You are on page 1of 11

EMPOWERMENT

TECHNOLOGIES

“Online Safety, Security and Netiquette”


Grade 11
Lesson 2 Module 2
11:00-12:00 Wednesday & Friday
Subject Teacher: Marchie B. Alcosero
Contact no: 0991-305-7963
Gmail: marchie.alcosero@gmail.com
Facebook account: March Chie

Name Strand

Email Cellphone Number

Page 1 of 11 Empowerment Technologies G-11


“ Online Safety, Security and Netiquette”

INTEGRATION OF FAITH AND LEARNING

“Even though I walk through the valley of the shadows of death, I will fear no evil for you are with me;
your rod and your staff they comfort me”. Psalms 23:4

We are living in this vicious and frightening world where nothing is so certain. We tend to share
whatever we may feel toward some random things. We post new updates in our way of
releasing stress, expressing special emotions to a special person, and even conveying hatred.
By doing so, we were pre-occupied with our feelings alone not knowing others’ feelings on the
other hand—this, is our way of worship. Remember this verse, “Dear children, keep yourself from
idols” I John 5:21. social media and/or gadget is our idol.

Now there are some hundred thousand questions to answer on your worksheet 2.1.

What to Know!
Objectives:
At the end of the lesson, you are expected to:

1. identify what constitutes appropriate and inappropriate online behavior;


2. discern possible deceptive information and wrongly evaluated data; and
3. associate internet online safety, security ethics and etiquette standards in the use of ICT.

WHAT YOU KNOW

Before proceeding, let’s see if you have prior knowledge about this course. Provide the answers
of the activity on worksheet 2.2.

Let’s Explore!

Page 2 of 11 Empowerment Technologies G-11


Online safety refers to the practices and precautions that should be observed when using the
internet to ensure that the users as well as their computers and personal information are safe
from crimes associated with using the internet. Below are personal information that must be
kept confidential.

Types of Information: Risks:


First Name There is still a risk in sharing your first name.
Chances are, a hacker already knows plenty of
stuff about you even if you only give out your
first name. You cannot just walk in a room and
start introducing yourself to everyone. You do
not know whom you can across with.

Last Name If sharing your first name is a small risk, having


both your first and last is riskier. You’ll be
vulnerable to being searched for using search
engines, which include image research.
Matching a name with a face can led to several
cybercrimes like identity theft.
Middle Name Sharing just your middle name is probably not
the riskiest of this shared information, but
sharing your entire full name would be.
Current and previous school(‘s) Most people who steal identities study their
subject. They can use this information for
verification purposes.
Your cellphone number Your cellphone number should never be posted
over the internet. The internet is a public place.
It is the same as posting your number on a
billboard.
Who your mother and father are Risky, yet not as risky as posting their full
names, especially your mother’s maiden name.
In fact, if you have already encountered many
websites that require your mother’s maiden
name as an answer to a secret question
whenever you lose your password.
Who your siblings are This is a huge risk, especially if you have
younger siblings. Strangers may pretend or use
their identity to dupe you.
Your address Hopefully, you answered no to this one. Giving
the internet your number is one thing. Giving
them your address is a whole other level. It
would be much easier for criminals to find you.

Page 3 of 11 Empowerment Technologies G-11


Your home phone number This shared information is riskier than sharing
your personal phone number. Scams usually
use this information to deceive you. One of
which is when a stranger pretends to know your
parents or pretends to be you.

There are numerous delinquencies that can be committed on the internet such as stalking,
identity theft, privacy violations, and harassment.

To avoid these online crimes, follow the following online safety measures:

Never give any personal information out about yourself over the internet.

Do not give any banking or sensitive information unless you are sure that it is

a reputable business having a secure service. To make sure that you are in a

secured network, the website address should begin with “https://’ as

opposed to “http://”. Never access your accounts by following an email link,

instead type your URL by yourself.

HERE ARE SOME WAYS YOU CAN CHECK IF A WEBSITE IS TRUSTWORTHY

RELIABLE WEBSITES: UNRELIABLE WEBSITES:


Usually end in .edu or .gov Might end in .com
Don’t have errors Have errors
Are up to date Are outdated
Use facts Use opinions
Use experts Use unreliable sources

Never open messages or attachments from someone you do not know.

Regularly review your privacy settings in your online accounts to make sure you are not
sharing important personal information.

When using a public computer terminal, be sure to delete your browsing data before
leaving.

Keep your software updated to avoid security holes.

Page 4 of 11 Empowerment Technologies G-11


Do not download or install software or anything on your computer or cellphone that is
unknown to you.

