You are on page 1of 56

ONLINE SAFETY,

SECURITY,
ETHICS, AND
ETIQUETTE
DIGITAL MEDIA

is any form of media that uses


electronic devices for distribution. This
form of media can be created, viewed,
modified and distributed via electronic
devices. And it is very important that
you not only know how to use and deal
with these technologies, but it is
necessary to know the different threats
brought by the internet and be
equipped on how to keep your private
information safe and secure online.
PRIVATE
INFORMATION

is your sensitive
personal information or
your identity such as
your username and
passwords or bank
accounts.
Republic Act 10173
or the Data Privacy
Act of 2012
Created to protect the
fundamental human right
of privacy, of
communication while
ensuring free flow of
information to promote
innovation and growth
internet threats you need to
be aware of:
Email Scam/Junk
Mail/Spam Mail
Usually, unsolicited commercial email
sent from an unknown source with identical
message sent to multiple recipients. Usually not
dangerous but can be time and space
consuming. Dangerous ones can carry viruses
and other malicious software or malware.
Spam emails are sent out in mass
quantities by spammers and cybercriminals that
are looking to do one or more of the following:
Make money from the small percentage of
recipients that respond to the message. Run
phishing scams – in order to obtain passwords,
credit card numbers, bank account details and
more.
Email Spoofing
• is the creation of emails with a forged
sender address. The goal of email
spoofing is to get recipients to open,
respond and engage with the email
message. Email spoofing can greatly
increase the effectiveness of phishing
and other email-based cyber-attacks
by tricking the recipient into trusting
the email and its sender (Tunggal
2019). It is usually used by spammers
to hide the origin of the spam.
Phishing
• is a deceitful practice of
getting your personal
information using email or
text messages. Scammers may
try to steal your passwords,
account numbers, or Social
Security numbers. If they get
that information, they could
gain access to your email,
bank, or other accounts
(Federal Tr. Comm. ’19)
Pharming
• is a scamming practice in which malicious
code is installed on a personal computer or
server, misdirecting users to fraudulent Web
sites without their knowledge or consent.
This happened when the code sent in an e-
mail modifies local host files on a personal
computer. A computer with a compromised
host file will go to the fake Web site even if a
user types in the correct Internet address or
clicks on an affected bookmark entry
(Rouse, Pharming n.d.).
• Do not open suspicious email attachments
• Avoid opening suspicious links
• Do not give out sensitive information like
personal or banking information via e-mail or
messages
Preventive • Always use antivirus
• Always use trusted and verified Internet
measures Service Provider (ISP)
against • Avoid suspicious websites
Phishing and • Make sure to change the default password on
your consumer-grade routers and wireless
Pharming access points
attacks: • Use security software
• Make sure that the web connections are
secured (should have https)
Computer Viruses
are small programs or scripts that
can negatively affect the health of
your computer. These malicious
little programs can create files,
move files, erase files, consume
your computer's memory, and
cause your computer not to
function correctly. Some viruses
can duplicate themselves, attach
themselves to programs, and
travel across networks. In fact
opening an infected e-mail
attachment is the most common
way to get a virus (Christensson,
Virus Definition 2011).
Spyware
is software that "spies" on your
computer where it captures information
like Web browsing habits, e-mail
messages, usernames and passwords,
and credit card information. If left
unchecked, the software can transmit
this data to another person's computer
over the Internet. It can be installed
when you open an e-mail attachment
containing the malicious software. It can
also be installed when you install
another program that has a spyware
installer attached to it (Christensson,
Spyware Definition 2006).
adware
Adware is software that displays unwanted (and sometimes
irritating) pop-up advertisements which can appear on your
computer or mobile device. Adware typically ends up on a user’s
device through one of two ways:
1.You might install a free computer program or app without
necessarily realizing that it contains additional software that
contains adware. This allows the app developer to make money but
means you could download adware onto your systems without
necessarily consenting.
2.Alternatively, there may be a vulnerability in your software or
operating system which hackers exploit to insert malware, including
some types of adware, into your system.
trojans
actions can include:
•Deleting data
•Blocking data
•Modifying data
•Copying data
•Disrupting the performance of computers or computer
networks
Unlike computer viruses and worms, Trojans are not able to
self-replicate.
Password stealers
Password stealers are a type of malware that steals account
information. In essence, it is like a banking Trojan, but instead
of intercepting or substituting entered data, it usually steals
information already stored on the computer: usernames and
passwords saved in the browser, cookies, and other files that
happen to be on the hard drive of the infected device.
Moreover, sometimes game accounts are just one of the
targets of stealers — some are no less interested in your
online banking credentials.
keylogger
Keyloggers are a particularly insidious type of spyware that
can record and steal consecutive keystrokes (and much more)
that the user enters on a device. The term keylogger, or
"keystroke logger," is self-explanatory: Software that logs
what you type on your keyboard. However, keyloggers can
also enable cybercriminals to eavesdrop on you, watch you
on your system camera, or listen over your smartphone's
microphone
Mobile spyware
Mobile spyware is a classification of software programs that
monitors and records information about an end user's
actions without the end user's knowledge or permission. If
the end user is aware that monitoring software has been
installed, the software is not considered to be spyware.
Pop-ads
a type of window that appears on
top of (over) the browser window
of a Web site that a user has
visited (Pop-up Ad n.d.). It is also
called as pop-up ads. It can also be
used by hackers to steal your
