You are on page 1of 7

CO QAH + MELC LW

Course Outline & Quality


HANDOUT No. 2
Assured Handouts paired in EMPOWERMENT TECHNOLOGIES
with MELC-Based Learner’s
Worksheets 1st 2 1-4
Semester: _____ Week No. _____ Day: ______

MELC 2: The learner applies online safety, security, ethics, and etiquette standards and practices in the
use of ICTs as it would relate to their specific professional tracks

MELC 3: The learner uses the Internet as a tool for credible research and information gathering to best
achieve specific class objectives or address situational
Semester:________1ST ____________ Week No._______2_________ Day:_____1-4_____
Lesson: Online safety, security, ethics, and etiquette standards

Kinds of Online Threats


Internet is changing from time to time. As the World Wide Web evolved over the years, many internet
predators have been playing on vulnerabilities to attack computers and retrieve sensitive data from
individuals. Half the time, we are not even aware it is happening until it is too late. The online threat is
deemed any malicious activity that attempts to gain access to a computer network without authorization or
permission from the owners.

The following are the top kinds of online threats that you should be aware of:

1. Phishing happens when an email is sent from


an internet criminal disguised as an email from a
legitimate, trustworthy source.

 The message is meant to lure you into


revealing sensitive or confidential
information. For example, when
someone sent you an email saying
he/she is from a bank, that you need to
update your banking information https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=isch&sa=X&ved=2ahUKEwj7r4K7zvXxAhUGEogKHeVCALkQ_AUo
AXoECAEQAw&biw=1371&bih=690#imgrc=ONklSOgn0lMm5M
2. Pharming happens when a hacker or a “pharmer” directs an internet user to a fake website instead
of a legitimate one.

 These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer.

 Pharmers usually focus on websites in


the financial sector, including banks,
online payment platforms, or other e-
commerce destinations.

 Example of Pharming: The hacker


directs you to your online banking
account and asks for your login details.

 This is an example of a fake online


banking account website that
Metrobank posted so that their clients
will be able to avoid being pharmed.

 Make sure to check with your bank the certified and legit websites and numbers.

1
3. Internet Scam generally refers to someone
using internet services or software to defraud or
take advantage of victims, typically for financial
gain.

 Cybercriminals may contact potential


victims through personal or work email
accounts, social networking sites, dating
apps, or other methods in attempts to
obtain financial or other valuable personal
information.

 Online scams may come in various forms such as lottery scams, charity fraud scams, job offer
scams, and online dating scams to name a few.

4. Internet robots are also known as spiders,


crawlers, and web bots. It is a software application
that is programmed to do certain tasks.

 Bots are automated, which means they run


according to their instructions without a
human user.

 Some bots are useful, such as search


engine bots that index content for search
or customer service bots that help users.

 Other bots are "bad" and are programmed to break into user accounts, scan the web for contact
information for sending spam, or perform other malicious activities. If it is connected to the
Internet, a bot will have an associated IP address.

5. Malware or malicious software, is any program or file that is harmful to a computer user.

Here are the most common offenders in the rogues’ gallery of malware:

a. Adware (Advertising-supported
software) is unwanted software designed
to throw advertisements up on your
screen.

For example, pop-up ads and


banner ads saying you won!
https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=isch&s
a=X&ved=2ahUKEwj7r4K7zvXxAhUGEogKH
eVCALkQ_AUoAXoECAEQAw&biw=1371&bi
h=690#imgrc=ONklSOgn0lMm5M
b. Spyware is malware that secretly
observes the computer user’s activities
without permission and reports it to the
software’s author.
https://www.google.com/
For example, a keylogger search?
q=cyber+crime&source=lnms&t
bm=isch&sa=X&ved=2ahUKEwj
7r4K7zvXxAhUGEogKHeVCALkQ
_AUoAXoECAEQAw&biw=1371
&bih=690#imgrc=ONklSOgn0lM
m5M

2
c. Virus and Worms are malwares that
attach to another program, and when
executed unintentionally by the user—
replicate themselves by modifying other
computer programs and infecting them with
their bits of code.

 Trojan, or Trojan horse, is one of


the most dangerous malware types.
It usually represents itself as
something useful to trick you.

Once it is on your system, the attackers behind the


Trojan gain unauthorized access to the affected
computer. From there, Trojans can be used to steal
financial information or install threats like viruses and
ransomware.

https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=isch&sa=X&ved=2ah
UKEwj7r4K7zvXxAhUGEogKHeVCALkQ_AUoAXoECAEQA
w&biw=1371&bih=690#imgrc=ONklSOgn0lMm5M

d. Ransomware is a form of malware that


locks you out of your device and/or
encrypts your files, then forces you to pay
a ransom to get them back.
https://www.google.com/
search?
q=cyber+crime&source=lnms&t
bm=isch&sa=X&ved=2ahUKEwj
7r4K7zvXxAhUGEogKHeVCALkQ
_AUoAXoECAEQAw&biw=1371
&bih=690#imgrc=ONklSOgn0lM

6. Spams are unsolicited emails, instant


messages coming from recipients that are not
granted verifiable permission for the message
to be sent. Spam messages can be damaging
if you open or respond to them.
https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=
isch&sa=X&ved=2ahUKEwj7r4K7zvX
xAhUGEogKHeVCALkQ_AUoAXoECA
EQAw&biw=1371&bih=690#imgrc=
ONklSOgn0lMm5M

7. Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals
or organizations
.

https://www.google.com/
search?
q=cyber+crime&source=lnms&t
bm=isch&sa=X&ved=2ahUKEwj
8. Cyberbullying refers to the act of
7r4K7zvXxAhUGEogKHeVCALkQ
tormenting, harassing, or embarrassing
_AUoAXoECAEQAw&biw=1371
another person using the internet.
&bih=690#imgrc=ONklSOgn0lM
m5M https://www.google.com/search?
q=cyber+crime&source=lnms&tbm=
isch&sa=X&ved=2ahUKEwj7r4K7zvX
xAhUGEogKHeVCALkQ_AUoAXoECA
EQAw&biw=1371&bih=690#imgrc=
ONklSOgn0lMm5M

3
9. Spoofing happens when someone or
something pretends to be something else to
gain our confidence, get access to our
systems, steal data, steal money, or spread
malware.

