• Internet threats • Protecting reputations online • Copyright • Contextualized online search and research skills At the end of this lesson, the students should be able to:
1. consider one’s and others’ safety when sharing
information using the Internet;
2. consider one’s and others’ reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through
proper referencing. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. Internet safety, or online safety is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with using the internet, and the self-protection form computer crime in general. Internet Threats: 1. Malware – stands for malicious software. a. Virus- malicious program designed to replicate itself and transfer from one computer to another.(flash drives,CD’s and Internet) . b. Worm- malicious program that transfers from one computer to another by any type of means.(computer network). c. Trojan- malicious program that is disguised as a useful program but once downloaded and installed,leaves your PC unprotected and allows hackers to get your information. *Rogue security software – tricks the user into posing that is security software. d. Spyware – a program that runs in the background without you knowing it ”spy”. Ability to monitor what you are currently doing and typing. * Keyloggers – used to record the keystroke done by the user.Done to steal password and information. e. Adware- a program designed to send you advertisements,mostly pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It
can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details. * Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name System) Think Before You Click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to “private.” In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate. If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property. Fair Use Intellectual property may be used without a consent as long as it is used in commentaries,criticisms,search engines,parodies,news report,research.