personal information (such as your
bank details). Clicking pop-up ads
can redirect you to sites that can
infect your computer and system
files (What Causes Pop-up Ads and
How to Remove Them 2019).
Hacker
a clever or expert programmer
who can gain unauthorized access
to other computers. He can
"hack" his way through the
security levels of a computer
system or network (Christensson,
Hacker Definition 2006). And can
vandalizes the victims’ website,
steals personal information,
obtains intellectual property, and
performs credit card fraud.
COMMON THREATS TO PERSONAL SAFETY
Cyberstalking
is the same as physical stalking by
giving unwanted obsessive attention to
a specific person like following, secret
surveillance, persistent and
manipulative calling and texting, and
other means of approaching the victim
unexpectedly but cyber stalkers rely on
online technology to do it. Email, social
networks, instant messaging, personal
data available online – everything on
the Internet can be used by
cyberstalkers to make inappropriate
contact with their victims (Andrea
2020).
Cyberbullying
• is bullying that takes place over digital
devices like cell phones, computers, and
tablets. It can occur through SMS, Text,
and apps, or online in social media,
forums, or gaming where people can
view, participate in, or share content. It
includes sending, posting, or sharing
negative, harmful, false, or mean
content about someone else like sharing
personal or private information causing
embarrassment or humiliation. Some
cyberbullying crosses the line into
unlawful or criminal behavior.
Online Predation
is the act of engaging an underage
minor into inappropriate sexual
relationships through the internet.
Online predators may attempt to initiate
and seduce minors into relationships
using chat rooms or internet forums.
Online predators may try to lure kids
and teens into sexual conversations or
even face-to-face meetings. Predators
will sometimes send obscene material
or request that kids send pictures of
themselves (Internet Safety for Kids-
Staying safe from online predators n.d.).
Flaming
is the act of saying
mean things online,
usually in ALL CAPS,
and often in a public
forum with the
intention to humiliate.
Online Ethics and
Etiquette
Online ethics focuses on the
acceptable use of online
resources in an online social
environment. Netiquette is a
combination of the words
network and etiquette and is
defined as a set of rules for
acceptable online behaviour
(What is Netiquette? A Guide to
Online Ethics and Etiquette
n.d.).
10 Basic Rules of Netiquette
1. Make Real
People a Priority
If you are talking
personally and
face to face with
someone, stop
browsing or
chatting with
anybody else in
your cellphone.
2. Use
Respectful
Language
Avoid name-calling,
cursing, expressing
deliberately offensive
opinions. In typing, don't
use caps lock. Text in all
caps is generally
perceived as yelling or
flaming which cause
misunderstanding and
trouble. Please don't
forget to say please and
thank you as
appropriate.
• Avoid sending naked sexy
pictures, drunk pictures, drug
use pictures or unedited
3. Share With Discretion home video. If you would
have a problem with your
boss, your parents, or your
kids seeing it now, or at any
point in the future, don't post
it online. Children should not
post private information
online. Do not also share your
location or picture where you
are currently at. Keep your
personal information private.
4. Don't Exclude Others • Don’t let others feel that
they are the one you are
talking to in your obscure
comment to your
Facebook status, forum or
Instagram story. And if
you have an in-joke to
share with one other
person, or a small
number of people in a
larger online group, send
them a private message.
5. Choose Friends Wisely
• It is insulting to be dropped
from someone's friend list on a
social media site. So, think
about it before sending a friend
request or accepting an
invitation. If you don't want to
be in touch with someone,
don't add them in the first
place. This must be observed
by kids or teens so they will not
be a victim of online predation.
People sometimes are good in
pretending just to get your
attention or use fake accounts.
6. Respect People's Privacy
• One example is when you send email to
multiple recipients, don’t send it at once,
you can send it privately individually or use
BCC (blind carbon copy) rather than CC
(carbon copy). The same goes for
uploading photos or videos that include
other people because others who are in
this photo don’t want to be viewed by
unknown friends. This also applies for
tagging people on Facebook because
others don’t want to be tagged. Another
example is don't sign up for newsletters
and other communications using someone
else's email address. If you apply this rule,
hackers might not have chance to enter
and ruin your digital life.
7. Fact Check Before Reposting
• If you aren't sure of the facts that you’re
going to repost, email it to someone who
does know or can find out. Or do a search
on Google or snopes.com. Because once
you’ve reposted a fake news or false facts,
many can possibly believe it and spread
once again. Don't forget also that many
viruses are circulated via chain letters and
invitations. So, forwarding or reposting this
kind of messages will not bring good luck
but rather bad luck. Don’t forget to cite the
owner of the post or where it came from.
And before posting, check whether it is
appropriate or inappropriate to others.
8. Respond to Emails
Promptly
In doing this, you can easily check
whether the emails you received
are spams, unsolicited messages
or crafty stuffs and delete these
right away. But if you send your
email to your friends or set it as
public, then you need to respond
immediately. But double-check
where it really came because
there are fond of playing or
making fake emails just to contact
you.
9. Update Online
Information
Don't leave inaccurate
information online that will
mislead your friends or your
customers if you have an
online business. If you have a
business website, update it
regularly. Like your operating
hours, if you are not available
for that time, change it right
away.
10. Think before
Click
Don’t hesitate to think before
clicking because you might click
an unknown links or files that are
likely to contain malware which
will infect your devices or a link
to hacker’s website. Think before
clicking Like in social media posts
because it might be a suicide
post that will end to death
because you liked his suicidal
post.

You might also like