You are on page 1of 37

“The use of good manners in online communication such

as e-mail, forums, blogs, and social networking sites.


It is important to use netiquette because communication
online is non-verbal.”
Type of Information Shared Not Shared Reason
1. First name

2. Last name

3. Middle name

4. Current and previous school(s)

5. Your cellphone number

6. The name of your mother and father

7. The name of your siblings

8. Your address

9. Your home phone number

10. Your birthday


Virus
 A malicious program design to replicate
itself and transfer from one computer to
another either through the Internet and local
networks or data storage like flash drives
and CDs.
Worm
 A malicious program that transfers from one
computer to another by any types of means.
 Often, it uses a computer network to spread
itself.
 Ex. Love Bug Worm
(ILOVEU)
Trojan
 A malicious program that is disguised as a
useful program once downloaded or
installed, leaves your PC unprotected and
allows hackers to get your information.
 Ex. Rogue Security Software
Spyware
 A program that runs in the background
without you knowing it (thus called “spy”).
 It has the ability to monitor what you are
currently doing and typing through
keylogging.
 Keyloggers – used to record the keystroke
done by the user.
Adware
program designed
to send you
advertisement,
mostly as pop ups.
 Unwanted email mostly from bots or
advertisers.
 Its goal is to acquire sensitive personal
information like passwords and credit cards
details.
 This is done by sending you an email that will
direct the user to visit a website and be asked
to update his/her username, password, credit
card, or personal information.
 Its goal is to acquire sensitive personal
information like passwords and credit cards
details.
 This is done by sending you an email that will
direct the user to visit a website and be asked
to update his/her username, password, credit
card, or personal information.
 A more complicated way of phishing where it
exploits the DNS (Domain Name System)
system.
Create a campaign materials promoting
“Think before you click.”.
It could be in a form of small posters,
collage, slogan or ad campaign.
Click here!

Research for a several news and events
related to cybercrime. Using your cellphone
or any video-recording device, report it as if
you were a newscaster.

You might also like