Professional Documents
Culture Documents
of
Netiquette
• Privacy, security, and good netizenship are essential words that
you have to remember when you are on the Internet. Do you know
your limitations in social media? Do you feel responsible for what
you are posting? Do you think first before you click?
1. My computer has an antivirus, so it is okay to open most email attachments like e-
cards and video files.
2. Your friend told you that his college application was rejected because you posted a
video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Is it possible that the college
found the video?
3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in–game money. She promises to keep
your password a secret. Is it okay to giveaway your password?
4. You received an email stating that your mother's bank account is going to be forfeited
if you do not respond to the email. Is it safe to reply?
5. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays.
6. There is a danger in posting information about a future vacation.
7. Letting people know your birthday is probably a must if you want to getas many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
8. If there is no copyright notice, it's okay to copy a Web page.
9. Lurking is sometimes considered impolite. It is the practice of reading discussions
without contributing to them.
10. Your cousin asked for your fabulous zucchini cake recipe at the last family
function. While you're sending it to him, you decide to e-mail it to all 500people in
your address book as well. It is an example of email spam.
11. If someone insults and uses offensive language towards you online, you should
reply in the same manner.
12. If someone uses offensive language online, always respond and not worry as no one
knows who you are online.
13. It is ok to constantly give our friends e-mail or items online which they do not need.
14. Remember your audience. If you are putting something on a web page remember
that everyone in the world will have access to it.
15. You are responsible for your actions on the internet.
Netiquette
• Combination of the words network and etiquette, that is concerned
with the "proper" manner of communication in the online
environment. It is what or how we should be expected to behave
online.
• This also includes being courteous, obeying copyright laws, and
avoiding cyberbullying.
Why is Netiquette Important?
• It establishes good behavior online.
10. Your Birthday Criminals can use this information to steal your
identity.
Tips to Stay Online:
1. Be mindful of what you share online and what sites you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy page of a website and learn how the website
handles the information you share.
4. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
5. Do not share your password with anyone.
Tips to Stay Online:
6. Avoid logging in to public networks/Wifi. Browsing in “incognito (or
private mode)”, a feature of the browser, will not protect you fro
hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
Tips to Stay Online:
11. Install and update an antivirus software on your computer. Use only
one antivirus software to avoid conflicts.
12. If you have Wifi at home, make it a private network by adding
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is
most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
Internet Threats
1. Malware – Malicious Software
• The collective name for a number of malicious software variants,
including viruses, ransomware and spyware.
• These consists of code developed by cyber attackers, designed to
cause extensive damage to data and systems or to gain unauthorized
access to a network.
• It is typically delivered in the form of a link or file over email and
requires the user to click on the link or open the file to execute the
malware
Internet Threats
a) Virus – a malicious program designed to replicate itself and transfer
from one computer to another either through the internet and local
networks or data storage like flash drives and CD’s.
b) Worm – a malicious program that transfers from one computer to
another by any type of means. It can replicate itself without any
human interaction, and it does not need to attach itself to a software
program in order to cause damage.
Internet Threats
c) Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
• Rogue Security Software – a form of internet fraud that misleads users into
believing there is a virus on their computer and aims to convince users to pay for a
fake malware removal tool that actually installs malware on their computer. It
manipulates users to through fear, and a form of ransomware.
Internet Threats
d) Ransomware - infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. It
is a criminal moneymaking scheme that can be installed through
deceptive links in an email message, instant message or website.
e) Spyware – a program that runs in the background without you
knowing and has the ability to monitor what you are doing and
typing through keylogging.
• Keyloggers- used to record the keystroke done by users. This is done to steal their
password or any other sensitive information. It can record email, messages, or any
information you type using your keyboard.
Internet Threats
f) Adware – a program designed to send you advertisements, mostly
as pop ups.
Internet Threats
2. Spam – unwanted email mostly from bots or advertisers. It can be
used to send malware.
3. Phishing – acquiring sensitive personal information like passwords
and credit card details. This is done by sending you an email that
will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.
• Pharming - the fraudulent practice of directing internet users to a bogus website
that mimics the appearance of a legitimate one, in order to obtain personal
information such as passwords, account numbers, etc.
Guide Questions:
For DLA 14
1. How can Netiquette and Rules of Netiquette be beneficial to you and to everyone?
2. Aside from the rules given above, give your own rules on how one should maintain and promote netiquette on
different social media platforms. Give at least 5.
3. Why is it important to make ourselves look good online?
Guide Questions:
For DLA 15
1. For you what is online safety and security?
2. Do you think it is really necessary/must to private all your social media accounts? Why?
4. On a separate sheet. create an essay discussing ways and tips to be safe and secure online and explain how
you can you apply them in your daily life, primarily online. The format and criteria for the essay will be posted
in your designated Google Classroom Streams.
Guide Questions:
For DLA 16 Exercise: True/False. Write T if the following statement is TRUE and F if the statement is FALSE. Write your
answer on the spaces provided.
1. Once your PC is infected by a Trojan, there might be a chance that the Trojan may replicate itself
and transfer the infection to another PC’s and data storage.
3. A malware is a virus.