You are on page 1of 39

ONLINE SAFETY,

SECURITY AND
RULES OF
NETIQUETTE
LESSON 2
ONLINE SAFETY, SECURITY AND
RULES OF NETIQUETTE
LESSON 2
ONLINE SAFETY, SECURITY
AND RULES OF NETIQUETTE
INTERNET SAFETY

it refers to the online


security or safety of
people and their
information when
using internet.
NETIQUETTE

is network etiquette,
the do’s and don’ts of
online
communication.
TEN RULES OF NETIQUETTE

Rule No. 1:
Remember the human
TEN RULES OF NETIQUETTE

Rule No. 2: Adhere to


the same standards
online that you follow
in real life
TEN RULES OF NETIQUETTE

Rule no. 3: Know


where you are in
cyberspace.
TEN RULES OF NETIQUETTE

Rule no. 4: Respect


other people’s time
and bandwidth.
TEN RULES OF NETIQUETTE

Rule no. 5: Make


yourself look good
online.
TEN RULES OF NETIQUETTE

Rule no. 6: Share


expert knowledge
TEN RULES OF NETIQUETTE

Rule no. 7: Help keep


flame wars under
control
TEN RULES OF NETIQUETTE

Rule no. 8: Respect


other people’s
privacy.
TEN RULES OF NETIQUETTE

Rule no. 9: Don’t


abuse your power.
TEN RULES OF NETIQUETTE

Rule no. 10: Be


forgiving of other
people’s mistake.
Internet security

Security
Requirement
Triad
Types of System Intruders

Masquerader-
pretend to be
someone one is not
Types of System Intruders

Hackers - is a person
who breaks into a
computer system.
Types of System Intruders

Clandestine user -
The category of
individuals those
have supervision/
administrative
control over the
system and misuse
the authoritative
power given to them.
Parts of Virus

• Infection
mechanism

• Trigger

• PayloaD
Virus stages
Key Terms

Cyber crime- a crime


committed or
assisted through the
use of the Internet.
Key Terms

Privacy Policy/Terms
of Services (ToS) –
tells the user how the
website will handle
its data.
Key Terms

Malware- stands for


malicious software.
Key Terms

Virus- a malicious
program designed to
transfer from one
computer to another
in any means
possible.
Key Terms

Worms– a malicious
program designed to
replicate itself and
transfer from one file
folder to another and
also transfer to other
computers.
Key Terms

Trojan-a malicious
program designed
that is disguised as a
useful program but
once downloaded or
installed, leaves your
PC unprotected and
allows hacker to get
your information.
Key Terms

Spyware– a program
that runs in the
background without
you knowing it. It has
the ability to monitor
what you are
currently doing and
typing through key
logging.
Key Terms

Adware- a program
designed to send you
advertisement,
mostly pop-ups.
Key Terms

Spam– unwanted
email mostly from
bots or advertisers.
Key Terms

Phishing- acquires
sensitive personal
information like
passwords and
credits card details.
Key Terms

Pharming- a more
complicated way of
phishing where it
exploits the DNS
system.
Key Terms

Copyright- a part of
law, wherein you
have the rights to
work, anyone who
uses it w/o your
consent is punishable
by law.
Key Terms

Fair Use- means that


an intellectual
property may be used
w/o consent as long
as it is used in
commentaries,
criticism, parodies,
research and etc.
Key Terms

Keyloggers- used to
record the keystrokes
done by user. This is
done to steal
passwords or any
other sensitive
information.
Key Terms

Rogue security
softwares– is a form of
malicious software and
internet fraud that
misleads users into
believing there is a virus
on their computer, and
manipulates them into
paying money for a fake
malware removal tool.
Four search strategies

• Keyword searching
• Boolean
• Question
• Advanced
Quiz 2

Directions: Identify the following question.


Write your answer on ¼ sheet of paper.
1. It is a type of intruders that pretend to be
someone one is not
2. It is a person who breaks into a computer
system
Quiz 2

3. It is malicious program designed to


transfer from one computer to another in
any means possible.
4. a part of law, wherein you have the rights
to work, anyone who uses it w/o your
consent is punishable by law.
5. It is a crime committed or assisted
through the use of the Internet.

You might also like