You are on page 1of 3

September 6, 2023

LESSON 2: Online Safety, Security and Netiquette


The internet is the guiding technology of the Information Technology Age just as the electrical engine was of the
Industrial Age. In these times, more and more people are already engaged in the use of technology. These people who
are raised in a digital, media-saturated world are called digital natives. No doubt, the Internet has been very useful to
us but with the rise of instant messaging, chat rooms, emails and social networking sites, it can also bring trouble - from
cyberbullying to more serious Internet dangers, including exposure to sexual predators. Thus, internet safety is always
our primary concern.

There's almost no limit to what you can do online. The Internet makes it possible to access information quickly,
communicate around the world, and much more. Unfortunately, the Internet is also home to certain risks, such as
malware, spam, and phishing. If you want to stay safe online, you'll need to understand these risks and learn how to
avoid them.
Kinds of Online Threats
There is no doubt that you need to be vigilant online. As the World Wide Web evolved over the years, many internet
predators have been playing on vulnerabilities to attack computers and retrieve sensitive data from individuals. Half the
time, we aren’t even aware it is happening until it is too late. Online threat is deemed any malicious act that attempts to
gain access to a computer network without authorization or permission from the owners. These are usually done by
computer hackers who uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware
and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such
as links in email or Instant Messaging apps, or any malware attachments on servers that access the Web. They benefit
cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets. Web threats pose
a broad range of risks, including financial damages, identity theft, loss of confidential information/data, theft of network
resources, damaged brand/personal reputation, and erosion of consumer confidence in e-commerce and online banking.
The following are the top kinds of online threats that you should be aware of:
Phishing happens when an email is sent from an internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.

Pharming happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a
legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in
the financial sector, including banks, online payment platforms, or other e-commerce destinations.
Internet Scam generally refers to someone using internet services or software to defraud or take advantage of
victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work
email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other
valuable personal information. Online scams may come in various forms such as lottery scam, charity fraud
scams, job offer scams, and online dating scams to name a few.

Internet robots are also known as spiders, crawlers, and web bots. It is a software application that is
programmed to do certain tasks. Bots are automated, which means they run according to their instructions
without a human user. Some bots are useful, such as search engine bots that index content for search or customer
service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web
for contact information for sending spam, or perform other malicious activities. If it's connected to the Internet,
a bot will have an associated IP address.
Malware or malicious software, is any program or file that is harmful to a computer user. Here are the most
common offenders in the rogues’ gallery of malware:
o Adware (advertising supported software) is unwanted software designed to throw advertisements up
on your screen. Example, pop-up ads and banner ads.
o Spyware is malware that secretly observes the computer user’s activities without permission and reports
it to the software’s author. Example is a keylogger.
o Virus and Worms are malwares that attach to another program and, when executed—unintentionally
by the user—replicates itself by modifying other computer programs and infecting them with its own
bits of code.
o Trojan, or Trojan horse, is one of the most dangerous malware types. It usually represents itself as
something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain
unauthorized access to the affected computer. From there, Trojans can be used to steal financial
information or install threats like viruses and ransomware. Ransomware is a form of malware that locks
you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
Spams are unsolicited emails, instant messages coming from recipients that are not granted verifiable
permission for the message to be sent. Spam messages can be damaging if you open or respond to it.
Cyberstalking refers to the use of the internet or other electronic device to harass or stalk individuals or
organizations.
Cyberbullying refers to the act of tormenting, harassing, or embarrassing another person using the internet.
Spoofing happens when someone or something pretends to be something else to gain our confidence, get access
to our systems, steal data, steal money, or spread malware.
Activity 2.1: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of online threat represented by each
image. Write your answers in ½ crosswise.

1.

#______________________

2. #___________________

3. #_______________________

4. #_________________________

5. #__________________________

You might also like