You are on page 1of 42

ROMEO M.

DAIT III, TII


Empowerment Technology Teacher
By the end of this lesson, the
students are expected to: 1. Identify what constitutes
appropriate and
inappropriate online
behavior;
2. Apply Internet online
safety, security ethics and
etiquette standards and
practices in the use of
ICTs;
3. Discern possible
deceptive information
and wrongly evaluated
data.
Activity 1

DIRECTION:

• The teacher will show some images to


the students related with the
upcoming discussion.
• Each student will be given 1 minute to Pick a Pic
write their observation on the
following images and write it in a ¼
sheet of paper.
• After the activity the student will
share their observation about the
image.
Online Safety, Security,
Ethics and Netiquette
The internet is the guiding technology of
the Information Technology Age just as the
electrical engine was of the Industrial Age. In
these times, more and more people are already
engaged in the use of technology. These people
who are raised in a digital, media-saturated
world are called digital natives.
No doubt, the Internet has been very
useful to us but with the rise of instant
messaging, chat rooms, emails and social
networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers,
including exposure to sexual predators. Thus,
internet safety is always our primary concern.
There's almost no limit to what you
can do online. The Internet makes
it possible to access information
quickly, communicate around the
world, and much more.
Unfortunately, the Internet is also
home to certain risks, such as
malware, spam, and phishing. If
you want to stay safe online, you'll
need to understand these risks
and learn how to avoid them.
HOW SAFE
ARE YOU ?
Activity 2

DIRECTIONS:
Read and reflect each item
carefully. Put check in the space
you have shared or not shared
these pieces of information in all
your social media accounts.
1. How many of these information have you SHARED?
2. How many of these information have you NOT SHARED?
3. Based from your answers, do you think you are safe
when using the internet? Why?
Lesson 2.1:
Online Safety, Security,
Ethics and Netiquette

Online safety refers to


the practices and
precautions that should
be observed when using
the internet to ensure that
the users as well as their
computers and personal
information are safe from
crimes associated with
using the internet.
Numerous delinquencies/minor
crime that can be committed
on the internet:
•Stalking
Online Safety
•Identity theft
•Privacy violations
•Harassment
• Never give any personal
information out about
yourself over the
internet.
• Do not give any banking
or sensitive information
unless you are sure that
it is a reputable business
having a secure service.
To make sure that you
are in a secured
network, the website
address should begin
with “https://’ as
opposed to “http://”.
Never access your
Online Safety Measures accounts by following an
email link, instead type
your URL by yourself.
Online Safety Measures
• Never open messages or attachments
from someone you do not know.
• Regularly review your privacy settings in
your online accounts to make sure you
are not sharing important personal
information.
• When using a public computer terminal,
be sure to delete your browsing data
before leaving.
• Keep your software updated to
avoid security holes.
• Do not download or install
software or anything on
your computer or cell phone
that is unknown to you.
Online Threats
Is deemed any malicious act that
attempts to gain access to a
computer network without
authorization or permission from
the owners. These are usually
done by computer hackers who
uses World Wide Web to facilitate
cybercrime.
• Phishing
Types of Online Threats • Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Phishing

