“The use of good manners in online communication such
as e-mail, forums, blogs, and social networking sites.
It is important to use netiquette because communication online is non-verbal.” Type of Information Shared Not Shared Reason 1. First name
2. Last name
3. Middle name
4. Current and previous school(s)
5. Your cellphone number
6. The name of your mother and father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Virus A malicious program design to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs. Worm A malicious program that transfers from one computer to another by any types of means. Often, it uses a computer network to spread itself. Ex. Love Bug Worm (ILOVEU) Trojan A malicious program that is disguised as a useful program once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. Ex. Rogue Security Software Spyware A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through keylogging. Keyloggers – used to record the keystroke done by the user. Adware program designed to send you advertisement, mostly as pop ups. Unwanted email mostly from bots or advertisers. Its goal is to acquire sensitive personal information like passwords and credit cards details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. Its goal is to acquire sensitive personal information like passwords and credit cards details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. A more complicated way of phishing where it exploits the DNS (Domain Name System) system. Create a campaign materials promoting “Think before you click.”. It could be in a form of small posters, collage, slogan or ad campaign. Click here! Research for a several news and events related to cybercrime. Using your cellphone or any video-recording device, report it as if you were a newscaster.