ONLINE SAFETY, SECURITY, AND NETIQUETTE

There's almost no limit to what you can do online. The Internet makes it possible to access
information quickly, communicate around the world, and much more. Unfortunately, the Internet is also
home to certain risks, such as malware, spam, and phishing. If you want to stay safe online, you'll need to
understand these risks and learn how to avoid them.

Numerous delinquencies can be committed on the internet such as stalking, identity theft, privacy
violations, and harassment.
To avoid these online crimes, follow the following online safety measures:
 Never give any personal information out about yourself over the internet.
- Name, Address, School, and even your phone number are the most important
details that you should not be posting online. It may also lead to any serious
problem that you may encounter internet threats.

 Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service.
- To make sure that you
are in a secured network,
the website address
should begin with “https://’
as opposed to “http://”.
Never access your
accounts by following an
email link, instead, type
your URL by yourself.
 Never open messages or attachments from someone you do not know.
- Do not communicate with someone you don’t know

 Regularly review your privacy


settings in your online accounts to
make sure you are not sharing
important personal information.
- Set your privacy settings in your
social media accounts like
Facebook.

- Remove the tag and block the


person if you’re being tagged by a

4
Facebook post of someone who is not even on your friends' list.
https://www.google.com/
search?
q=cyber+stalking&source=lnms
&tbm=isch&sa=X&ved=2ahUKE
wj7r4K7zvXxAhUGEogKHeVCALk
Q_AUoAXoECAEQAw&biw=137

 When using a public computer terminal, be sure to delete your browsing data before
leaving.
- Go to the browser, click the
settings, and go to history. Clear
History always. Do not leave any
traces of your login details.
https://www.google.com/
search?
q=cyber+stalking&source=lnms
&tbm=isch&sa=X&ved=2ahUKE
wj7r4K7zvXxAhUGEogKHeVCAL

 Keep your software updated to avoid security holes.


- To be more secure always, update your system especially the antivirus you are using for
there are new viruses and threats online that your computer needs to know.

 Do not download or install software or anything on your computer or cell phone that is
unknown to you.
- For example, in Google Play, you
will be asked first upon installation if
you allow it or not.
https://www.google.com/searc
h?q=cyber+stalking&source=ln
ms&tbm=isch&sa=X&ved=2ahU
KEwj7r4K7zvXxAhUGEogKHeVC
ALkQ_AUoAXoECAEQAw&biw=
1371&bih=690#imgrc=ONklSOg
n0lMm5M

Netiquette is a combination of the words network and etiquette. It is a set of rules for
behaving properly online. Below are the 10 rules of netiquette:

Rule 1: Remember the human.


Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and bandwidth.
Rule 5: Make yourself look good online.
Rule 6:Share expert knowledge
Rule 7:Help keep flame wars under control
Rule 8:Respect other people’s privacy
Rule 9: Don’t abuse power
Rule 10: Be forgiving of other people’s mistakes

TOPIC 2: Effective Internet Research

The Internet has made our lives easier especially in terms of doing research. By browsing the
internet, we can access limitless topics.
Web-based catalogs are available in many libraries to assist researchers in locating printed books,
journals, government documents, and other materials. The biggest obstacle facing all researchers on the
internet is how to effectively and efficiently access the vast amount of information available.

5
Searching the Web

There are billions of information on the web


and it is a challenge for us to truly find which
information is reliable and relevant.

Search Engines are websites used for the


retrieval of data, files, or documents from
databases. Some search engines we use
today are:

Popular Domains
Top-level Domains Country code top-level domains
.edu – educational institution .ph – Philippines
.org – a non-profit organization .eu – European Union
.gov – government site .uk – United Kingdom
.com – commercial site .au - Australia
.net - network

Search Skills and Tools


Boolean Logic – This narrows, broadens or eliminates search terms.

o Boolean “or” – This operator will find pages


that include either of the search terms.

Ex. A or B

o Boolean “and” – This operator will retrieve only


pages containing both terms
Ex. A and B

A B

Boolean “not” – This operator will find pages that do not include search terms immediately
following them.
Ex. A not B
A B

Phase Searching – It is used to search for famous quotes, proper names,

6
recommendations, etc. It encloses the phrase in quotation marks.
Ex. “Jane Doe” “To be or not to be”

Plus (+) – It indicates that the word after the sign is a required word must be found in
search. Example: +fire

Minus (–) sign – It iindicates to exclude a word from your search that is not required on
the result. Example: Jaguar speed –car

Ampersand (@)- It is used to find social tags. Example: @SteveJobs

Hashtag (#)- It is used to find popular hashtags. Example: #LawOfClassroom

Finding Documents – using the filetype refines the search for documents on the web.
 filetype:pdf ofiletype:doc o
filetype:xls

Searching Site – The sites find webpage from a website.


Ex.: National Geographic information in Australia Search:
Australia site: NationalGeographic.com

You might also like