Professional Documents
Culture Documents
Module #1.1 Online Safety, Security, Ethics and Netiquette Standards
Module #1.1 Online Safety, Security, Ethics and Netiquette Standards
KNOWLEDGE BOOSTER
Most of us use the Internet every day. Sometimes, we do not pay attention to how much information we
share online. Below is a questionnaire about how much information you have shared so far. Put a check
(✓) under Shared or Not Shared.
How many checks did you have for shared? You probably shared in the first two items. If that is the
case, try using a search engine like Google then type your first and last name. Did you get your profile
page? Try to switch to image search, did your pictures appear? If you have a unique name, chances are, it
did. Do not feel bad if it did not appear though; in fact, it is probably your best interest not to have pictures
of yourself in a search engine.
So how do these happen? How can search engines locate me? Is there any danger of being found by
search engines?
Here are some tips to help you stay safe when using the Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone. Treat your password like a toothbrush. Don’t let
anybody use it and get a new one every six months.
6. Avoid logging in to public networks/Wi-Fi. One of the biggest threats with free Wi-Fi is the
ability for hackers to position themselves between you and the connection point. So,
instead of talking directly with the hotspot, you end up sending your information to the
hacker. ... Any information you share or access on these networks is as good as gone.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. You are inviting the burglar to rob your house
at that date.
9. Add friends you know in real life.
It is your responsibility to secure your information online because there are hackers who can
find a backdoor even if your profile is already set to private. A hacker may steal information to
hurt people via identity theft, damage or bring down systems and, often, hold those systems
hostage to collect ransom.
What is Netiquette?
Netiquette is short for "Internet etiquette" just like etiquette is a code of polite behavior in society,
netiquette is a code of good behavior on the internet. This includes several aspects of the internet, such as
email, social media, online chat, web forums, website comments, multiplayer gaming, and other types of
online communication.
Rules of Netiquette
1. Avoid posting inflammatory or offensive comments online (A.K.A flaming).
2. Respect others' privacy by not sharing personal information, photos, or videos that
another person may not want published online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether you win or lose.
5. Don't troll people in web forums or website comments by repeatedly nagging or
annoying them.
6. Stick to the topic when posting in online forums or when commenting on photos or
videos, such as YouTube or Facebook comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative comments. Instead, break
the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
Online Safety and Security
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online communities,
and everything in between. But like most things in this world, there is always the "other side of the coin."
The internet is one of the most dangerous places, especially if you don't know what are you doing with it.
But there is no need to worry; it is never that late. Hopefully, by the end of this lesson, you can consider
how you go about your use of the Internet.
Let us go back to the "How Safe Are You?" test. Let us visit items and how risky it is to share them.
The Internet is defined as the Information superhighway. This means that anyone has access to this
highway, can place information, and can grab that information. Any information, even things that have set
privately, can be accessed one way or another. This is why social networking sites like Facebook continue
to improve their security features. The threat of cybercrime is very real. While you may not experience that
threat now, whatever information we share today can affect our future.
Internet Threats
Here are some of the threats you should be aware of when using the internet:
1. Malware
Malware is the collective name for several malicious software variants, including viruses,
ransomware, and spyware. Shorthand for malicious software, malware typically consists of code
developed by cyber attackers, designed to cause extensive damage to data and systems or to gain
unauthorized access to a network. Malware is typically delivered in the form of a link or file over email
and requires the user to click on the link or open the file to execute the malware.
Malware has been a threat to individuals and organizations since the early 1970s when the Creeper
virus first appeared. Since then, the world has been under attack from hundreds of thousands of
different malware variants, all with the intent of causing the most disruption and damage as possible.
1. Types of Malware
a. Virus – a malicious program designed to replicate itself and transfer from one computer
to another either through the internet and local networks or data storage like flash drives
and CDs.
b. Worm – a malicious program that transfers from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU
worm (Love Bug Worm) created by Filipino.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded
or installed, leaves your PC unprotected and allows hackers to get your information
• Rogue Security Software – tricks the user into posing that it is security software.
It asks the user to pay to improve his/her security but in reality, they are not
protected at all.
d. Spyware – a program that runs in the background without you knowing it (thus called
"spy"). It can monitor what you are currently doing and typing through keylogging.
• Keylogger – used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record emails, messages,
or any information you type using your keyboard.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware – is a form of malware that essentially holds a computer system captive
while demanding a ransom. The malware restricts user access to the computer either by
encrypting files on the hard drive or locking down the system and displaying messages that
are intended to force the user to pay the malware creator to remove the restrictions and
regain access to their computer.
2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and credit card
details.
4. Botnet - group a compromised computer connected to a network (“zombie”).
5. Denial of Service Attack – disrupts computer access to internet services.
Assessment/Activity
Directions:
Make a journal to manifest your understanding about the topic. You can start by following the format
below.
Open your Moodle Account and download the Written Work Template located at Lesson #2: Online Safety,
Security, Ethics and Netiquette Standards.
✓ Save your work as WW#1_LAST NAME_LESSON 2
- (WW#2_CRUZ_LESSON2)
Assignment
1. Enumerate the parts of The Process of Research by Barron and Ivers (1996).
2. Enumerate the tips on conducting online research.
3. Give at least 5 search operators that can be used in Google Browser.
4. What is the meaning of copyright?
5. What is the meaning of copyright infringement?
6. What is the meaning of fair use?
References
1. Christensson, P. (2017, December 30). Netiquette Definition. Retrieved 2020, Jun 10, from
https://techterms.com
2. The point, F. (2020, March 25). What is Malware? Retrieved June 10, 2020, from
https://www.forcepoint.com/cyber-edu/malware
3. Bookstore, R. (2016). RBS Empowerment Technologies. Manila, Luzon: Rex Bookstore
4. Alcala, J. (2021) Empowerment Technology Lesson 2, DepEd Negros Oriental