You are on page 1of 39

Rules

of
Netiquette
• Privacy, security, and good netizenship are essential words that
you have to remember when you are on the Internet. Do you know
your limitations in social media? Do you feel responsible for what
you are posting? Do you think first before you click?
1. My computer has an antivirus, so it is okay to open most email attachments like e-
cards and video files.
2. Your friend told you that his college application was rejected because you posted a
video of him doing crazy stuff at a party. You posted the video several years ago but
later took it down to protect your friend’s reputation. Is it possible that the college
found the video?
3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in–game money. She promises to keep
your password a secret. Is it okay to giveaway your password?
4. You received an email stating that your mother's bank account is going to be forfeited
if you do not respond to the email. Is it safe to reply?
5. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays.
6. There is a danger in posting information about a future vacation.
7. Letting people know your birthday is probably a must if you want to getas many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
8. If there is no copyright notice, it's okay to copy a Web page.
9. Lurking is sometimes considered impolite. It is the practice of reading discussions
without contributing to them.
10. Your cousin asked for your fabulous zucchini cake recipe at the last family
function. While you're sending it to him, you decide to e-mail it to all 500people in
your address book as well. It is an example of email spam.
11. If someone insults and uses offensive language towards you online, you should
reply in the same manner.
12. If someone uses offensive language online, always respond and not worry as no one
knows who you are online.
13. It is ok to constantly give our friends e-mail or items online which they do not need.
14. Remember your audience. If you are putting something on a web page remember
that everyone in the world will have access to it.
15. You are responsible for your actions on the internet.
Netiquette
• Combination of the words network and etiquette, that is concerned
with the "proper" manner of communication in the online
environment. It is what or how we should be expected to behave
online.
• This also includes being courteous, obeying copyright laws, and
avoiding cyberbullying.
Why is Netiquette Important?
• It establishes good behavior online.

• Remember that there is a real person on the other end of your


message.
Rules of Netiquette
1. Remember the Human
• You need to remember that you are talking to a real person
when you are online.
• The internet brings people together who would otherwise
never meet.
• Comments online can be misinterpreted
o Avoid Sarcasm
o Use a smiley or emoji if you think your comment may be
misunderstood as being rude
• Remember the Golden Rule: “Do unto others as you
would have them do unto you”
2. Adhere to the same standards of
behavior online that you follow in real life
• You need to behave the same way online that you do in real
life.
• Be ethical. Just because the computer seem like a “barrier”
between you and the other person or situation, that is not an
excuse to lower your ethical standards.
• You need to remember that you can get caught doing things
you should not be doing online just like you can in real life.
3. Know where you are in Cyberspace
• Always take a look around when you enter a new domain when
surfing the web. Netiquette varies from domain to domain.
• So, Lurk before you leap. If you are interested in contributing your
opinion to a message board or discussion forum, first, get a sense of
how the people act. Then go ahead and participate.

Lurking – Browsing social media sites or forums


without engaging with other users
4. Respect other people’s time and
bandwidth
• Remember people have other things to do besides read your
email. You are not the center of their world.
• Remember everyone won’t answer your questions.
5. Make yourself look good online.
• Remember to always check your spelling and grammar
before posting.
• Always know what you are talking about and make saying
it.
• Be polite and pleasant to everyone.
6. Share expert knowledge
• Ask question online
• Share what you know online.
• Post the answers to your questions online
because someone may have the same question you do.
• Just make sure you are right! Remember rule #5 – Make sure
you know what you are talking about!
7. Help keep Flame wars under control
• Flaming. An online act of posting insults, often laced with profanity
or other offensive language on social media sites.
• Don't flame others, and if you are flamed, don't respond. It's like
arguing with a drunk at a football game: You will never win
• If you feel you've been flamed in a forum, make your complaint
public to the entire forum. As much as possible, let's try to resolve
conflicts as they occur and as a team. If you've posted flame-bait, or
perpetuated a flame war, apologize
8. Respect other People’s Privacy
• Do not read other people’s mail without their permission
• Going through other people’s things could cost you, you job, or things
you could even go to jail.
• Not respecting other people’s privacy is bad Netiquette.
• Put yourself in their shoes -You wouldn’t want anyone reading your
email, would you?
9. Don’t Abuse your Power
• Do not take advantage of other people just because you have more
knowledge or power than them.
• If you think you are more knowledgeable than other, always be
humble and still be respectful so that others will respect you.
• Treat others as you would want them to treat you if the roles were
reversed.
10. Be Forgiving of Other People’s
Mistakes
• Do not point out mistakes to people online.
• If you decide to point out someone’s mistakes online, do it politely,
and preferably by personal message, rather than in public.
• RememberRespect
that you were once
other people’s time andthe new kid on the block.
bandwidth
Online
• The internet, is simply defined as the information
superhighway. This means that anyone has access to
this highway, can place info, and can grab
information as well.
Online Safety
• Also called as cyber safety or digital safety which refers to practices
and precautions one should observe when using the Internet.
• The act of maximizing a user's awareness of personal safety and
security risks to private information and property associated with
using the internet, and the self-protection from computer crimes.
•Are you safe and secured
Online?
•How safe and secure are
you Online?
Types of Information with Risk:
• First Name • Home Phone Number
• Last Name • Birthday
• Middle Name • Email Address
• Current and Previous School • ID Information
• Cellphone Number • Card Number
• Mother and Father’s Name • Bank Receipts and Cheques
• Sibling’s Name • Learner’s Number
• Address
Type of Information Risks
1. First name There is a risk in sharing your first name. Chances are,
hacker may already know plenty of stuff about you
and even if you only give out your first name, Likewise,
You do not know whom you can come across with.
2. Last name If sharing your first name is a small risk, having both
your first and last is more risky. You will be vulnerable
to being searched for using search engines, which
include image search. Matching a name with a face is
a modus to several cybercrimes like i8dentity theft.
3. Middle name Sharing your middle name alone is probably not the
most risky of these shared information, but sharing
your full name would be.
4. Current and previous schools Most people who steal identities study their subject.
They can use this information for verification
purposes.
Type of Information Risks
5. Your cellphone number Your cellphone number should never be posted over
the internet. The internet is a public place. It is the
same as posting your number on a billboard. You
would not want random strangers to text or call you,
or worse, pretend that they are someone else.
6. Your parent’s name Risky, yet not as risky as posting their full names,
especially your mother’s maiden name. In fact, you
may have already encountered many websites that
require your mother’s maiden name as answer to a
secret question whenever you lose your password.
7. The name of your siblings Disclosing this is a huge risk. Strangers may pretend or
use their identity to dupe you.
Type of Information Risks
8. Your Current Address Sharing to the internet your current address is also a
huge risk. It would be much easier for criminals to find
you.
9. Your home phone number This shared information is more risky than sharing
your personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends
to be you.