Netiquette is a combination of the words network and etiquette. It is a set of rules for behaving
properly online. Below are the 10 rules of netiquette:

Page 5 of 11 Empowerment Technologies G-11


Flame war is a series of flame posts or
messages in a thread that are considered
derogatory or as completely off-topic. Often
these flames are posted for the sole
purpose of offending or upsetting other
users. The flame becomes a flame war
when other users respond to the thread
with their own message.

WHAT CAN I DO?


Another activity to be answered. Provide your answers on worksheet 2.3.

WHAT IS IT?
Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web

evolved over the years, many internet predators have been playing on vulnerabilities

to attack computers and retrieve sensitive data from individuals. Half the time, we

aren’t even aware it is happening until it is too late.

Online threat is deemed any malicious act that attempts to gain access to a

Page 6 of 11 Empowerment Technologies G-11


computer network without authorization or permission from the owners. These are

usually done by computer hackers who uses the World Wide Web to facilitate

cybercrime. Web threats use multiple types of malware and fraud, all of which utilize

HTTP or HTTPS protocols, but may also employ other protocols and components,

such as links in email or Instant Messaging apps, or any malware attachments on

servers that access the Web. They benefit cybercriminals by stealing information for

subsequent sale and help absorb infected PCs into botnets. Web threats pose a

broad range of risks, including financial damages, identity theft, loss of confidential

information/data, theft of network resources, damaged brand/personal reputation,

and erosion of consumer confidence in e-commerce and online banking.

The following are the top kinds of online threats that you should be aware of:

Phishing happens when an email is sent from an internet criminal disguised

as an email from a legitimate, trustworthy source. The message is meant to

lure you into revealing sensitive or confidential information.

Pharming happens when a hacker (or “pharmer”) directs an internet user to a

Page 7 of 11 Empowerment Technologies G-11


fake website instead of a legitimate one. These “spoofed” sites can capture a

victim’s confidential information, including usernames, passwords, and credit

card data, or install malware on their computer. Pharmers usually focus on

websites in the financial sector, including banks, online payment platforms, or

other e-commerce destinations.

Internet Scam generally refers to someone using internet services or

software to defraud or take advantage of victims, typically for financial gain.

Cybercriminals may contact potential victims through personal or work email

accounts, social networking sites, dating apps, or other methods in attempts

to obtain financial or other valuable personal information. Online scams may

come in various forms such as lottery scam, charity fraud scams, job offer

scams, and online dating scams to name a few.

Page 8 of 11 Empowerment Technologies G-11


Internet robots are also known as spiders, crawlers, and web bots. It is a

software application that is programmed to do certain tasks. Bots are

automated, which means they run according to their instructions without a

human user. Some bots are useful, such as search engine bots that index

content for search or customer service bots that help users. Other bots are

"bad" and are programmed to break into user accounts, scan the web for

contact information for sending spam, or perform other malicious activities. If

it's connected to the Internet, a bot will have an associated IP address.

Malware or malicious software, is any program or file that is harmful to a

computer user. Here are the most common offenders in the rogues’ gallery of

malware:

 Adware (advertising supported software) is unwanted software designed to throw


advertisements up on your screen. Example, pop-up ads and banner ads.
 Spyware is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
Example is a keylogger.
 Virus and Worms are malwares that attach to another program and,
when executed—unintentionally by the user—replicates itself by
modifying other computer programs and infecting them with its own bits
of code.
 Trojan, or Trojan horse, is one of the most dangerous malware types.
It usually represents itself as something useful in order to trick you.
Once it’s on your system, the attackers behind the Trojan gain
unauthorized access to the affected computer. From there, Trojans can
be used to steal financial information or install threats like viruses and

Page 9 of 11 Empowerment Technologies G-11


ransomware.
 Ransomware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get them
back.

Spams are unsolicited emails, instant messages coming from recipients that

are not granted verifiable permission for the message to be sent. Spam

messages can be damaging if you open or respond to it.

Cyberstalking refers to the use of the internet or other electronic device to

harass or stalk individuals or organizations.

Cyberbullying refers to the act of tormenting, harassing, or embarrassing

another person using the internet.

Page 10 of 11 Empowerment Technologies G-11


Spoofing happens when someone or something pretends to be something

else to gain our confidence, get access to our systems, steal data, steal

money, or spread malware.

ASSESSMENT
Let’s see what you have learned during our entire lesson. Provide the table with your answers
on worksheet 2.4.

Page 11 of 11 Empowerment Technologies G-11

You might also like