You are on page 1of 42

I CAN

•I can apply online safety, security,


ethics, and etiquette standards.
•I can practice these standard in my
daily life.
Guess the word from letters:
(P,R,I,C,Y,A,G,F,V)

P_R_I V
_ A_C_Y_ _
Guess the word from letters:
(A,C,G,H,D,E,Y,K,R)

______
HACKER
Guess the word from letters: (W,V,I,S,R,U,T)

_V _I R_U _S _
Guess the word from letters:
(E,R,I,N,C,S,I,T,U,Y)

_ _ _ _ _ _
S E CU RI T Y _
_
Lesson 2

Online Safety,
Security, Ethics,
and Etiquette
Are you Safe and
Secured online?
How Safe and Secured
are you online?
Internet Safety or Online Safety or Cyber Safety or E-Safety

-is trying to be safe on the internet and is the


knowledge of maximizing the user's personal
safety and security risks to private
information and property associated with
using the internet, and the self-protection
from computer crime.
Information Security

• Sensitive information such as personal


information and identity, passwords are often
associated with personal property (for example,
bank accounts) and privacy and may present
security concerns if leaked. Unauthorized access
and usage of private information may result in
consequence such as identity theft, as well as
theft of property.
Common causes of information security
breaches include:
1. Phishing - is a type of scam where the
scammers disguise as a trustworthy source in
attempt to obtain private information such as
passwords, and credit card information, etc.
through the internet. These fake websites are
often designed to look identical to their legitimate
counterparts to avoid suspicion from the user.
2. Internet Scams

- are schemes that deceive the user in


various ways in attempt to take advantage of
them. Internet scams often aim to cheat the
victim of personal property directly rather
than personal information through false
promises, confidence tricks and more.
3. Malware
- particularly spyware, is malicious software disguised
as software designed to collect and transmit private
information, such as password, without the user's
consent or knowledge. They are often distributed
through e-mail, software and files from unofficial
locations. Malware is one of the most prevalent
security concerns as often it is impossible to determine
whether a file is infected, despite the source of the file.
• VIRUS - A computer virus attaches itself to your
files and slowly but surely spreads to other files.
Eventually, all of your system’s files may be
deleted or corrupt.
• WORM - A worm can infect an entire network of
devices through network interfaces.
• TROJAN HORSE - True to its name, a Trojan horse
is malicious software that disguises itself as an
average file or program in order to trick users
into downloading it.
Personal Safety
• The growth of the internet gave rise to many important
services accessible to anyone with a connection. One of
these important services is digital communication. While this
service allowed communication with others through the
internet, this also allowed the communication with malicious
users. While malicious users often use the internet for
personal gain, this may not be limited to financial/material
gain. This is especially a concern to parents and children, as
children are often targets of these malicious users. Common
threats to personal safety include: phishing, internet scams,
malware, cyberstalking, cyberbullying, online predations and
sextortion.
1. Cyberstalking
• is the use of the Internet or other electronic
means to stalk or harass an individual, group, or
organization. It may include false
accusations, defamation, slander and libel. It
may also include monitoring, identity theft,
threats, vandalism, solicitation for sex,
or gathering information that may be used to
threaten, embarrass or harass.
2. Cyberbullying
• is the use of electronic means such as instant
messaging, social media, e-mail and other forms of
online communication with the intent to abuse,
intimidate, or overpower an individual or group. In a
2012 study of over 11,925 students in the United
States, it was indicated that 23% of adolescents
reported being a victim of cyber bullying, 30% of
which reported experiencing suicidal behavior.
3. Online Predation
• is the act of engaging an underage minor into inappropriate
sexual relationships through the internet. Online predators
may attempt to initiate and seduce minors into relationships
through the use of chat rooms or internet forums. In a
sample of 216 incarcerated sexual offenders, the behavior
characteristics that emerged were categorized into three
groups:
A) manipulative - typically a child molester;
B) Opportunist - typically a rapist and
C) Coercive being a mixture of both rapists and child molesters
4. Obscene/offensive content
• Various websites on the internet contain
material that some deem offensive, distasteful
or explicit, which may often be not of the user's
liking. Such websites may include internet, shock
sites, hate speech or otherwise inflammatory
content. Such content may manifest in many
ways, such as pop-up ads and unsuspecting links.
5. Sextortion
•especially via the use of webcams,
is a concern, especially for those
who use webcams for flirting and
cybersex.
TRIVIA/GLOSSARY OF TERMS
1. Aggregator - is a website or Web application where headlines and other
content are collected for easy viewing. Aggregators such as Google
News compile news articles and posts.
2. An avatar - is a two- or three-dimensional icon that represents a
computer user or a gamer. Avatar can be a cartoonish graphic, a
photograph, a screen name, or a fully developed character.

3. Blog, from the term “weblog”,- is a type of website usually updated by


an individual or a group of bloggers. Some blogs provide news or
opinions on a specific subject, while others are more like online
journals. Most blogs allow readers to leave comments on blog posts
4. Flaming - is the act of saying mean things online, usually in ALL
CAPS,
and often in a public forum with the intention to humiliate. Flame
wars
can occur easily online, as it can be difficult to figure out people’s
intentions or emotions online.

5. Mash-up - is a remix or blend of multiple songs, videos, or other


media content into one product. Fan fiction writing is one form of a
mash-up, as writers take characters from a well-known video game,
movie, or book, and rewrite their actions or relationships.
7. P2P, or Peer-to-Peer -network allows for sharing of mp3s, videos,
and other digital files by transferring information directly between two
computers rather than by going through a central server. P2P
technology is also behind the popular Internet phone service Skype

8. Podcast - is a downloadable video or audio file. Podcasts can be


verbal, based on a certain topic, or can include music, video, and
commentary. Most podcasts are updated regularly through the addition
of new episodes

9. Short Message Service (SMS), or text message, - is a short message


of fewer than 160 characters sent from a cell phone. A Multimedia
Messaging Service (MMS) is a text message that contains an attached
multimedia file, such as a picture or song.

You might also like