You are on page 1of 16

Online Safety,

Security, Ethics
and Etiquette
Online Safety and Security
• used to promote your business
• gain new friends and stay in touch
with the old ones
• source of entertainment through
games, online communities, and
everything in between
Online Safety and Security
Online Safety and Security
Online Safety and Security

Tips to Stay Safe Online:


1. Be mindful of what you share online and what site you share
it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you
use. By keeping your profile private, search engines will not
be able to scan your profile.
4. Do not share your password with anyone.
Online Safety and Security

5. Avoid logging in to public networks/Wi-Fi. Browsing in


“incognito (or private) mode will NOT protect you from
hackers.
6. Do not talk to strangers whether online or face-to-face
7. Never post anything about a future vacation. It is
similar to posting, “Rob my house at this date.”
8. Add friends you know in real life.
Online Safety and Security

9. Avoid visiting untrusted websites.


10. Install and update an antivirus software on your
computer. Use only one anti-virus software to avoid
conflicts.
11. If you have Wi-Fi at home, make it private network by
adding a password.
12. Avoid downloading anything from untrusted websites.
Online Safety and Security

13. But the software, do not use pirated ones.


14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites

Some hackers can find a backdoor even if your profile is already


set to private. You have no control whoever is looking at your
friend's screen whenever they open your profile or chat with
you.
Internet Threats

• Malware – or malicious software, is any program or file that is


harmful to a computer user. Types
• Spam - an unwanted email mostly from bots or advertisers. It can be
used to send malware.
• Phishing - its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by sending you an e-
mail that will direct the user to visit a fake website and be asked to
update his/her username, password, credit card or personal
information.
Protecting Reputations Online

Here are the things you might want to consider before posting
something over the internet:
1. Before your post something on the web, ask these questions
to yourself: Would you want your parents or grandparents to
see it? Would you want your future boss to see it?
2. 2. If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.
Copyright Infringement

Copyright infringement - It is the use of works protected by


copyright law without permission for a usage where such
permission is required.
Republic Act No. 8293 -  “Intellectual Property Code of the
Philippines.” an act prescribing the intellectual property code
and establishing the intellectual property office, providing
for its powers and functions, and for other purposes
Copyright Infringement

Tips to avoid copyright infringement:


1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or
information.
Internet Threats

Malware Types:
• Virus - a malicious program designed to replicate itself and
transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
• Worm - a malicious program that transfers from one
computer to another by any type of means. Ex. ILOVEYOU
Worm - The malware originated in the Pandacan, Manila in
the Philippines on May 5, 2000.
Internet Threats

Malware Types:
• Trojan - a malicious program that disguises as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
• Ransomware - or ransom software is a type of malicious
software from cryptovirology that threatens to publish the
victim's data or perpetually block access to it unless a
ransom is paid.
Internet Threats

Malware Types:
• Adware - a program designed to send you advertisements, mostly
as pop-ups.
• Spyware - a program that runs in the background without you
knowing it (thus called “spy”). It has the ability to monitor what you
are currently doing and typing through keylogging. Ex. Keylogger –
used to record keystrokes done by the user. This is done to steal
their password or any other sensitive information. The key logger
software typically uses log file to store its recording.

You might also like