You are on page 1of 29

Online Safety,

Security, Ethics, and


Etiquette
Joseph Dale A. Llanes, LPT Date: 09/22/2020
MIT, CED-IDS
josephdale.llanes@g.msuiit.edu.ph
Objectives
After going through this module, you are expected to:

1. Name the various online threats;


2. Identify the online safety measures; and
3. Consider one’s and others’ reputation when using the Internet.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 1
What is Online Safety?
• Is the knowledge of maximizing the
user’s personal safety and security risks
to private information and property
associated with using the internet, and
the self-protection from computer crime
in general.
• Online/internet safety is a growing
concern for both children and adults.
• Several crimes are committed because of
the internet

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 2
Common concerns regarding safety on the
internet include:
• Malicious users
• Websites and softwares
• Inflammatory content
• Online predation, etc.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 3
Personal safety
▪ The growth of the internet gave rise to
many important services accessible to
anyone with a connection.
▪ While malicious users often use the
internet for personal gain, this may not be
limited to financial/material gain.
▪ This is especially a concern to parents and
children, as children are often targets of
these malicious users. 

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 4
Common Threats to Personal Safety:
❑ Cyberstalking - to stalk or harass an individual, a
group of individuals, or an organization.
❑ Cyberbullying - An extension of bullying outside
the internet, and may take form in many different
ways. (i.e: releasing an image of the user without
his or her consent).
❑ Online Predation - is the act of engaging an
underage minor into inappropriate sexual
relationships through the internet.
❑ Obscene Content - various websites on the
internet contain material that some deem
offensive, distasteful or explicit, which may often
be not of the user's liking.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 5
Tips to Stay Safe Online
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my
house at this date.”

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 6
Tips to Stay Safe Online
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one anti-
virus software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 7
What is Online Security?
is a branch of computer security
specifically related to the Internet, often
involving browser security but
also network security on a more general
level as it applies to other applications
on a whole. Its objective is to establish
rules and measures to use against
attacks over the Internet.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 8
What is Information Security?
• Sensitive information such as personal information and identity,
passwords are often associated with personal property (for example,
bank accounts) and privacy and may present security concerns if
leaked.
• Unauthorized access and usage of private information may result in
consequence such as identity theft, as well as theft of property.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 9
Online Survey
1. Have you answered the online survey posted last night?
2. Did you asked the person for the intent of the survey?
3. Did you provide the correct information required?
4. Did you check the link of the survey form?
5. What did you do after you answered the survey?

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 10
Have you shared these info.?
• First Name
• Last Name
• Middle Name
• Address
• Mothers Name
• Fathers Name
• Name of your Siblings
• cellphone number
• Birthday
• Home Phone number

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 11
Information and the risks

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 12
Internet Threats
Here are some of the threats you should be aware of when using the Internet:

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 13
Malware

or malicious software, is any


program or file that is harmful to a
computer user.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 14
Types of Malware
•  Virus - a malicious program designed to replicate itself and transfer from
one computer to another (internet, local networks, FDs, CDs, etc.)
•  Worm - a malicious program that transfers from one computer to another
by any type of means.
• Ex. ILOVEYOU Worm - The malware originated in the Pandacan
neighborhood of Manila in the Philippines on May 5, 2000.
• Trojan - a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to
get your information.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 15
Malware
• Spyware - a program that runs in the background without you knowing it
(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.
• Ex. Keylogger – used to record keystrokes done by the user. This is done
to steal their password or any other sensitive information. The key logger
software typically uses log file to store its recording.
• Adware - a program designed to send you advertisements, mostly as pop-
ups.
• Ransomware - or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually
block access to it unless a ransom is paid.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 16
Spam

An unwanted email mostly from


bots or advertisers. It can be used to
send malware.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 17
Phishing

Its goal is to acquire sensitive personal


information like passwords and credit
card details. This is done by sending you
an e-mail that will direct the user to visit a
fake website and be asked to update
his/her username, password, credit card
or personal information.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 18
Republic Act No. 10175
• RA 10175 (Cybercrime Prevention Act of 2012)
• AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES
THEREFOR AND FOR OTHER PURPOSES

Know more: https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 19
Section 4. Cybercrime Offenses
• A. Offenses against the confidentiality, integrity and
availability of computer data and systems:
❑Illegal access
❑Data Interference
❑System Interference
❑Cyber squatting

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 20
Section 4. Cybercrime Offenses
• B. Computer-related offenses:
❑Computer related forgery
❑Computer related fraud
❑Computer related identity theft

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 21
Section 4. Cybercrime Offenses
• C. Content-related offenses:
❑Cybersex
❑Child pornography
❑libel

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 22
Protecting Reputations Online
• Here are the things you might want to consider before posting
something over the internet:

• Before your post something on the web, ask these questions to yourself:
Would you want your parents or grandparents to see it? Would you want
your future boss to see it?

• If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 23
Copyright Infringement
• It is the use of works protected by copyright law without permission
for a usage where such permission is required.
• Here are some tips that could help you avoid copyright
infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 24
What I Can Do?
❑ Share an experience that you have always tend to do but later did
you discover that it is not a standard of ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE.
❑ How does a virus infect a computer?
❑ How do computer worms spread?
❑ How do fraudsters use social media to steal information?
❑ What do fraudsters who practice phishing usually steal?
❑ When does copyright infringement occur?

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 25
Recommended Film

Photo credits: https://www.google.com/url?sa=i&url=http%3A%2F


%2Fmarkcrawfordmusic.com%2Fabout&psig=AOvVaw3Yx

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 26
Thank You!
#StayIndoor #StaySafe #StayHealthy

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 27
Resources
• Empowerment Technologies First Edition.(2016).Sampaloc Manila:Rex Bookstore, Inc.
• Learning Resource Management System (LRMS).. Regional Center, Brgy. Carpenter Hill, City of
Koronadal: DepEd – SOCCSKSARGEN.
• Empowerment of Technologies. Alternative Delivery Mode. EmTech Group for Teachers
Philippines.

Presentation Title: Online Safety, Security, Ethics, and Etiquette JDL, 09/22/2020 | 28

You might also like