10. Your Birthday Criminals can use this information to steal your
identity.
Tips to Stay Online:
1. Be mindful of what you share online and what sites you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy page of a website and learn how the website
handles the information you share.
4. Know the security features of the social networking site you use. By
keeping your profile private, search engines will not be able to scan
your profile.
5. Do not share your password with anyone.
Tips to Stay Online:
6. Avoid logging in to public networks/Wifi. Browsing in “incognito (or
private mode)”, a feature of the browser, will not protect you fro
hackers.
7. Do not talk to strangers whether online or face to face.
8. Never post anything about a future vacation. It is similar to posting,
“Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
Tips to Stay Online:
11. Install and update an antivirus software on your computer. Use only
one antivirus software to avoid conflicts.
12. If you have Wifi at home, make it a private network by adding
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is
most likely not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats
Internet Threats
1. Malware – Malicious Software
• The collective name for a number of malicious software variants,
including viruses, ransomware and spyware.
• These consists of code developed by cyber attackers, designed to
cause extensive damage to data and systems or to gain unauthorized
access to a network.
• It is typically delivered in the form of a link or file over email and
requires the user to click on the link or open the file to execute the
malware
Internet Threats
a) Virus – a malicious program designed to replicate itself and transfer
from one computer to another either through the internet and local
networks or data storage like flash drives and CD’s.
b) Worm – a malicious program that transfers from one computer to
another by any type of means. It can replicate itself without any
human interaction, and it does not need to attach itself to a software
program in order to cause damage.
Internet Threats
c) Trojan – a malicious program that is disguised as a useful program
but once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
• Rogue Security Software – a form of internet fraud that misleads users into
believing there is a virus on their computer and aims to convince users to pay for a
fake malware removal tool that actually installs malware on their computer. It
manipulates users to through fear, and a form of ransomware.
Internet Threats
d) Ransomware - infects your computer and displays messages
demanding a fee to be paid in order for your system to work again. It
is a criminal moneymaking scheme that can be installed through
deceptive links in an email message, instant message or website.
e) Spyware – a program that runs in the background without you
knowing and has the ability to monitor what you are doing and
typing through keylogging.
• Keyloggers- used to record the keystroke done by users. This is done to steal their
password or any other sensitive information. It can record email, messages, or any
information you type using your keyboard.
Internet Threats
f) Adware – a program designed to send you advertisements, mostly
as pop ups.
Internet Threats
2. Spam – unwanted email mostly from bots or advertisers. It can be
used to send malware.
3. Phishing – acquiring sensitive personal information like passwords
and credit card details. This is done by sending you an email that
will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.
• Pharming - the fraudulent practice of directing internet users to a bogus website
that mimics the appearance of a legitimate one, in order to obtain personal
information such as passwords, account numbers, etc.
Guide Questions:
For DLA 14
1. How can Netiquette and Rules of Netiquette be beneficial to you and to everyone?
 
 
2. Aside from the rules given above, give your own rules on how one should maintain and promote netiquette on
different social media platforms. Give at least 5.
 
 
3. Why is it important to make ourselves look good online?
Guide Questions:
For DLA 15
1. For you what is online safety and security?

2. Do you think it is really necessary/must to private all your social media accounts? Why?

3. Why does Internet is being referred as information highway?

4. On a separate sheet. create an essay discussing ways and tips to be safe and secure online and explain how
you can you apply them in your daily life, primarily online. The format and criteria for the essay will be posted
in your designated Google Classroom Streams.
Guide Questions:
For DLA 16 Exercise: True/False. Write T if the following statement is TRUE and F if the statement is FALSE. Write your
answer on the spaces provided.

1. Once your PC is infected by a Trojan, there might be a chance that the Trojan may replicate itself
and transfer the infection to another PC’s and data storage.

2. Pharming is an example of online fraud.

3. A malware is a virus.

4. The mass distribution of unsolicited messages, advertising or pornography to addresses which


can be easily found on the Internet through things like social networking sites, company websites,
and personal blogs is an example of Spam.

5. Ransomware is an example of Malware.

You might also like