You are on page 1of 12

Rules of Netiquette

• Online security, safety, and ethics


• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills
At the end of this lesson, the students should be able to:

1. consider one’s and others’ safety when sharing


information using the Internet;

2. consider one’s and others’ reputation when using the


Internet;

3. determine and avoid the dangers of the Internet;

4. be responsible in the use of social networking sites; and

5. browse the Internet efficiently and properly through


proper referencing.
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of
the coin.” The Internet is one of the most
dangerous places, especially if you do
not know what you are doing.
Internet safety, or online safety is the
knowledge of maximizing the user’s
personal safety and security risks to
private information and property
associated with using the internet,
and the self-protection form
computer crime in general.
Internet Threats:
1. Malware – stands for malicious software.
a. Virus- malicious program designed to replicate
itself and transfer from one computer to
another.(flash drives,CD’s and Internet) .
b. Worm- malicious program that transfers from one
computer to another by any type of
means.(computer network).
c. Trojan- malicious program that is disguised as a
useful program but once downloaded and
installed,leaves your PC unprotected and allows
hackers to get your information.
*Rogue security software – tricks the user into
posing that is security software.
d. Spyware – a program that runs in the background without
you knowing it ”spy”. Ability to monitor what you are currently
doing and typing.
* Keyloggers – used to record the keystroke done by the
user.Done to steal password and information.
e. Adware- a program designed to send you
advertisements,mostly pop-ups.

2. Spam – unwanted email mostly from bots or advertisers. It


can be used to send malware.

3. Phishing – Its goal is to acquire sensitive personal


information like passwords and credit card details.
* Pharming – a more complicated way of phishing where it
exploits the DNS (Domain Name System)
Think Before You Click
1. Before you post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to see
it? Would you want your future boss to see it? Once you post
something on the web, you have no control of who sees your
posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
Fair Use
Intellectual property may be used without
a consent as long as it is used in
commentaries,criticisms,search
engines,parodies,news report,research.

Cybercrime- a crime commited or


assisted through the use of the internet.

Privacy Policy- tells the user how the


website will handle its data.

You might also like