You are on page 1of 54

Albert A.

Bersamin
Objectives
At the end of this lesson, the students should be able to:

1. 1. Consider one’s and others’ safety when sharing information


using the internet;
2. 2. Consider one’s and others’ reputation when using the
internet;
3. 3. Determine and avoid the dangers of the Internet;
4. 4. be responsible in the use of social networking sites; and
5. 5. Browse the Internet efficiently and properly through proper
referencing.
Formative Assessment

1. Name 5 Important details or


Information of your self that you
share online.
2. How often you used your
Smartphones?
Picture Analysis
Picture Analysis
Picture Analysis
Picture Analysis
Picture Analysis
Are you SAFE
and
SECURED
How SAFE
and
SECURED are
Online
Safety,
Security,
Ethics, and
Netiquette
Online Safety & Security

Internet is defined as the information


superhighway. This means that
anyone has access to this highway,
can place info, and can grab that
information.
Online Safety & Security
1. It is powerful tool. It can be used to
promote your business, gain new friends,
& stay in touch with love ones.
2. Also source of entertainment through
games and online communities
Online Safety & Security
 “other side of the coin”
1. - The internet is one of the most
dangerous places, especially if you do
not know what you are doing with it.
INFORMAT
ION AT
RISK
Your Name(First Name,
Middle Name & Last Name)
Current &
Previous School
Cellphone
Informatio Number

n At Risk Email Address


Birthday

Age
Home
Address
Some Tips to Stay Safe Online
Be mindful on what you share online
Do not just accept terms and conditions, read it.
Do not share your password with anyone.
Know the security features of the social
networking site you use.
Do not talk strangers whether online or face to
face.
Some Tips to Stay Safe Online
 Do not reply or click suspicious emails.
 Install and update antivirus software on your
computer or devices.
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.
 Avoid visiting untrustedwebsites.
 If you have WiFi at home,it private by adding a
password
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.
 Avoid visiting untrustedwebsites.
 If you have WiFi at home,it private by adding a
password
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.
 Avoid visiting untrustedwebsites.
 If you have WiFi at home,it private by adding a
password
Some Tips to Stay Safe Online
 Never post anything about your future vacation.
 Add friends you know in real life
 Avoid downloading anything from untrusted
websites.
 Avoid visiting untrustedwebsites.
 If you have WiFi at home,it private by adding a
password
Antiviru
s
Bitdefender
ESET Nod32
F-Secure
Kaspersky
Avast
Internet
Threats
Internet Threats

MALWARE SPAM PHISHING


Malware
stands for Malicious
Software.
 This is software that is specifically
designed to gain access or damage a
computer without the knowledge of the
owner. There are various types of malware
including spyware, keyloggers, true viruses,
worms, or any type of malicious code that
infiltrates a computer.
Spyware

Virus Adware

Trojan
Worm
a malicious
VIR program designed
US to replicate itself
and transfer from
one computer to
another.
VIR
US
a malicious
program that
WOR transfers from
one computer to
M another by any
type of means.
a malicious program that
TROJ
is disguised as a useful
AN
program but once
downloaded or installed,
leaves your PC
unprotected and allows
hacker to get you
information
a program designed
to send you
advertisements,
mostly as pop-ups. ADWA
RE
CERTIFIE
D
SPYWA
RE
a program that
runs in the
background
without you
knowing it.
SPAM
An unwanted email mostly
from bot or advertisement. It
can be used to send
malware.
PHISHING
the attempt to obtain
sensitive information such
as usernames,passwords,
and credit card details, often
for malicious reasons, by
disguising as a trustworthy
entity in an electronic
communication.
CERTIFIE
D
NETIQUETTE
Netiquette is short for "Internet
etiquette." Just like etiquette is a code
of polite behavior in society, netiquette is
a code of good behavior on the Internet.
“THINK
before
You CLICK”
GROUP ACTIVITY
Create a campaign both in social media and
school promoting “Think before you click”
(Advantages & Disadvantages of Internet).
In social media, it could be in a form of
video and in school, it could be in a form of
small poster posted along the hallway or
bulletin boards. This campaign is an
awareness program for the younger
batches of the school.
CRITERIA 10 pts 7 pts 5 pts 2 pts
Texts and visuals 1- 2 texts and 3 or more texts and
Texts and visuals are
are very clear and visuals are vague visuals are vague
CONTENT clear and related to
strongly related to and not related to and not related to
the topic.
the topic. the topic. the topic.
DESIGN 4 or more design None of the design
PRINCIPLES 3-4 design principles 1 -2 design principle
principles and principles and
and elements are and element is
AND elements are elements are
evident. evident.
evident. evident.
ELEMENTS
It is exceptionally It is attractive in
More attention to the It is unattractive due
attractive in terms of color
OVERALL selection of color to poor color
the terms of color scheme, design and
EFFECT scheme, design and scheme, design and
scheme, layout.
layout is needed. layout.
design, and layout  
Members are not
3 members or more Only 2 members are Only 1 person is working on the
WORK
are doing the tasks doing all the tasks for doing all the tasks project. No evidence
ETHICS for the project. the project. for the project. of cooperation in the
group.

You might also like