You are on page 1of 6

OUR LADY OF LA PORTERIA ACADEMY

San Antonio, Calabanga, Camarines Sur


HIGH SCHOOL DEPARTMENT

MODULE IN EMPOWERMENT TECHNOLOGIES 12


Written Work
(Assessment) _________
Name _____________________________________________________________ Performance
Task (Activity &
Grade & Section: ___________________________ Date: _________________ Application _________

SECOND SEMESTER

Module 2: ONLINE SECURITY AND SAFETY

OVERVIEW OF THE MATERIAL

In our present situation, if we exposed ourselves to the threat


of having corona virus disease, we are putting our lives and the
others into danger. That is why the government and other
organizations impose rules about the prevention of spreading the
disease to protect all of us. If you relate it in using the internet, there
are threats that could harm us and our computer. That is why there
are rules for the safety and security of online users.
In this module, you will learn about the internet threats and
also how to share personal information online for your safety.

LESSONS AND COVERAGE

In this lesson, you will be able to describe the


Lesson 1 Internet Threats present state of Information and
Communication Technology in the country.
In this lesson, you will identify the different online
Lesson 2 Rules of Netiquette
M systems, functions, and platforms.

MODULE MAP

ONLINE SECURITY AND SAFETY

Internet Threats Rules of Netiquette

LEARNING COMPETENCY LEARNING OUTCOMES

Apply online safety, security, ethics, and At the completion of this module, you shall be
etiquette standards and practice in the able to:
use of ICTs as it would relate to their  Identify the different threats that could
specific professional tracks. (CS_ICT11/12- found on the internet;
ICTPT-la-b-2)  Describe the do’s and don’ts of online
communication ; and
 Explain how to avoid internet threats.
INTEGRATED VALUES

Critical-thinking, Perseverance, Obedience


ESSENTIAL QUESTION

What is the importance of online reputation to a modern world of communication?

ACTIVITY

Have you been a victim of internet hacking? Were your files have corrupted because
of a virus or a malware? Share your experience about it and the actions you did to resolve
the problem. Write your answer in the box below. (5 pts)

ANALYSIS

1. What are the do’s and don’ts in online communication?


2. What are the threats on using too much internet?
3. How will you protect your reputation online?

No part of this module may be reproduced in any form including photocopying without permission from OLPA. 2
Phone: 09097636502 E-mail: mecochica54321@gmail.com
ABSTRACTION

INTERNET THREATS

Internet safety refers to the online security or safety of people and their information
when using the internet. However, there are instances that we cannot avoid internet threats
because we are using the internet.
The following are some of the internet threats we could encounter:
1. Malware- Stands for malicious software. It is a set of instructions that run on your
computer and make your system do something that an attacker wants it to do.

What does it do?


 Steal personal information
 Delete files
 Click Fraud
 Steal software serial number
 Use your computer as relay

Kinds of Malware

Virus Worm Trojan Spyware Adware

a. Virus- A computer virus is a piece of malicious computer code that attaches itself
to a software program, email, or computer file without your permission. It can
transfers through the internet and local networks or data storage like hard drives
and CDs.
b. Trojan- A malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get
your information.
c. Worm- A malicious program that transfers from one computer to another by any
type of means. It uses computer network to spread itself.
Example: ILOVEYOU worm
d. Spyware- A program that runs in the background without you knowing it. It has
the ability to monitor what you are currently doing and typing through
keylogging.
e. Adware- A program designed to send you advertisements, mostly as pop ups.

2. Phishing- is software or a program used by an attacker to obtain personal


information. It targets the passwords to hack and take control of a user account.
Example: You have searched information on a website, then it needs one of
your social media account profile. If you share your profile you gave
risk to your account.
 Pharming- It is a more complicated way of phishing where it exploits the
DNS (Domain Name Service) system.

How can we avoid these threats?

 A very effective way of avoiding these threats is verifying the authenticity and
credibility of the web source.
 Install anti-virus on your computer.
Top 10 best free anti-virus of 2020 according to antivirussoftwareguide.com
• Total AV • PC Protect
• McAfee • Bitdefender
• Norton • Avast
• AVG • Kaspersky
• Malwarebyte • Bullguard

No part of this module may be reproduced in any form including photocopying without permission from OLPA. 3
Phone: 09097636502 E-mail: mecochica54321@gmail.com
RULES OF NETIQUETTE

Netiquette stands for network etiquette which means the do’s and don’ts of online
communication.
Here are the ten rules of netiquette for the security and safety of online users:

Rule no. 1: Remember the human.

You need to remember that you are talking to a real person when you are
online. The internet brings people together who would otherwise never
meet. Remember this saying when sending an email: Would I say this to the
person’s face?

Rule no. 2: Adhere to the same standards online that you follow in real life.

You need to behave the same way online that you do in real life. You need
to remember that you can get caught doing things you should not be
doing online just like you can in real life. You are still talking to a real person
with feelings even though you can’t see them.

Rule no. 3: Know where you are in a cyberspace.

Always take a look around when you enter a new domain when surfing the
web. Get a sense of what the discussion group is about before you join it.

Rule no. 4: Respect other people’s time and bandwidth.

Remember people have other things to do besides read your email. You
are not center of their world.

Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.

Rule no. 5: Make yourself look good online.

Be polite and pleasant to everyone. Always check your spelling and


grammar before posting. Know what you are talking about and make
sense sating it.

Rule no. 6: Share expert knowledge.

Ask questions online, share what you know online. Post the answers to your
questions online because someone may have the same question you do.

Rule no. 7: Help keep flame was under control.

Netiquette does not forgive flaming. Netiquette does however forbid


people who are flaming to hurt discussion groups by putting the group
down.

Rule no. 8 Respect other people’s privacy.

Do not read other people’s mail without their permission. Going through
other people’s things could cost you, your job or you could go even to jail.
Not respecting other people’s privacy is a bad netiquette.

Rule no. 9: Don’t abuse your power.

Do not take advantage of other people just because you have more
knowledge or power than them. Treat others as you would want them to
treat you if the roles were reversed.

Rule no. 10: Be forgiving of other people’s mistake.

Do not point out mistakes to people online. Remember that you were once
the new kid on the block.

No part of this module may be reproduced in any form including photocopying without permission from OLPA. 4
Phone: 09097636502 E-mail: mecochica54321@gmail.com 3
APPLICATION

Choose three (3) among the 10 rules of netiquettes and cite an example/situation
where the rules that you chose were followed.

Example: Rule no. 8 Respect other people’s privacy. Nene borrowed the cellphone of
her classmate to take a photo of their class, suddenly the phone rung and a
notification was pop-out on the screen. Nene immediately gave the phone
to her classmate without reading the whole notification.
Write your answer on the space provided. (5 pts each)
1. Rule No. ___________________________________________________

______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________

2. Rule No. ___________________________________________________

______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________

3. Rule No. ___________________________________________________

______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
_____________________________________________________________________________________

ASSESSMENT

A. Answer the following questions. Write your answer on the space provided.

1. What do you call the piece of malicious ________________________________


computer code that attaches itself to a software
program, email, or computer file without your
permission?

2. What do you call the internet threat that stands ________________________________


for malicious software?

3. What do you call the complicated way of ________________________________


phishing where it exploits the DNS (Domain Name
Service) system?

4. What is the program designed to send you ________________________________


advertisements, mostly as pop ups.

5. What does a malware do? Give 1 example. ________________________________

No part of this module may be reproduced in any form including photocopying without permission from OLPA. 5
Phone: 09097636502 E-mail: mecochica54321@gmail.com
3
B. Essay. In your own experience of using the internet, how do you avoid online and
internet threats?

______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________

REFERENCES

 https://www.google.com/amp/s/ictcom444251764.wordpress.com/2018/03/31/empower
ment-technologies-lessons-1-15/amp/Empowerment Technology
 https://youtu.be/uL_c_2So9HU

“Thank you for putting effort on answering this module. You did a great job”

Prepared by: TEACHER MECO A. CHICA


Subject Teacher

No part of this module may be reproduced in any form including photocopying without permission from OLPA. 6
Phone: 09097636502 E-mail: mecochica54321@gmail.com 3

You might also like