You are on page 1of 9

Q1/W2

SHS
Empowerment Technologies
(for the Strand)

Quarter 1
Learning Activity Sheet 2
ONLINE SAFETY, SECURITY, ETHICS
AND ETIQUETTE
Negros Occidental High School

Government Property
NOT FOR SALE
LEARNING ACTIVITY SHEET 2
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE

I. Learning Competency (MELC) with Code

Apply online safety, security, ethics, and etiquette standards and


practice in the use of ICTs as it would relate to their specific
professional tracks (CS_ICT11/12-ICTPT-Ia-b2)

I. Background Information for Learners

Online Safety and Security


The Internet, truly, is a powerful tool. It can be used to promote
your business, gain new friends, and stay in touch with the old ones. It
is also a source of entertainment through games, online communities,
and everything in between. But like most things in this world, there is
always "other side of the coin".
The internet is one of the most dangerous places especially if
you do not know what you are doing with it. But there is no need to
worry; it is never that late. Hopefully, by the end of this lesson, you can
consider how you go about your use of the Internet. Let us go back
to the previous activity. Let us visit each item and see how risky it is to
share them.
Internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and
can grab that information.
This is why social networking sites like Facebook continue to
improve their security features. The threat of cybercrime is very real.
Whatever information we share today could affect our future.

2
Tips to Stay Safe
Online
The Internet is a public place and it is up to you to protect yourself.
Here are some tips to help you stay safe when using the internet.
• Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read it.
• Know the security features of the social networking site you use.
By keeping your profile private, search engines will not be able to
scan your profile. Do not share your password with anyone.
• Avoid logging in to public networks/Wi-Fi. Browsing in "incognito
(or private) mode will NOT protect you from hackers.
• Do not talk to strangers whether online or face-to-face/
• Never post anything about a future vacation. It is similar to
posting, "Rob my house at this date."
• Add friends you know in real life. Avoid visiting untrusted
websites.
• Install and update an antivirus software on your computer. Use

3
only one anti-
• virus software to avoid conflicts.
• If you have Wi-Fi at home, make it private network by adding a
password. Avoid downloading anything from untrusted websites.
But the software, do not use pirated ones.
• Do not reply or click links from suspicious emails.
• Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over
the Internet and they may be right. Some hackers can find a
backdoor even if your profile is already set to private. You have no
control whoever is looking at your friend's screen
whenever they open your profile or chat with
you.

Internet Threats
Here are some of the threats you should be aware of when using
the Internet:
1. Malware - or malicious software, is any program or file that is
harmful to a computer user.
Types:
a. Virus - a malicious program designed to replicate itself and
transfer from one computer to another (internet, local networks, FDs,
CDs, etc.)
b. Worm - a malicious program that transfers from one computer to
another by any type of means.
E x. ILOVEYOU Worm -The malware
originated in the Pandacan neighborhood of Manila in the
Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
d. Rogue security software – tricks the user into posing that is a
security software. It asks the user to pay to improve hi/her security but in
reality they are not protected at all.

2. Spyware - a program that runs in the background without you


knowing
it (thus called "spy"). It has the ability to monitor what you
are currently
doing and typing through
keylogging.
Ex. Keylogger - used to record keystrokes done by the
user. This is done to steal their password or any other
sensitive information. The key logger software typically
uses log file to store its recording.

4
3. Adware - a program designed to send you advertisements, mostly
as
pop-ups.

4.Ransomware - or ransom software is a type of malicious software


from
cryptovirology that threatens to publish the victim's data or
perpetually
block access to it unless a ransom is
paid.

5.Spam - an unwanted email mostly from bots or advertisers. It can


be used to
send malware.

6. Internet Fraud - is the use of Internet services or software with


Internet access to defraud victims or to otherwise take advantage of
them. Internet crime schemes steal millions of dollars each year from
victims and continue to plague the Internet through various methods.

7,Phishing - its goal is to acquire sensitive personal information like


passwords
and credit card details. This is done by sending you an e-mail
that will direct
the user to visit a fake website and be asked to update his/her
username, password, credit card or personal information.
8.Pharming – a more complicated way of phishing where it exploits
the DNS (Domain Name Service) System.

Protecting Reputations Online


Here are the things you might want to consider before posting
something over the
internet:
1. Before your post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it?
Would you want your future? boss to see it?
2. If you feel that a post can affect you or other's reputation, ask
the one who posted it to pull it down or report it as inappropriate.

5
“Think Before You Click”
Copyright Infringement
It is the use of works protected by copyright law without permission for
a usage where such permission4 is required.
1. Here are some tips that could help you
avoid copyright infringement: Always
assume that the work is copyrighted.
2. Do not copy, share or alter without seeking
permission. Review and retain licensing
agreements. Consider buying content.
3. Give credit to the original author of the page or
information.
Copyright Infringement-reckless copying of copyrighted materials.
Intellectual Property – creating something like an idea, an invention, a
form of literary work or research and you have the right as to how it
should be used by others.
Copyright - a part of the law wherein your rights over your works and
anyone who uses it without your consent is punishable by law.
Cybercrime – a crime committed or assisted through the use of the
internet
Privacy policy – tells the user how the website will handle its data
II. Activities
1. Pre – Test - Rules of Netiquette:
Write Yes if the you agree with the statement and No if you disagree .
1. My computer has an Antivirus so it is okay to open most email
attachments like e-cards and videos.
2. Your friend told you that his college application was rejected due to the
fact that you posted a video of him doing crazy stuff at a party. You
posted the video several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that the college found
the video?
3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game
money. She promises to keep your password a secret. Is it okay to
give your password?

6
4. You received an email; stating that your mother’s bank account is
going to be forfeited if you do not respond to the email. Is it safe to
reply?
5. You forgot that your essay for English class is due tomorrow. While
doing your research, you found a website offering free essays, Is it okay
to use the essays from this free easy website?
6. A virus is a malware that multiplies and infects other computers
through flash drives.
7. Keyloggers are software that show pop-up ads even if you are not
using your browser.
8. Search engines scan websites for search results even if you have set
your post to private.
9. There is danger in posting information about a future vacation.
10. Letting people know your birthday is probably a must if you want to
get as many gifts as possible but having it in your profile makes you
vulnerable to identity theft.
2. Activity: How safe are you
Below is a questionnaire about how much information you have
shared so far. Put a check Under Shared or Not Shared
Type of Information Shared Not
Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous
School
5. Your cellphone number
6. The name of your mother
and father
7. The name of your siblings
8. Your address
9. Your phone number
10. Your birthday

2. Exploration Activity – Cyber News Report


7
Form a group with 5 members each. Research for several news and
events related to cybercrime. Report as if you are a newscaster.
Present in 2-3 minutes

3. Performance Task 2A
1.Visit a social networking site and look for the site’s privacy policy. The
link is typically found at the bottom of the page and sometimes labeled
only as “Privacy”.
2. Write a summary on how the website handles both your private and
public information.

Performance Task 2B
B. Reflection
Share an experience that you have always tend to do but later did you
discover that it is not a standard of ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE.

Reference(s)

Empowerment Technologies First Edition.(2016).Sampaloc


Manila:Rex Bookstore, Inc.
Adopted to: Self-learning Module (SLM) developed by DepEd

8
9

You might also like