You are on page 1of 12

SPECIAL PROGRAM IN TECHNICAL VOCATIONAL

EDUCATION (SPTVE)

ICF 9
Internet and Computing
Fundamentals

Quarter 4 – Week 7-8

Accessing the Internet in a


Legal & Safe Manner

Protecting Yourself
MODULE 4 Using the Internet
Week 7 Accessing the Internet in a Legal and Safe
Manner

What I need to know?


1. Identify the different ethical issues when using Computer and internet
2. Discuss the implications of the different ethical issues or problems
3. Cite some restricting ways to prevent unauthorized access.

What Is It?
Restricting Access

 No quality control on information accessed via Internet


 May be necessary to restrict access to specific information
 In work or school environment, could be policies regarding restricting Internet access
 Firewall software used to control access to resources on company network
from outside, but can also control employee access to Internet resources

 For the home or school user, several companies provide special software to restrict
access to Internet, or at least to certain types of sites on Internet
 Internet filter software can be used to block access based on keywords entered
into software
 Could be set up on computers to prevent access to questionable sites at any time
 On personal level, can provide certain level of access control by setting options on
browser

Copyright

 Refers to protection of any material, published or unpublished, created by


individual
 Extends to book material, music, video, essays, white papers, pictures, software
programs, web sites, etc.
 Anything created by individual is owned by individual
 Can only use that material if creator grants you rights to use it
 When information published on web site, permitted to view information but restrictions
apply
 Considered “fair use” or belief that portions of copyrighted information can be
used for purpose of criticism or comments

Trademark- is item registered with organization for purpose of being able to


distinguish it from competitors
 Trademarked item displays ™ symbol next to it
 Copyright implicitly belongs to owner of web site or published material, even if no ©
symbol or text appears on product
 Originator may have patent on product or technology
 To use information, send web site owner e-mail asking for permission

Identifying Ethical Issues

Libel
 When one makes untrue statement in public that defames another person’s character
or reputation
 Does not matter whether libelous statement made verbally or in print
 Ethically, libel is wrong under any circumstances
 Treat libel in the same manner as you would with rumors; don’t start and don’t listen or
respond to any

Plagiarism
 When you use information created by another person and present it as if it were your
own
 Stealing intellectual property from someone else
 If must use information Internet, use in its original form and reference site where you
found information
 Always try to cite sources where you found information and author of that product or
service
 Give credit where credit is due — with the originator!

Phishing – Internet pirates steal personal financial information with a new type of internet
piracy , pronounced as “fishing” and that’s exactly what these thieves are doing fishing
for your personal financial information.

Spoofing – is a cybercrime that happens when someone impersonates a trusted contact or


brand, pretending to be someone trust in order to access sensitive personal
information.
Spoofing attacks through websites, emails, phone calls, texts . IP addresses and servers. Its
main goal is to access personal information, steal money, bypass network access controls or
spread malware through infected attachments or links.
Criminal Activity
 As Internet is communication medium, it can be used to send questionable or
controversial information
 People can pretend to be someone else while working online as way of committing
crimes
 Internet can be used to exchange controversial material as it is more difficult to detect
than regular mail
 Although Internet based on freedom of speech, hosting sites that incite hatred of any
kind is illegal in most countries
 Hacking into another computer with intent to destroy or cripple company’s business is
also crime
 Creating viruses and sending to people so computers or information destroyed or
disrupted is crime

Unethical Behavior
 Some actions not directly illegal but nevertheless considered unethical behavior
 Always keep the golden rule of Netiquette (and real life) in mind: do unto others as
you would have them do unto you!

What have I learned ?


Directions: Answer the following questions on the space provided.

1. What are the different unethical issues commonly known?


2. Can you differentiate Phishing from Spoofing? Discuss each issues.
3. How these issues can be prevented? Can you cite ways to avoid these?

What I Can Do ?

Activity 1: Read and identify the correct answer for each statement below:

Libel Copyright Spoofing

Plagiarism Filter

1. Software can be used to block access based on keywords


2. Stealing intellectual property from someone else
3. Pretending to be someone trust in order to access sensitive personal information.
4. When one makes untrue statement in public that defames another person’s
character or reputation
5. Refers to protection of any material, published or unpublished, created by individual
Activity 2: True or False: Write word True if the statement is correct and False if otherwise.

1. Phishing into another computer with intent to destroy or cripple company’s business.
2. People can pretend to be someone else while working online as way of committing crimes.
3. Always keep the golden rule of Netiquette (and real life) in mind: do unto others as you
would have them do unto you!
4. Filter attacks through websites, emails, phone calls, texts . IP addresses and servers.
5. Trademarked item displays GT symbol next to it.

Assessment

Multiple Choice: Read the sentences below and write the correct letter of your choice.
Use a separate paper for your answer.

