You are on page 1of 41

1

EMPOWERMENT
TECHNOLOGIES
Mr. Bryl John Lawrence Z. Villamar
Subject Teacher
REVIEW
3

What are the different types


of social media?
4
ONLINE HABITS YES NO

SELF- I always talk to strangers on social


media.

CHECK Giving your password to your friends.

ONLINE Posting about your future vacations.

HABITS Visiting unsecured websites.

Ranting on social media.

Posting images or videos without


asking permission from the owner.
OBJECTIVE
Apply online safety, security, ethics,
and etiquette standards and practice in
the use of ICT as it would relate to their
professional tracks. CS_ICT11/12-
ICTPT-Ia-b-1
TRIGGER QUESTION

What will you do if you found out that


your information on social media
(Facebook) got stolen by other people
and used for something that you are not
used to?
1

2
TIPS ON HOW
3 TO BE SAFE
4 ONLINE
5

8
1 Do not share your password with anyone

2 Add friends you know in real life TIPS ON HOW


3 Do not visit untrusted websites. TO BE SAFE
4 Add password to your WIFI at home to ONLINE
make it private.

5 Install and update antivirus in your


computer
6
Do not give your personal information to
anyone
7
Never post about your future vacation
8
INTERNE Cyberbullying
T RISK
Identity Theft
Cyber Stalking
Sexting
INTERNE Cyberbullying
T RISK It happens when
someone intentionally
abused, harass, and
mistreated by other
person using
electronic
communication
INTERNE Cyberbullying
T RISK
Identity Theft
Cyber Stalking
Sexting
INTERNE Identity Theft
It is a crime of
T RISK stealing personal
information for the
purpose of assuming
that person’s name or
identity to make any
form of transactions.
INTERNE Cyberbullying
T RISK
Identity Theft
Cyber Stalking
Sexting
INTERNE Cyber Stalking
T RISK A criminal practice
where electronic
communication is
used to stalk or
harass individual or
group.
INTERNE Cyberbullying
T RISK
Identity Theft
Cyber Stalking
Sexting
INTERNE Sexting
T RISK The act of sending
sexually explicit
text messages,
images, and
videos.
INTERNET 1 Malware
THREATS 2 Spam
3 Phishing
4 Pharming
5 Cybercrime
6
Internet Scam
INTERNET Malware
THREATS  Also known as Malicious
Software.
 Software that is
specifically designed to
disrupt, damage, or gain
unauthorized access to
computer system.
INTERNET Types of Malware
THREATS  Virus
 Keylogger

 Botnet
 Trojan Horse
 Rootkit
 Worm
 Ransomware
 Spyware

 Adware
INTERNET Types of Malware
THREATS VIRUS
A malicious program
that replicate itself by
copying itself to
another program
TROJ
INTERNET Types of Malware
THREATS TROJAN HORSE
A malicious program
that disguised as
legitimate program that
user will accept and use
but take control of your
computer
WORM
INTERNET Types of Malware
THREATS WORM
Malicious program
that copy’s itself and
spreads to other
computers.
SPYW
INTERNET Types of Malware
THREATS SPYWARE
A malicious program
that gathers
information from
victim’s computer and
send it back to the
backer. ADWA
INTERNET Types of Malware
THREATS ADWARE
An unwanted
advertisement that will
pop-up several times on
victim’s computer then
behave abnormally and
tedious to close them.
KEYLO
INTERNET Types of Malware
THREATS KEYLOGGER
A program that runs in the
background and steals user
credentials and confidential
information and send back
to hack by recording every
keystroke that a user makes
on their computer or device.
BOTNE
INTERNET Types of Malware
THREATS BOTNET
- A collection of infected
internet – connected devices
such as PC and mobile
phone that are controlled by
a common type of malware.
- Robot Network
ROOT
INTERNET Types of Malware
THREATS ROOTKIT
A software tools used
by hackers to gain
control over a
computer on a network
without being exposed.
RANSO
INTERNET Types of Malware
THREATS RANSOMWARE
A ransom virus that block
the user from accessing the
programs or files and
demands to pay the ransom
through online method for
the removal of the virus.
INTERNET
THREATS SPAM
Also known as junk
email or unwanted
send by advertiser or
bot. It can be used to
send malware.
INTERNET PHISHING
THREATS
A cyberattack method
using deceptive
emails and websites
to acquiring sensitive
personal information.
INTERNET PHARMING
THREATS
A portmanteau of the words
"phishing" and "farming", is an online
scam like phishing, where a
website's traffic is manipulated, and
confidential information is stolen. In
essence, it is the criminal act of
producing a fake website and then
redirecting users to it.
INTERNET CYBERCRIME
THREATS
A crime in which computer
is used as object and tool in
committing a crime such
hacking, phishing,
spamming, child
pornography, libel, hate
crimes, identify thief and
INTERNET INTERNET SCAM
THREATS A type of scam that misleads the
user in many ways attempting to
take lead of them. The purpose
of this scam is to cheat to the
target of their personal property
directly rather than private
information through fabricated
promises, confidence tricks, and
many more.
NETIQUETTE
It is an etiquette applied
online that shows proper
manner and behavior. If
you are a member of an
online society through
social media, you are
called netizen.
THE CORE RULES OF NETIQUETTE
Remember the human
Adhere to the same standards of behavior online that you
follow in real life.
Know where you are in cyberspace.
Respect other people’s time and bandwidth.
Make yourself look good online.
Share expert knowledge.
Help keep flame wars under control.
Respect other people’s privacy.
Don’t abuse your power.
Be forgiving of other people’s mistakes.
ACTIVITY
Make a poster
with a theme
“THINK
BEFORE YOU
CLICK”.
RUBRIC
CRITERIA 4 3 2 1
Students uses their Students uses most of Students use some of Student does not use
time to work their time to work their time to work their time to work
USE OF TIME productively and productively and productively and productively and
efficiently. efficiently efficiently efficiently. Student is
frequently off task.

Pictures and graphics Most pictures and Few of the pictures The student’s pictures
PICTURES/GRAPHICS are clear and relevant graphics are clear and and graphics are clear are not clear and
relevant and relevant relevant
All of the required Most of the required Few of the required Missing most or all of
elements are clearly elements are clearly elements are clearly the required
REQUIRED ELEMENTS visible, organize, and visible, organize, and visible, organize, and elements.
well placed. well placed. well placed. May be
missing elements.

The poster is The poster is The poster is The poster is


exceptionally attractive in terms of acceptably attractive distractingly messy or
ATTRACTIVENESS attractive in terms of design, layout and though it may be a bit very poorly designed.
design, layout, and neatness messy It is not attractive.
neatness
As a 21 century learner,
st

how do you keep yourself


safe and secure online?
Why is it important
to observe netiquette
online?
Thank you. 

You might also like