You are on page 1of 30

Lesson 2:

RULES OF
NETIQUETTE
OBJECTIVES :
1.Consider one’s and others’ safety when
sharing information using the internet;
2.Consider one’s and others’ reputation
when using the internet;
3.Know and determined how to avoid the
dangers of the internet;
4. Be responsible in the use of social
networking sites; and
5. Browse the internet efficiently and
properly through proper referencing.
WHAT IS
NETIQUETTE?
An ideal pattern of behavior
for Internet users, guidelines
about what is acceptable in
an online medium for
personal and professional
use.
Protecting
reputations
online
Internet
Copyright
Threats

Contextualized
Online
Security, safety
Rules of online search
Netiquette and research
and ethics
skills
10
BEST RULES
OF
NETIQUETTE
Don’t SPAM
(it is any unsolicited
e-mail from unknown
sources)

NO FLAMING Don’t type in ALL


(Flame is a personal CAPS
insult communicated ( people may
through the internet) misinterpret)

The Golden Rule Don’t talk with people


you do not know
( Treat others as
you would like to be ( do not arrange to
treated) meet anyone you meet
online)
Use proper Grammar
and Spelling
(errors diminishes the
credibility of the
message)
Obey Copyright Laws Follow the TOS
(Don’t steal someone (TOS- Term of Service)
else’s idea, property (Rules and policy of
and rights) the sites)

SHOP SECURE SITES BE HONEST / Be


(These are sites with yourself
transport layer security (tell the truth, do not
(TLS or SLS Socket Layer pretend to be someone
Security else)
Online Safety
and Security
WHAT IS INTERNET
SAFETY?
refers to the online
security or safety of
people and their
information when using
the internet
TYPE OF INFORMATION RISKS
1. FIRST NAME There is a risk in sharing your first name, Chances are , a
hacker may already know plenty of stuff about you even if
you only give out your first name.

2. LAST NAME If sharing your first name is a small risk, having both your first
and last is more risky. Matching a name with a face is a modus
to several cybercrimes' like identity theft.

3. MIDDLE NAME Sharing your middle name is probably not the most risky of
these shared information, but sharing your full name would
be.
4. CURRENT AND Most people who steal identities study their subject.
PREVIOUS SCHOOL/S They can use this information for verification purposes.
5. MOBILE PHONE Internet is a public place. You would not want random strangers
NUMBER to text or call you, or worse, pretend that they are someone else.
TYPE OF INFORMATION RISKS
6. NAMES OF YOUR Risky, yet not as risky as posting their full names, especially
MOTHER & FATHER your mother’s maiden name.

7. NAMES OF YOUR Strangers may pretend or use their identity to dupe you.
SIBLINGS
8. ADDRESS It would be much easier for criminals to find you.
9. HOME PHONE Scams usually use this information to deceive you, one of which
NUMBER is when a stranger pretends to know your parents or pretends
to be you.
10. BIRTHDAY It makes you vulnerable to identity theft.
Tips to
Stay Safe
Online
Internet
Threats
1. Malware
-Stands for malicious software.
- Refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data and
damage or destroy computers and computer systems
Different Kinds of Malware

Keyloggers

Virus Worm Trojan Spyware Adware

Rogue
security
software
A. Virus
A malicious software
program loaded into a user’s
computer without the user’s
knowledge and performs
malicious actions and can be
transferred from one
computer to another
through the Internet and
local networks or data
storage like flash drives.
B. Worm
A stand-alone malicious
programs that can self-
replicate and propagate
via computer networks
without human help.
An example is the
ILOVEYOU worm.
C. Trojan
A malicious program that is
disguised as a useful
program but once
downloaded or installed,
leaves your PC unprotected
and allow hackers to get
your information.
D. Spyware
A program that runs in
the background
without you knowing
it. It has the ability to
monitor what you are
currently doing and
typing through
keylogging.
E. Adware
A program designed
to send you
advertisements,
mostly as pop-ups.
2. Spam
-Unwanted email
mostly from bots or
advertisers. It can
be used to send
malware.
3. Phishing 3.1 Pharming
-Its goal is to acquire -A more complicated
sensitive personal way of phishing where
information like it exploits the DNS
passwords and credit (Domain Name Service)
card details. Done by system.
sending you an email
that will direct the user
to visit a website.
Think Before
You Click
1. Before you post something on the
web, ask these questions to yourself:

• Would you want your parents to see


it?
• Would you want your future boss to
see it?
2. Your friends depend on you to protect their
reputation online.

3. Set your post to “private”.

4. Avoid using names.

5. If you feel that a post can affect you or other’s


reputation, ask the one who posted it to take it
down or report it as inappropriate.
Copyright
Infringement
1. UNDERSTAND
2. BE RESPONSIBLE
3. BE CREATIVE
4. KNOW THE LAW
R.A. 10372
THE END!

You might also like