Sunteți pe pagina 1din 6

Empowerment Technologies:

Paste Post-Test Here! Information and Communication Technology


Lesson 2:

Name:
Prepared by Imie B. Omamalin, LPT
Western Mindanao State University
Grade Level & Sec.:
Mabuhay External Studies Unit
Senior High School Department
Key Terms
 Cybercrime – a crime committed or assisted through the use of the Internet
 Privacy policy – tells the user how the website will handle its data
 Malwares – stands for malicious software
 Virus – a malicious program designed to replicate itself and transfer from one
computer to another
 Worm – a malicious program that transfers from one computer to another by any
type of means
 Trojan – a malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information
 Spyware – a program that runs in the background without you knowing it. It has the
ability to monitor what you are currently doing and typing through keylogging.
 Adware – a program designed to send you advertisements, mostly pop-ups
 Spam – unwanted email mostly from bots or advertisers
 Phishing – acquires sensitive personal information like passwords and credit cards
details
 Pharming – a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system
 Copyright – a part of the law, wherein you have the rights to your work, and anyone
who uses it without your consent is punishable by law
 Fair use – means that an intellectual property may be used without a consent as long
as it is used in commentaries, criticisms, search engines, parodies, newa reports,
research, library archiving, teaching, and education

Lesson Summary
Most teenagers spend their time online. It is vital to consider what
information you share because Internet us a public place. There are several
ways to stay safe online and it is essential that we know and apply them.
Several Internet threats include malwares, spams, and phishing.
Malwares could be in the form of a virus, worm, Trojan, spyware, or adware.
We are responsible of what we post online. It is also our responsibility to
protect other’s reputation. We should be mindful of what we post when others
are involved.
Copyright laws protect the authors or producers of literary works,
photographs, paintings, drawings, films, music, choreography, and sculptures
from having their work used without their permission. It is important to
understand the laws to avoid being sanctioned.
When researching online, remember to narrow down your topic. Use
advanced search features. Look for a credible source and cite your references.

9
5. Give credit. If you are going to use the information from a source for
educational purposes, give credit to the original author of the page or
Lesson 2 Rules of Netiquette
information. To properly cite a reference, you may use the format below:
 Online security, safety and ethics
Name of the person or organization (the author of the
 Internet Threats
information). Title of the home page in italics (title is shown in
 Protecting reputations online
title bar nut is sometimes missing or unrelated). URL. Date last
 Copyright
seen.
 Contextualized online search and research skills
Examples:

Lapiz, Adrian Harold L. “Oleander’s Fun Facts about Bananas.” Lesson Objectives
http://oleander.penz.com/random/bananalove.htm. Viewed on
September 7, 2015. At the end of this lesson, the students should be able to:

1. Consider one’s and others’ safety when sharing information using the
“Accounting: What you should know.” Jargon Online Network. Internet;
http://www.jargononline.com/accounting101.html. Viewed on 2. Consider one’s and others’ reputation when using the Internet;
April 13, 2015. 3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.

E xploration

Form groups with five members


each. Research for several news and
events related to cybercrime. Using
your cellphone or any video-
recording device, report as if you
were a newscaster. Present it in class
in 1-2 minutes recording.

8 1
Once you are done you can now filter your search results:

Pre-Test
Direction: Write Yes if you agree with the statement and No if
you disagree on the blank before each number.

______1. My computer has an antivirus so it is okay to open most email


attachments like e-cards and video files.
______2. Your Friend told you that his college application was rejected due to
the fact that you posted a video of him doing crazy stuff at a party. You posted
the video several years ago but later took it down to protect your friend’s
reputation. Can your friend be right that the college found the video?
______3. You and your best friend play a lot of video games. One time, she asks
you for your password so she can help you level up and get in-game money. She
promises to keep your password a secret. Is it okay to give away your password? Figure above. Screenshot of Google’s Advanced Search
______4. You receive an email stating that your mother’s bank account is going
to be forfeited of you do not respond to the email. Is it safe to reply? 4. Look for credible source. Some wikis, through filled with updated
information, are not a credible source. This is due to the fact that anyone can
______5. You forgot that your essay for English class is due tomorrow. While
edit its content.
doing your research, you found a website offering free essays. Is it okay to use The most credible sources are scientific journals, established news and
the essays from this free essay website? magazine websites, online encyclopedias, and scholarly databases.
______6. A virus is a malware that multiplies and infects other computers You can also check the URL of a website if it ends with a .org. .gov, and
through flash drives. .edu. A website that ends with .com is intended to be a commercial websites. In
______7. Keyloggers are software that show pop-up ads even if you are not most cases, .edu websites are best for research as government and organization
websites may have a tendency to make information favorable to them.
using your browsers.
Unfortunately, not all websites
______8. Search engines scan websites for search results even if you have set
follow the standards in domain name
your post to “private”. conventions. Some sites use the
______9. There is a danger in posting information about a future vacation. suffixes like .com loosely; some sites
______10. Letting people know your birthday is probably a must if you want to are not credible even though they use
get as many gift as possible. But having it in your profile makes you vulnerable a .edu suffix.
to identity theft. Another tip to validate if the information
is correct is to have multiple sources of information.
Having two or more websites will tell you whether the
information is reliable or not.

2 7
Online Research Online Safety and Security
 INTERNET SAFETY- it refers to the online security or safety of people
 Have you searched the Internet for and their information when using internet.
certain information where the search  NETIQUETTE- is network etiquette, the do’s and don’ts of online
communication.
engine returned a different result? Share
your experience. How Safe Are You? Let us visit each item and see how risky it is to share them.
Type of Information Risks
The information that we need is more likely already in the Internet. It is a. Your Current Location
When you share your location, this is risky because it advises any potential
just a matter of how to look for it and how to use information from the most thieves that you may not be home.
Never share personal information online. Identity theft can be a significant
credible source. Here are some tips in conducting online research: security risk with social networking. Personal details like your full name,
b. Your Personal
phone number, full birth date, and address can all be used by potential
Information
1. Have a question in mind. Focus on a question you want answered. If it identity thieves. With all of this information provided, it makes it easier for
identity thieves to replicate your online presence.
is a series of questions, start with one. Never search everything on one
You need to be careful about any information you share and how you
go. protect it, even if you share your password with a significant other.
c. Passwords
2. Narrow it down. Search engines like Google, Bing, or Yahoo use several Hopefully, you will live happily ever after. But, if it’s not forever, you may
need to worry.
filters to determine the most appropriate result for you. These search d. Embarrassing Statuses Before posting anything online, remember that anything you share has the
engines use your previous search history and your geographical and Photos You Would potential to be leaked in some manner. So, before you post something, ask
location, and send you the result which is the most related to you. But if Not Want Shared With yourself, “Would I want my mom or boss to see this?” If the answer is “No,”
Your Family or then don’t post it. Your instincts are usually correct! Make sure you are
all these filters fail, you should remember to narrow it down what you Employer protecting your online reputation!
are searching for. For example, if you were to look for Tom Sawyer, the Personal and private issues should never be shared on social networks
animation series, you would better use the keywords “Tom Sawyer because there is a good chance that others don’t really care. If you are not
e. Your Private Issues
comfortable sharing this issue with your family, friends, significant other,
animation” rather than just “Tom Sawyer”. Another example is if you and even strangers in person, never share it online.
were to look for science research experiments, it would be better to Source: https://jumpwireless.org/never-share-online/

include what branch of science it is or what type of study it is. Remember: Internet is defines as the information superhighway. This means that anyone has
3. Advanced Search. The best way to filter information you get from access to this highway, can place information, and can grab that information, even things that you
search engines is by using the have set privately, can be accessed one way or another.
advance search. This will allow you to
 Tips to Stay Safe Online
filter out information you do not
1. Be mindful of what you share online and what 9. Add friends you know in real life.
need. site you share it to. 10. Avoid visiting untrusted websites.
In Google, simply search a 2. Do not just accept terms and conditions; read 11. Install and update antivirus software on
word like you would normally do, and it. your computer.
then click the advance search option 3. Check out the privacy policy page of a website. 12. If you have a Wi-Fi at home, make it
4. Know the security features of the social private by adding a password.
on the options button located at the
networking sites you use. By keeping your 13. Avoid downloading anything from
upper right corner of the page. profile private, search engines will not be able untrusted websites.
to scan your profile. 14. Buy the software; do not use pirated
Figure right. Google’s Advance Search 5. Do not share your password with anyone. ones.
Option 6. Avoid logging in to public networks/Wi-Fi. 15. Do not reply or click links from
7. Do not talk to strangers whether online or suspicious emails.
face-to-face.
8. Never post anything about a future vacation.

6 3
Internet Threats Copyright Infringement
1. Malware – stands for malicious software
a. Virus – a malicious program designed to replicate itself and transfer from one Contents that you see from websites have their
computer to another wither through the Internet and local networks or data
respective copyrights. There are several instances
storage like flash drives and CDs
b. Worm – a malicious program that transfers from one computer to another by any where employees or business owners face copyright
type of means. Often, it uses computer network to spread itself. infringement and are sentenced to a huge fine due to
c. Trojan - a malicious program that is disguised as a useful program but once reckless copying of materials.
downloaded or installed, leaves your PC unprotected and allow hackers to get
your information Here are some tips that could help you avoid copyright
*Rogue security software – tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they infringement:
are not protected at all. 1. Understand. Copyright protects anyone’s’ works,
d. Spyware – a program that runs in the background without you knowing it. but it generally does NOT protect underlying ideas and
*Keyloggers – used to record the keystroke done by the users. This is done to facts. You can express something using your own words
steal their password or any other sensitive information. out of these ideas and facts, but you should give credit to
e. Adware – a program designed to send you advertisements, mostly as pop-ups the source.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware 2. Be responsible. Even if a material does not say
3. Phishing – its goal is to acquire sensitive personal information like passwords
that it is copyrighted, it is not a valid defense against
and credit card details. This is done by sending you an email that will direct
copyright. Be responsible enough to know if something
the user to visit a website and be asked to update his/her username,
password, credit card, or personal information. has a copyright.
*Pharming – a more complicated way of phishing.
3. Be creative. Ask yourself whether what you are
Protecting Reputations Online making is something that came from you or something
Think Before You Click made from somebody else’s creativity. It is important to
Here are things you might want to consider before posting something over the Internet: add your own creative genius in everything that will be
1. Before you post something on the web, ask these questions to yourself: Would you credited to you.
want your parents or grandparents to see it? Would you want your future boss to
see it? Once you post something on the web, you have no control of who sees your 4. Know the law. There are some limitations to
posts.
copyright laws. There are also provisions for “fair use”
2. Your friends depend on you to protect their reputation online. Talk to your friends
which mean that an intellectual property may be used
about this serious responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan that
without consent as long as it is used in commentaries,
post. criticisms, search engines, news reports, research,
4. Avoid using names. Names are easy for search engines to scan. teaching, education and etc. If you have doubts that what
5. If you feel that a post can affect you or other’s reputation, ask the one who posted you are doing does not fall under the policy of fair use, seek permission
it to pull it down or report it as inappropriate. first.

4 5

S-ar putea să vă placă și