Professional Documents
Culture Documents
Word Work File A - 715717512.asd
Word Work File A - 715717512.asd
Hand-out
THE INTERNET
- defined as the information superhighway, meaning anyone has access to this highway, can place
information, and can grab that information.
This model is shown in order to help people realize why they should be careful in using the internet. The
internet is wide, and no one truly knows what would happen to us if we explore it without caution. We need
to be careful on what we click, on what sites we use, and which people we talk to on the internet. We all
know that the internet is important and good for us nowadays, but there's also that part where we have to
be careful.
C. INTERNET THREATS
Malware – stands for malicious software
Virus – a malicious program designed to replicate itself and transfer from one computer to another either
through the internet and local networks of data storage like flash drives and CDs.
Worm - a malicious program that transfers from one computer to another by any type of means. Often, it
uses a computer to spread itself.
Trojan - a malicious program disguised as a useful program but once downloaded or installed, leaves your Pc
unprotected and allows hackers to get your information.
*Rogue security software – tricks the user into posing that it is a security software. It asks the user to
pay to improver their security but in reality, they are not protected at all.
Spyware – a program that runs in the background without you knowing it (thus called a “spy”). It has the
ability to monitor what you are currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by users. This is to steal their password or any other
sensitive information. It can record any information you type using your keyboard.
Adware – a program designed to send you advertisements, mostly as pop-ups
Spam – unwanted email mostly from bots or advertisers. It can be used to send malware. (*why 15. In the
list is important)
Phishing – Its goal is ta acquire sensitive personal information like passwords and credit card details. (How
is it done? – See book)
*Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system
F. COPYRIGHT INFRINGEMENT (infringement is the action of breaking the terms of the law)
(JAMESON BLAKE MEHN)
You creation gives you the right to as how it should be used by others. This is called intellectual property.
Copyright law, or RA 8293 includes rights over your work and anyone who uses it without your consent is
punishable by law.
- not everything out there is free for you to use
Understand
- copyright protects any creative idea of people online (literary works, film, music, etc.), but it generally
does not protect underlying facts and ideas.
- Give credit to the source.
Be responsible
- Even if the material says it is not copyrighted, it is not a valid defense against copyright. Again,
everything in the internet is not free for you to use, be responsible in knowing if the information you are
getting from is copyrighted or not, and in knowing who to credit.
Be creative
- Add your own creative genius so that everything will be credited to you.
Know the Law
G. ONLINE RESEARCH
1. Have a question in mind.
- Don’t search everything in one go
2. Narrow down what you are searching for.
3. You can use the Advanced Search feature in Google, or use keywords and symbols for your advanced
search.
4. Look for credible sources
5. Give credit
IV. CONCLUSION
So much info, right? But in the end, all that matters is you make sure that your accounts, information, and
identities are safe and secure online, and that you give credit to the creations of people online. And! Always
remember, to think before you click and to be a responsible user of the internet.