You are on page 1of 3

RULES OF NETIQUETTE

Hand-out

THE INTERNET
- defined as the information superhighway, meaning anyone has access to this highway, can place
information, and can grab that information.

THE ICEBERG MODEL


/
Surface Web - Where we keep safe our information
- Accessible - Little illegal activity outside of Dark Web
- Indexed for Search Engines - Huge in size and growing exponentially
- Little illegal activity
- Relatively small in size Dark Web
- Restricted to special browsers
Deep Web - Not indexed for Search Engines
- Accessible by password, encryption, or through - Large scale illegal activity
gateway software - Unmeasurable due to nature
- Not indexed for Search Engines

This model is shown in order to help people realize why they should be careful in using the internet. The
internet is wide, and no one truly knows what would happen to us if we explore it without caution. We need
to be careful on what we click, on what sites we use, and which people we talk to on the internet. We all
know that the internet is important and good for us nowadays, but there's also that part where we have to
be careful.

A. ONLINE SAFETY & SECURITY


The Internet is defined as the information superhighway, meaning anyone has access to this highway, can
place information, and can grab that information. This is why many websites or social media sites keep
improving their security features in order to protect its users and their information. As mentioned in the
Iceberg Model, you’ll never know what is lurking around in the internet. Cybercrime is happening every day,
right under our noses. It is essential that you make sure that the information you give out on the internet
is safe and secure, so that this information may not be used against you.

B. TIPS TO STAY SAFE ONLINE


refer to page 23

REASONS FOR EACH NUMBER


1萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. Because the information may be used against you, and it might damage your reputation.
2萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. A Terms of Service Agreement is a set of regulations in which users must agree to follow
in order to use a service. We all know that “I accept the Terms & Conditions” is the biggest lie in the
Internet, according to Mikko Hyppönen. But accepting is one thing, reading is another. Although it is a
long process and might seem like waste of time to read it, actually reading the terms & conditions are
important so that you know what you signed up for, and you know the rules that you must agree to in
order to use this specific website. Violating rules can lead to punishments, like (Locked Twitter
accounts <- a broken rule)* which caused you to have a consequence applied to your account.
3萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. For the safety of your information and identity online. (Privacy Policy - is a statement or
a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses,
discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a
customer or client's privacy.
4萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. For the safety of your information and identity online.
5萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. For the safety of your information and identity online.
6萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. (6&12) As you connect to a public domain, chances are you will be more prone to hackers.
People who are able to connect to your wireless router or network may be able to do the following:
- View all the files on your computer or laptop and spread a virus
- Monitor all the websites that you visit, copy your log-in names and passwords, and read all your
emails as they travel through the network
- Slow down your computer or laptop and the Internet connection speed
- Send spam and/or perform illegal activities using your Internet connection
This is why it is important to encrypt your wifi network. Wi-Fi Protected Access (WPA) is a security
standard for users of computing devices equipped with wireless internet connections. WPA was
developed by the Wi-Fi Alliance to provide more sophisticated data encryption and better user
authentication than Wired Equivalent Privacy (WEP), the original Wi-Fi security standard.

WPA VS. WEP


WPA:
- USES TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE
802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than
the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.
- An advantage IV length has increased from 24 bits to 48 bits, and as a result creates the possibility
of assigning over 500 trillion key combinations and re-keying of global encryption keys is required
however, the encryption key is constantly changed after every frame use. Another advantage of the
WPA is that it avoids using weak IV values, which allows for a scrambled, different, secret key to be
used for each packet causing the key to be very complex, and harder to crack.
7萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. (MMK with Ruffa Mae: “Ibigay mo sa akin yung password!”) Stranger danger! You’ll ever
know who you’ll meet online, so it is better to not talk to them, this is a way of safety from dangerous
people.
8萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. Avoid criminals stalking you and commit crimes towards you such as stealing.
9萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. Add only those whom you trust your information to be shared to.
10萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. (10, 13 & 15) A reminder from the Iceberg model- the Internet is vast; wide. Be careful as
interaction with untrusted websites or even emails such as downloading files from them can bring
malware into your device or even hack information from your accounts online. One way to know if it’s a
“legit” site is if it has a padlock, or URLs that start with HTTPS.
11萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. Anti-viruses are helpful in blocking the malware that can do what was said previously.
However, using multiple antiviruses can lead to conflicts. Antivirus programs do not usually play well
together, and running two at the same time will often lead to one singling out the other as a virus, or
in some cases, even cause file corruption. Plus, running two apps can really eat up system resources.
Sometimes, more protection is not better. However, according to Dachis (2012), using two as long as it
is not ran at the same time may be good so as to make sure that the other antivirus is doing their job
correctly.
12萏ː萑‫ﺘ‬葞ː葠‫ﺘ‬. (14) Besides piracy being illegal, it may be a cause for different malwares to enter your
device and corrupt your computer.

C. INTERNET THREATS
​Malware – stands for malicious software
​Virus – a malicious program designed to replicate itself and transfer from one computer to another either
through the internet and local networks of data storage like flash drives and CDs.
​Worm - a malicious program that transfers from one computer to another by any type of means. Often, it
uses a computer to spread itself.
​Trojan - a malicious program disguised as a useful program but once downloaded or installed, leaves your Pc
unprotected and allows hackers to get your information.
*Rogue security software – tricks the user into posing that it is a security software. It asks the user to
pay to improver their security but in reality, they are not protected at all.
​Spyware – a program that runs in the background without you knowing it (thus called a “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by users. This is to steal their password or any other
sensitive information. It can record any information you type using your keyboard.
​Adware – a program designed to send you advertisements, mostly as pop-ups
​Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. (*why 15. In the
list is important)
​Phishing – Its goal is ta acquire sensitive personal information like passwords and credit card details. (How
is it done? – See book)
*Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system

D. PROTECTING REPUTATIONS ONLINE


Everything that is on the internet stays there forever. Be careful of what you post, as it may damage your
reputation online, job hirers usually look at your online posts to see if you are reputable, and some
embarrassing videos or information may be used against you by hackers.

E. THINK BEFORE YOU CLICK (VIDEO)

F. COPYRIGHT INFRINGEMENT (infringement is the action of breaking the terms of the law)
(JAMESON BLAKE MEHN)
You creation gives you the right to as how it should be used by others. This is called intellectual property.
Copyright law, or RA 8293 includes rights over your work and anyone who uses it without your consent is
punishable by law.
- not everything out there is free for you to use
​Understand
- copyright protects any creative idea of people online (literary works, film, music, etc.), but it generally
does not protect underlying facts and ideas.
- Give credit to the source.
​Be responsible
- Even if the material says it is not copyrighted, it is not a valid defense against copyright. Again,
everything in the internet is not free for you to use, be responsible in knowing if the information you are
getting from is copyrighted or not, and in knowing who to credit.
​Be creative
- Add your own creative genius so that everything will be credited to you.
​Know the Law

G. ONLINE RESEARCH
1. Have a question in mind.
- Don’t search everything in one go
2. Narrow down what you are searching for.
3. You can use the Advanced Search feature in Google, or use keywords and symbols for your advanced
search.
4. Look for credible sources
5. Give credit

IV. CONCLUSION
So much info, right? But in the end, all that matters is you make sure that your accounts, information, and
identities are safe and secure online, and that you give credit to the creations of people online. And! Always
remember, to think before you click and to be a responsible user of the internet.

You might also like