Phishing happens when an


email is sent from an internet
criminal disguised as an
email from a legitimate,
trustworthy source. The
message is meant to lure
you into revealing sensitive
or confidential information.
Pharming
Pharming happens when a
hacker (or “pharmer”) directs an
internet user to a fake website
instead of a legitimate one.
These “spoofed” sites can
capture a victim’s confidential
information, including
usernames, passwords, and
credit card data, or install
malware on their computer.
Pharmers usually focus on
websites in the financial sector,
including banks, online payment
platforms, or other e-commerce
destinations.
Internet Scam
Internet Scam generally refers to
someone using internet services or
software to defraud or take advantage
of victims, typically for financial gain.
Cybercriminals may contact potential
victims through personal or work email
accounts, social networking sites,
dating apps, or other methods in
attempts to obtain financial or other
valuable personal information. Online
scams may come in various forms such
as lottery scam, charity fraud scams,
job offer scams, and online dating
scams to name a few.
Internet robots are also known as spiders, crawlers, and web
Internet Robots bots. It is a software application that is programmed to do certain
tasks. Bots are automated, which means they run according to
their instructions without a human user. Some bots are useful,
Captcha Technology is used to such as search engine bots that index content for search or
avoid this type of security customer service bots that help users. Other bots are "bad" and
threat. are programmed to break into user accounts, scan the web for
contact information for sending spam, or perform other malicious
activities.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Adware (advertising supported software) is
unwanted software designed to throw
Adware advertisements up on your screen. Example, pop-
up ads and banner ads.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spyware is malware that secretly observes
the computer user’s activities without
Spyware permission and reports it to the software’s
author. Example is a keylogger.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Virus and Worms
Virus and Worms are malwares
that attach to another program
and, when executed—
unintentionally by the user—
replicates itself by modifying
other computer programs and
infecting them with its own bits of
code.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Trojan or Trojan Horse
Trojan, or Trojan horse, is one of
the most dangerous malware types.
It usually represents itself as
something useful in order to trick
you. Once it’s on your system, the
attackers behind the Trojan gain
unauthorized access to the affected
computer. From there, Trojans can
be used to steal financial information
or install threats like viruses and
ransomware.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Ransomware
Ransomware is a form of malware that locks you out of your
device and/or encrypts your files, then forces you to pay a
ransom to get them back.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:

• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spams are unsolicited emails, instant messages coming
from recipients that are not granted verifiable permission
Spams for the message to be sent. Spam messages can be
damaging if you open or respond to it.
Cyberstalking
Cyberstalking refers to the
use of the internet or other
electronic device to harass
or stalk individuals or
organizations.
Cyberbullying
Cyberbullying
The Act of tormenting,
threatening, harassing or
embarrassing another person using
the internet or other technologies.
Spoofing
Spoofing happens when
someone or something
pretends to be something
else to gain our
confidence, get access to
our systems, steal data,
steal money, or spread
malware.
-Describe a criminal; who
impersonates another
individual or organization,
with the intent to gather
personal or business
information.
• Phishing
Types of Online Threats • Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Online Ethics and
Netiquette
• Comes from the word
Network and Etiquette
• Is a set of rules and
norms for acceptable
conduct or behavior
online.
Online Ethics and Netiquette

https://www.youtube.com/watch?v=FWMk_Zv7nB8 - by Angel Rivera


• Activity 3

Can You Keep it Private?


DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.

1. Your family is going out on a 2. Do you have the same passwords for all your
vacation. What should you do? accounts?
A. Post pictures when you return home. A. Yes. That is how I remember all my passwords.
B. Post the dates you will be gone B. I have different passwords for all different
online. accounts.
C. I keep it simple. I don’t have any passwords.
C. Post updates of where you are
currently checking in hotels or places. D. I have two similar passwords that I alternately use
for all my accounts.
D. Tell no one. Vacations are for getting
away.
• Activity 3

Can You Keep it Private?


DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.

3. Choose which image below


describes how you feel about
sharing your password with your
boyfriend/ girlfriend?
• Activity 3

Can You Keep it Private?


DIRECTIONS: Choose the most appropriate thing to do in the following situation. Raise the letter
of your answer and briefly explain why.

4. Your parents bought you your first 5. Your social media friends list should only be
cellphone. How will you share your composed of ______________.
cellphone number? A. Your favorite brands.
A. Do not share your cellphone number B. Family and friends
to anyone. C. Anyone who sends you a friend request
B. Post your cellphone number in your D. Foreigners
social media account.
C. Share your cellphone number only in
person.
D. Post your cellphone number in your
group chat.
What have you Learned?
Direction: Reflect on
this and write your
answer in a ¼ sheet of
Paper

Image source: https://shieldguide.wordpress.com/2017/03/12/think-before-you-click/


Online Safety, Security, and Netiquette

You might also like