You are on page 1of 28

What is INTERNET?

“ The information superhighway”


This means that anyone has access to this highway, can place information, and can
grab that information.

The INTERNET, sometimes called simply “the Net,” is a worldwide system of


computer networks- a network of networks in which users at any one computer can,
if they have permission, get information from any other computer can,  if they have
permission, get information from any other computer (and sometimes talk directly to
users at other computers
ONLINE SAFETY AND SECURITY

The knowledge of maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self- protection
from computer crime in general. 
HOW SAFE ARE YOU?

1. First Name
2. Last Name
3. Middle Name
4. Current and Previous Schools
5. Cellphone Number
6. The name of your father and mother
7. The name of your siblings
8. Your address
9. our home phone number
10. Your birthday 
TIPS TO STAY SAFE ONLINE

 1. Be mindful of what you share online and what site you share it to.
 2. Do not just accept terms and conditions; read it
 3. Check out the privacy policy page of a website to learn how the website
handles the information you share.
 4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
 5. Do not share your password with anyone.
 6. Avoid logging in to public networks/Wi-Fi. Browsing in “Incognito mode”, a
feature of the browser will not protect you from the hackers.
 7. Do not talk to stranger’s weather online or face to face.
TIPS TO STAY SAFE ONLINE

 8. Never post anything about future vacation. It is similar to posting, “Rob my house at
this date”.
 9. Add friends you know in real life.
 10. Avoid visiting untrusted website.
 11. Install and update an anti-virus software on your computer. Use only one anti-virus to
avoid conflicts.
 12. If you have Wi-Fi at home, make it private network by adding password.
 13. Avoid downloading anything from untrusted websites. You are most vulnerable in
peer to peer downloads. As the download is most likely not monitored by the site owner.
 14. Buy software; do not use pirated ones
 15. Do not reply or click links suspicious emails.
INTERNET THREATS A WEB THREAT

is any threat that uses the World Wide Web to facilitate cybercrime. Web threats use
multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols,
but may also employ other protocols and components, such as links in email or IM,
or malware attachments or on servers that access the Web
ROGUE SECURITY SOFTWARE

 is a form of malicious software and Internet fraud that misleads users into
believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool (that actually introduces malware to the
computer).
PHISHING PHISHING

is the practice of defrauding users into giving up their usernames, passwords, credit
card numbers and other personal information. Phishing emails will often try to get
you to click on links that take you to fake websites; they often pretend to be from
organizations such as a bank, PayPal, Amazon or even Stanford.
SPAM

 SPAM is unsolicited junk email sent indiscriminately in bulk, often for


commercial purposes. Much of it is sent by botnets, networks of virus- infected
computers, complicating the process of tracking down the spammers. According
to various estimates, about 80% of all email in the world may be spam. 
PHISHING

PHISHING is the practice of defrauding users into giving up their usernames,


passwords, credit card numbers and other personal information. Phishing emails will
often try to get you to click on links that take you to fake websites; they often pretend
to be from organizations such as a bank, PayPal, Amazon or even Stanford.
PHARMING

PHARMING is a scamming practice in which malicious code is installed on a


personal computer or server, misdirecting users to fraudulent Web sites without their
knowledge or consent. Pharming has been called "phishing without a lure." 
INTERNET SCAM

INTERNET SCAMS are schemes that deceive the user in various ways in attempt to
take advantage of them. Internet scams often aim to cheat the victim of personal
property directly rather than personal information through false promises, confidence
tricks and more
COPYRIGHT INFRINGEMENT

The use of works protected by copyright law without permission, infringing certain
exclusive rights granted to the copyright holder, such as the right to reproduce,
distribute, display or perform the protected work, or to make derivative works. 
examples of copyright infringement
include
1. Downloading movies and music without proper payment for use
2. Recording movies in a theater
3. Using others’ photographs for a blog without permission
4. Copying software code without giving proper credit
5. Creating videos with unlicensed music clips
6. Copying books, blogs or podcasts without permission
7. Anything where you are copying someone else’s original work without an
agreement
CYBERBULLYING

CYBERBULLYING is often an extension of bullying outside the internet, and may


take form in many different ways. For example, the malicious user might release
images of the user without his or her consent. Because cyberbullying often stems
from real-life bullying, this is largely a social concern, rather than internet safety.
Cyberbullying occurs more frequently than real- life bullying as the internet often
provides means to carry out bullying while allowing the perpetrator to remain
anonymous and hidden, avoiding backlash in the process
ONLINE PREDATION

is the act of engaging an underage minor into inappropriate sexual relationships


through the internet. Online predators may attempt to initiate and seduce minors into
relationships through the use of chat rooms or internet forums. It is debated whether
online predators is actually a threat to internet safety, as many cases take a long time
to develop the relationship. As such, targets of online predators may see the
relationship as a legitimate attempt at romance. 
OBSCENE/OFFENSIVE CONTENT

Various websites on the internet contain material that some deem offensive,
distasteful or explicit, which may often be not of the user's liking. Such websites may
include internet, shock sites, hate speech or otherwise inflammatory content. Such
content may manifest in many ways, such as pop-up ads and unsuspecting links.
THINK BEFORE YOU CLICK

1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it? Once your post something on the web, you have no control of who
sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility
3. Set your post to “Private”. In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull down or report it as inappropriate.
WHAT IS NETIQUETTE? 

The word NETIQUETTE is a combination of ’net’ (from internet) and ’etiquette’. It


means respecting other users’ views and displaying common courtesy when posting
your views to online discussion groups.
DEFINITION

the practice of netiquette depends on understanding how email, the Usenet, chatting,
or other aspects of the Internet actually work or are practiced
Type of Netiquette

Type of Netiquette

Netiquette Netiquette of Sending Netiquette of Netiquette of


Basic Replying Confidentially
Netiquette Basic
Netiquette of Sending
Netiquette of Replying
Netiquette of Confidentially
Importance of Netiquette
ACTIVITY

1. WHAT IS INTERNET ETIQUETTE?


2. WHAT ARE THE RULES OF BEHAVIOR ON
THE INTERNET?

You might also like