Professional Documents
Culture Documents
SHS
Empowerment Technologies
(for the Strand)
Quarter 1
Learning Activity Sheet 2
ONLINE SAFETY, SECURITY, ETHICS
AND ETIQUETTE
Negros Occidental High School
Government Property
NOT FOR SALE
LEARNING ACTIVITY SHEET 2
ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE
2
Tips to Stay Safe
Online
The Internet is a public place and it is up to you to protect yourself.
Here are some tips to help you stay safe when using the internet.
• Be mindful of what you share online and what site you share it to.
Do not just accept terms and conditions; read it.
• Know the security features of the social networking site you use.
By keeping your profile private, search engines will not be able to
scan your profile. Do not share your password with anyone.
• Avoid logging in to public networks/Wi-Fi. Browsing in "incognito
(or private) mode will NOT protect you from hackers.
• Do not talk to strangers whether online or face-to-face/
• Never post anything about a future vacation. It is similar to
posting, "Rob my house at this date."
• Add friends you know in real life. Avoid visiting untrusted
websites.
• Install and update an antivirus software on your computer. Use
3
only one anti-
• virus software to avoid conflicts.
• If you have Wi-Fi at home, make it private network by adding a
password. Avoid downloading anything from untrusted websites.
But the software, do not use pirated ones.
• Do not reply or click links from suspicious emails.
• Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over
the Internet and they may be right. Some hackers can find a
backdoor even if your profile is already set to private. You have no
control whoever is looking at your friend's screen
whenever they open your profile or chat with
you.
Internet Threats
Here are some of the threats you should be aware of when using
the Internet:
1. Malware - or malicious software, is any program or file that is
harmful to a computer user.
Types:
a. Virus - a malicious program designed to replicate itself and
transfer from one computer to another (internet, local networks, FDs,
CDs, etc.)
b. Worm - a malicious program that transfers from one computer to
another by any type of means.
E x. ILOVEYOU Worm -The malware
originated in the Pandacan neighborhood of Manila in the
Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
d. Rogue security software – tricks the user into posing that is a
security software. It asks the user to pay to improve hi/her security but in
reality they are not protected at all.
4
3. Adware - a program designed to send you advertisements, mostly
as
pop-ups.
5
“Think Before You Click”
Copyright Infringement
It is the use of works protected by copyright law without permission for
a usage where such permission4 is required.
1. Here are some tips that could help you
avoid copyright infringement: Always
assume that the work is copyrighted.
2. Do not copy, share or alter without seeking
permission. Review and retain licensing
agreements. Consider buying content.
3. Give credit to the original author of the page or
information.
Copyright Infringement-reckless copying of copyrighted materials.
Intellectual Property – creating something like an idea, an invention, a
form of literary work or research and you have the right as to how it
should be used by others.
Copyright - a part of the law wherein your rights over your works and
anyone who uses it without your consent is punishable by law.
Cybercrime – a crime committed or assisted through the use of the
internet
Privacy policy – tells the user how the website will handle its data
II. Activities
1. Pre – Test - Rules of Netiquette:
Write Yes if the you agree with the statement and No if you disagree .
1. My computer has an Antivirus so it is okay to open most email
attachments like e-cards and videos.
2. Your friend told you that his college application was rejected due to the
fact that you posted a video of him doing crazy stuff at a party. You
posted the video several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that the college found
the video?
3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game
money. She promises to keep your password a secret. Is it okay to
give your password?
6
4. You received an email; stating that your mother’s bank account is
going to be forfeited if you do not respond to the email. Is it safe to
reply?
5. You forgot that your essay for English class is due tomorrow. While
doing your research, you found a website offering free essays, Is it okay
to use the essays from this free easy website?
6. A virus is a malware that multiplies and infects other computers
through flash drives.
7. Keyloggers are software that show pop-up ads even if you are not
using your browser.
8. Search engines scan websites for search results even if you have set
your post to private.
9. There is danger in posting information about a future vacation.
10. Letting people know your birthday is probably a must if you want to
get as many gifts as possible but having it in your profile makes you
vulnerable to identity theft.
2. Activity: How safe are you
Below is a questionnaire about how much information you have
shared so far. Put a check Under Shared or Not Shared
Type of Information Shared Not
Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous
School
5. Your cellphone number
6. The name of your mother
and father
7. The name of your siblings
8. Your address
9. Your phone number
10. Your birthday
3. Performance Task 2A
1.Visit a social networking site and look for the site’s privacy policy. The
link is typically found at the bottom of the page and sometimes labeled
only as “Privacy”.
2. Write a summary on how the website handles both your private and
public information.
Performance Task 2B
B. Reflection
Share an experience that you have always tend to do but later did you
discover that it is not a standard of ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE.
Reference(s)
8
9