogue Security Software – tricks the user into posing that it is security software.
It asks the user to pay to improve his/her security but in reality, they are not
protected at all.
d. Spyware – a program that runs in the background without you knowing it (thus called
"spy"). It can monitor what you are currently doing and typing through keylogging.
• Keylogger – used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record emails, messages,
or any information you type using your keyboard.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware – is a form of malware that essentially holds a computer system captive
while demanding a ransom. The malware restricts user access to the computer either by
encrypting files on the hard drive or locking down the system and displaying messages that
are intended to force the user to pay the malware creator to remove the restrictions and
regain access to their computer.
2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card
details.
4. Botnet - group a compromised computer connected to a network (“zombie”).
5. Denial of Service Attack – disrupts computer access to internet services.

Acts and Laws in the Philippines that protects you

➢ Republic Act No. 10627 or Anti-Bullying Act of 2013


➢ Republic Act No. 10175 or Cybercrime Prevention Act of 2012
➢ Republic Act No. 10173 or the Data Privacy Act of 2012

Assessment/Activity
Directions:

Make a journal to manifest your understanding about the topic. You can start by following the format
below.

I have learned that…


I have realized that…
I will apply…

Open your Moodle Account and download the Written Work Template located at Lesson #2: Online Safety,
Security, Ethics and Netiquette Standards.
✓ Save your work as WW#1_LAST NAME_LESSON 2
- (WW#2_CRUZ_LESSON2)

4|Page Technical-Vocational Department


S/Y 2020-2021
University of Makati
Higher School ng UMak

Assignment
1. Enumerate the parts of The Process of Research by Barron and Ivers (1996).
2. Enumerate the tips on conducting online research.
3. Give at least 5 search operators that can be used in Google Browser.
4. What is the meaning of copyright?
5. What is the meaning of copyright infringement?
6. What is the meaning of fair use?

References
1. Christensson, P. (2017, December 30). Netiquette Definition. Retrieved 2020, Jun 10, from
https://techterms.com
2. The point, F. (2020, March 25). What is Malware? Retrieved June 10, 2020, from
https://www.forcepoint.com/cyber-edu/malware
3. Bookstore, R. (2016). RBS Empowerment Technologies. Manila, Luzon: Rex Bookstore
4. Alcala, J. (2021) Empowerment Technology Lesson 2, DepEd Negros Oriental

5|Page Technical-Vocational Department


S/Y 2020-2021

You might also like