Professional Documents
Culture Documents
RULES OF
NETIQUETTE
OBJECTIVES :
1.Consider one’s and others’ safety when
sharing information using the internet;
2.Consider one’s and others’ reputation
when using the internet;
3.Know and determined how to avoid the
dangers of the internet;
4. Be responsible in the use of social
networking sites; and
5. Browse the internet efficiently and
properly through proper referencing.
WHAT IS
NETIQUETTE?
An ideal pattern of behavior
for Internet users, guidelines
about what is acceptable in
an online medium for
personal and professional
use.
Protecting
reputations
online
Internet
Copyright
Threats
Contextualized
Online
Security, safety
Rules of online search
Netiquette and research
and ethics
skills
10
BEST RULES
OF
NETIQUETTE
Don’t SPAM
(it is any unsolicited
e-mail from unknown
sources)
2. LAST NAME If sharing your first name is a small risk, having both your first
and last is more risky. Matching a name with a face is a modus
to several cybercrimes' like identity theft.
3. MIDDLE NAME Sharing your middle name is probably not the most risky of
these shared information, but sharing your full name would
be.
4. CURRENT AND Most people who steal identities study their subject.
PREVIOUS SCHOOL/S They can use this information for verification purposes.
5. MOBILE PHONE Internet is a public place. You would not want random strangers
NUMBER to text or call you, or worse, pretend that they are someone else.
TYPE OF INFORMATION RISKS
6. NAMES OF YOUR Risky, yet not as risky as posting their full names, especially
MOTHER & FATHER your mother’s maiden name.
7. NAMES OF YOUR Strangers may pretend or use their identity to dupe you.
SIBLINGS
8. ADDRESS It would be much easier for criminals to find you.
9. HOME PHONE Scams usually use this information to deceive you, one of which
NUMBER is when a stranger pretends to know your parents or pretends
to be you.
10. BIRTHDAY It makes you vulnerable to identity theft.
Tips to
Stay Safe
Online
Internet
Threats
1. Malware
-Stands for malicious software.
- Refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data and
damage or destroy computers and computer systems
Different Kinds of Malware
Keyloggers
Rogue
security
software
A. Virus
A malicious software
program loaded into a user’s
computer without the user’s
knowledge and performs
malicious actions and can be
transferred from one
computer to another
through the Internet and
local networks or data
storage like flash drives.
B. Worm
A stand-alone malicious
programs that can self-
replicate and propagate
via computer networks
without human help.
An example is the
ILOVEYOU worm.
C. Trojan
A malicious program that is
disguised as a useful
program but once
downloaded or installed,
leaves your PC unprotected
and allow hackers to get
your information.
D. Spyware
A program that runs in
the background
without you knowing
it. It has the ability to
monitor what you are
currently doing and
typing through
keylogging.
E. Adware
A program designed
to send you
advertisements,
mostly as pop-ups.
2. Spam
-Unwanted email
mostly from bots or
advertisers. It can
be used to send
malware.
3. Phishing 3.1 Pharming
-Its goal is to acquire -A more complicated
sensitive personal way of phishing where
information like it exploits the DNS
passwords and credit (Domain Name Service)
card details. Done by system.
sending you an email
that will direct the user
to visit a website.
Think Before
You Click
1. Before you post something on the
web, ask these questions to yourself: