The document provides information on internet safety, security, and ethics. It discusses internet threats like malware, spam, and phishing. It emphasizes the importance of protecting one's reputation online through careful posting and sharing of information. Students should learn to consider safety, avoid dangers, use social media responsibly, and properly reference online sources.
2. Online security, safety, and ethics
Internet threats
Protecting reputations online
Copyright
Contextualized online and research skills
Rules of Netiquette
3. At the end of this lesson, the students should be able to:
1. consider ones and others safety when sharing
information using the Internet;
2. consider ones and others reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites;
and
5. browse the Internet efficiently and properly through
proper referencing.
4. The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and stay
in touch with the old ones. It is also a source of
entertainment.
But like most things in this world, there is always
another side of the coin.
Internet is one of the most dangerous place,
especially if you do not know what you are
doing.
5. It refers to the online security or
safety of people and their
information when using the internet.
19. a malicious program designed to replicate itself
and transfer from one computer to another either
through the Internet and the local networks or
data storage like flash drives and CDs.
21. - a malicious program that transfers from
one computer by any type of means. Often,
it uses a computer network to spread itself.
Example: The I Love You (Love Bug Worm)
22. - a malicious program that is disguised as a
useful program but once downloaded or
installed, leaves your PC unprotected and
allows hackers to get your information.
- ROGUE SECURITY SOFTWARE tricks the user into posing
that it is a security software. It ask the user to pay to improve
his/her security but in reality, they are not protected at all.
23. - The program that runs in a background without you
knowing it (thus called spy). It has the ability to monitor
what you are currently doing and typing through
keylogging.
KEYLOGGERS used to record the keystroke done by the users.
This is done to steal their password or any other sensitive
information.
ADWARE program designed to send you advertisements, mostly
as pop-ups.
24. - unwanted email mostly from bots or
advertisers. It can be used to send
malware.
(E-Mail Spam or Unsolicited Bulk E-Mail (UBE))
2. SPAM
Email spambots harvest email addresses from
material found on the Internet in order to build
mailing lists for sending unsolicited email, also
known as spam.
25. - Its goal is to acquire sensitive personal information
like passwords and credit card details.
PHARMING - a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
system.
3. PHISHING
26. In the past, doing something embarrassing was not
much a big deal. People would laugh at it, they move
on.
Nowadays, capturing embarrassing moments is
possible in any devices. This could impact not only
your reputation but also the people around you.
Worst, people ignore this and suffer later in their life
28. Before you post something on
the web, ask these questions to
yourself:
- Would you want your parents or
grandparents to see it?
- Would you want your future boss to
see it?
Once you post something on the
web, you have no control of
who sees your posts.
29. Your friends depend on you to protect their
reputation online. Talk to your friends about
this serious responsibility.
Set your post to private. In this way, search
engines will not be able to scan that post.
30. Avoid using names. Names are easy for
search engines to scan.
If you feel that a post can affect you or
others reputation, ask the one who posted
it to pull it down or report it as
inappropriate.
31. Campaigns for Think Before You
Click
(808) Think Before You Click 1.0 - YouTube
(808) Think Before You Click! (Why are you online?) - YouTube
(808) Think before you click: Recognize a phish - YouTube
(808) Think Before You Click (Safety First) - YouTube
32. If you create somethingan idea, an invention, a
form of literary work, or a research, you have the
right of how it should be used by others. This is
called intellectual property.
33. - Have you tried Google search using your own
personal name?
- What is the result?
- Is your identity shown in public?
- Is the search reliable?
- Is the search affronted your privacy?
More than just googling, a skill is needed to
improve or get factual information.
34. content is grammatically
correct, verifiable and cited
when necessary
defines who created the
content, the individual or
groups credential/expertise
- this is used to further evaluate
the website
- Information is current and
updated frequently
35. - Programs that look for documents based from
specific keywords and return these documents
where the keyword where found
38. - Provide a simple way to broadly search for
scholarly literature.
39. - use a picture as you search to find related
images from around the web.
42. My computer has an
antivirus so its okay to open
email attachments like
e-cards and video files from
unknown e-mail addresses.
43. A virus is a malware that
multiplies and infects other
computers through flash
drives.
44. A worm is stand-alone and
can replicate independently
as soon as they breached
the system.