1. What term is referred to the protection of any material, published or unpublished, created
by individual.
A. Trademark B. Patency C. Restriction D. Copyright
2. Rowena copied information created by another person and take it as her own. What
ethical issue is described?
A. Hacking B. Plagiarism C. Controlling D. Spoofing
3. Many schools control students’ access to computers and the internet through the use of…
A. Password B. Filters C. Firewall D. All of the above
4. When is it acceptable to use information found in the internet?
A. When you copy data for a report and claim it as your own.
B. When you are granted fair use by a company to use a graphic from their website.
C. When you copy a logo from a website and change the colors to make it your own
D. When you download music from a website that does not charge for copyright
material.

5. A cybercrime that happens when someone impersonates a trusted contact or brand.


A. Scammer B. Spoofing C. Plagiarism D. Hacker
6. Internet pirates steal personal financial information with a new type of internet piracy.
A. Scammer B. Phishing C. Plagiarism D. Spoofing
7. When one makes untrue statement in public that defames another person’s character or
reputation.
A. Libel B. Spoofing C. Plagiarism D. Hacking
8. An item registered with organization for purpose of being able to distinguish it from
competitors.
A. Trademark B. Patency C. . Copyright D. Brand
9. A software used to control access to resources on company network from outside.
A. Browser B. Copyright C. Firewall D. Trademark
10. software can be used to block access based on keywords entered into software.
A. Browser B. Copyright C. Firewall D. Filter

REFERENCE
ICF 9 MODULE – LIVING ONLINE
www.google.com
MODULE 4 Looking at the Internet
TOPIC 8 Protecting Yourself

What I need to know?

At the end of the lesson, the students should be able to :

1. define the meaning of cybercrime


2. discuss the ways of protecting our privacy from using Internet
3. list down the tips on how to protect ourselves from cybercrime

What Is It?

As online communication and social media connect us to more and more people, and as
various entities collect (and reveal) more and more information about us, a chorus of
commentators proclaims that we need privacy—now more than ever

When it comes to privacy and accountability, people always demand the former for
themselves and the latter for everyone else." -- David Brin

"The principles of privacy and data protection must be balanced against additional societal
values such as public health, national security and law enforcement, environmental
protection, and economic efficiency." -- Omer Tene and Jules Polonetsky

Cybercrime is an ongoing threat.


You might think that the only form of cybercrime you have to worry about is hackers stealing
your financial information. But it may not be so simple. There are far more concerns than just
basic financial ones. Cybercrime continues to evolve, with new threats surfacing every year.
When you hear and read about the range of cybercrimes out there, you might be tempted to
stop using the internet entirely. That’s probably too drastic.

What is cybercrime?

Cybercrime is any crime that takes place online or primarily online. Cybercriminals often
commit crimes by targeting computer networks or devices. Cybercrime can range from
security breaches to identity theft.
Other cybercrimes include things like “revenge porn,” cyber-stalking, harassment, bullying,
and child sexual exploitation.
Terrorists collaborate on the internet, moving terrorist activities and crimes into cyberspace.
How to protect yourself against cybercrime

Anyone using the internet should exercise some basic precautions. Here are 11 tips you can
use to help protect yourself against the range of cybercrimes out there.
1. Use a full-service internet security suite
For instance, Norton Security provides real-time protection against existing and emerging
malware including ransomware and viruses, and helps protect your private and financial
information when you go online.
2. Use strong passwords
Don’t repeat your passwords on different sites, and change your passwords regularly. Make
them complex. That don’t repeat your passwords on different sites, and change your
passwords regularly. Make them complex. That means using a combination of at least 10
letters, numbers, and symbols. A password management application can help you to keep
your passwords locked down.
3. Keep your software updated
This is especially important with your operating systems and internet security software.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access to
your system. Patching those exploits and flaws can make it less likely that you’ll become a
cybercrime target.
4. Manage your social media settings
Keep your personal and private information locked down. Social engineering cybercriminals
can often get your personal information with just a few data points, so the less you share
publicly, the better. For instance, if you post your pet’s name or reveal your mother’s maiden
name, you might expose the answers to two common security questions.
5. Strengthen your home network
It’s a good idea to start with a strong encryption password as well as a virtual private
network. A VPN will encrypt all traffic leaving your devices until it arrives at its destination. If
cybercriminals do manage to hack your communication line, they won’t intercept anything but
encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi network, whether
it’s in a library, café, hotel, or airport.
6. Talk to your children about the internet
You can teach your kids about acceptable use of the internet without shutting down
communication channels. Make sure they know that they can come to you if they’re
experiencing any kind of online harassment, stalking, or bullying.
7. Keep up to date on major security breaches
If you do business with a merchant or have an account on a website that’s been impacted by
a security breach, find out what information the hackers accessed and change your
password immediately.
8. Take measures to help protect yourself against identity theft
Identity theft occurs when someone wrongfully obtains your personal data in a way that
involves fraud or deception, typically for economic gain. How? You might be tricked into
giving personal information over the internet, for instance, or a thief might steal your mail to
access account information. That’s why it’s important to guard your personal data. A VPN —
short for virtual private network — can also help to protect the data you send and receive
online, especially when accessing the internet on public Wi-Fi.
9. Know that identity theft can happen anywhere
It’s smart to know how to protect your identity even when traveling. There are a lot of things
you can do to help keep criminals from getting your private information on the road. These
include keeping your travel plans off social media and being using a VPN when accessing
the internet over your hotel’s Wi-Fi network.
10. Keep an eye on the kids
Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect
them against identity theft. Identity thieves often target children because their Social Security
number and credit histories frequently represent a clean slate. You can help guard against
identity theft by being careful when sharing your child’s personal information. It’s also smart
to know what to look for that might suggest your child’s identity has been compromised.
11. Know what to do if you become a victim
If you believe that you’ve become a victim of a cybercrime, you need to alert the local police
and, in some cases,. Your report may assist authorities in their investigations or may help to
thwart criminals from taking advantage of other people in the future. If you think
cybercriminals have stolen your identity. These are among the steps you should consider.

• Contact the companies and banks where you know fraud occurred.
• Place fraud alerts and get your credit reports.
• Report identity theft to the NTC.

Protecting Yourself
 Who owns any original work you do on public computer?
 In general, if you work on something personal during company time on company
computer, because computer belongs to company, material created also belongs to
company
 Same principles apply to any work you do on school computer
 You are responsible to ensure you are not violating rules in any way
 Consider ethics as reflection of what you may be doing online
 If not aware of rules and guidelines, always ask someone who might have an answer
or lead you to where you might find information

Buying Online
 Do not ever give credit card information indiscriminately
 Be sure web site is valid company with good reputation
 If company offers deal that seems too good to be true, research that deal
 If receive e-mail or see advertisement about contributing to worthy cause, research
and check validity of charity or cause
 Do not share any login ids or passwords with anyone else
 Do not switch information with anyone you chat with online
 Switch between login id’s and passwords with different sites
 For sites where you purchase frequently, go to that site occasionally and change
profile information and password

Protecting Your Privacy


 Look for privacy statement or policy on web site and read it first
 Don’t fill in any forms unless you really want something from that web site
 Set up browser to limit type of information that can be tracked
 Delete cookies from system if begin to receive lot of junk mail
 Delete history for which sites you have visited
 Consider having separate e-mail address for non-personal items, and use alias
instead who you really are
 Purchase third party software that directly addresses privacy issues

Looking at Personal Responsibilities

Consumables
 Refer to items such as ink cartridges, toner cartridges, paper, disks, CDs, non-
working or old computer components, etc.
 Whenever possible, dispose of consumables in most environmentally friendly manner
 If have old computer that still works, consider donating to charitable organization who
may be able to use it
 May also want to look at refilling ink cartridges
 Check if there are any companies that can recycle old computer items safely

Sharing Your Knowledge


 One advantage of using Internet is ability to find information shared by others
 Consider sharing your knowledge with others
– volunteering time to teach courses
– working with charitable organizations for data entry or technical support
– teaching or supporting family and friends

What have I learned ?

Directions: Answer the following questions on the space provided.

1. What is a cybercrime?
2. How will you protect your privacy from doing online using the Web?
3. Can you cite the different ways on how to protect ourselves from cybercrime?
What I Can Do ?
Activity 1: Be able to supply the correct ideas on how to protect ourselves from cybercrime. Fill in the
correct answer s on the What TO Do column.

Way to Protect What to do:

Use strong passwords

Manage your social


media settings

Keep your software


updated

Keep an eye on the


kids

Assessment

True or False. Write T if the statement is correct and F if otherwise.

_____1. Delete cookies from system if begin to receive lot of junk mail.
_____2. One advantage of using Internet is ability to hide information shared by others.
_____3. Consider having separate e-mail address for non-personal items, and use alias
instead who you really are.
_____4. Be sure web site is Invalid company with good reputation.
_____5. Look for privacy statement or policy on web site and ignore it.
_____6. Do not share any login ids or passwords with anyone else.
_____7. Consider ethics as reflection of what you may be doing online.
_____8. Copy your passwords on different sites, and change your passwords.
regularly.
_____9. It’s smart to know how to protect your identity even when traveling.
_____10. You can switch information with anyone you chat with online.

REFERENCE
ICF 9 MODULE – LIVING ONLINE
google.com/ Wikipedia.com
www.google.com
KEY ANSWER

Week 7

Activity 1:
1. Filter
2. Plagiarism
3. Spoofing
4. Libel
5. Copyright

Activity 2:
1. False .
2. True ` .
3. True .
4. False .
5. False

Assessment

1. D 6. B
2. B 7. A
3. D 8. A
4. C 9. C
5. B 10. C

Week 8

Activity 1: Answers may vary

Assessment:

1. T
2. F
3. T
4. F
5. F
6. T
7. T
8. F
9. T
10.F
MA. RUBY P. LEDESMA
Teacher III, TVE Dept.- DMLMHS
The Writer

Published: October, 2020

You might also like