You are on page 1of 4

Empowerment Technologies

Accessible Teachers Materials


TEACHERS REFERENCE GUIDE

STUDENT LEARNING GUIDE

Headwaters College – Elizabeth Campus


Academic Department

Prepared by: Ms. Mary Ann P


alad Ms. Mary Jeane Mirano
1|P a g e
HEADWATERS COLLEGE INC.
Understanding Culture Society and Politics
(STUDENT LEARNING GUIDE)

WEEK 3-4
TOPIC ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE

SCOPE INTERNET SAFETY


INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.
NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
  You need to remember that you are talking to a real person when you are online.
   The internet brings people together who would otherwise never meet.
   Remember this saying when sending an email: Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online that you follow in real life.
   You need to behave the same way online that you do in real life.
   You need to remember that you can get caught doing things you should not be doing       online just like you can in
real life.
   You are still talking to a real person with feelings even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
   Always take a look around when you enter a new domain when surfing the web.
   Get a sense of what the discussion group is about before you join it.
Rule no. 4: Respect other people’s time and bandwidth.
  Remember people have other things to do besides read your email. You are not the center of their world.
   Keep your post and emails to minimum by saying what you want to say.
   Remember everyone won’t answer your questions.
Rule no. 5: Make yourself look good online.
   Be polite and pleasant to everyone.
   Always check your spelling and grammar before posting.
   Know what you are talking about and make sense saying it.
Rule no. 6: Share expert knowledge
   Ask questions online
   Share what you know online.
   Post the answers to your questions online because someone may have the same question       you do.
Rule no. 7: Help keep flame wars under control
  Netiquette does not forgive flaming.
  Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
Rule no. 8: Respect other people’s privacy.
  Do not read other people’s mail without their permission.
  Going through other people’s things could cost you, your job or you could even go to jail.
  Not respecting other people’s privacy is a bad netiquette.
Rule no. 9: Don’t abuse your power.
 Do not take advantage of other people just because you have more knowledge or power than them.
 Treat others as you would want them to treat you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s mistake.
 Do not point out mistakes to people online.
 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are online and cannot see the    person face to face.

  Internet security

Prepared by: Ms. Mary Ann P


alad Ms. Mary Jeane Mirano
2|P a g e
   Security Requirement Triad

 ConfidentIality 
 Data confidentiality Privacy
          Integrit
 Data integerity                                                        System integrity
         Availability
Threat Consequence Threat Action ( Attack)

Exposure: Sensitive data are directly released to an


unauthorized entity.
Interception: An unauthorized entity directly accesses
sensitive data traveling between authorized sources
and destinations.
Inference: A threat action whereby an unauthorized
entity indirectly accesses sensitive data by reasoning
Unauthorized Disclosure from characteristics or byproducts of communications.
A circumstance or event whereby an Intrusion: an unauthorized entity gains access to
entity gains access to data for which sensitive data by circumventing a system’s security
the entity is not authorized. protections.

Disruption Incapacitation: prevents or interrupts system operation


A circumstances or even that by disabling a system component.
interrupts or prevents the correct Corruption: Undesirably alters system operation by
operation of system services and adversely modifying system functions or data.
functions. Obstruction: A threat action that interrupts delivery of
system services by hindering system operation.
Masquerade: An unauthorized entity gains access to a
Deception system or performs a malicious act by posing as an
A circumstance or event that may authorized entity.
result in an authorized entity Falsification: False data deceive an authorized entity.
receiving false data and believing it Repudiation: An entity deceives another by falsely
to be true. denying responsibility for an act.

Usurpation
A circumstances or event that results Misappropriation: An entity assumes
in control of system services or unauthorized logical or physical control of a
functions by an unauthorized entity. system resource.
Misuse: Causes a system component to perform a function or service that is detrimental to system security.
Types of System Intruders
          Masquerader
          Hackers
          Clandestine user
Parts of Virus 
  Infection mechanism
  Trigger
   PayloaD
Virus stages
 Dormant phase Virus is idle.
 Propagation  phase Virus places an identical copy of itself into other programs or into certain system areas on the
disk.
 Triggering phase Virus is activated to perform the function for which it was intended. Caused by a variety of system
events
 Execution phase Function is performed
Key Terms
Cyber crime- a crime committed or assisted through the use of the Internet.

Prepared by: Ms. Mary Ann P


alad Ms. Mary Jeane Mirano
3|P a g e
Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
Malware- stands for malicious software.
Virus- a malicious program designed to transfer from one computer to another in any means possible.
Worms– a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other
computers.
Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get your information.
Spyware– a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing
and typing through key logging.
Adware- a program designed to send you advertisement, mostly pop-ups.
Spam– unwanted email mostly from bots or advertisers.
Phishing- acquires sensitive personal information like passwords and credits card details.
Pharming- a more complicated way of phishing where it exploits the DNS system.
Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law.
Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies,
research and etc.
Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information.
Rogue security softwares– is a form of malicious software and internet fraud that misleads users into believing there is a virus on
their computer, and manipulates them into paying money for a fake malware removal tool.

REFERENC https://www.slideshare.net/eniam27/stratification-in-the-political-environment
E: https://www.slideshare.net/AltheaTiu1/social-and-political-stratification-125060884

Prepared by: Ms. Mary Ann P


alad Ms. Mary Jeane Mirano
4|P a g e

You might also like