Sunteți pe pagina 1din 18

Rules of Netiquette

• Online security, safety, and ethics


• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and
research skills

4 August 2019 Department of Education Region VIII 1


At the end of this lesson, the students should be able to:
1. consider one’s and others’ safety when sharing
information using the Internet;
2. consider one’s and others’ reputation when using the
Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through
proper referencing.

4 August 2019 Department of Education Region VIII 2


The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in
this world, there is always “another side
of the coin.” The Internet is one of the
most dangerous places, especially if you
do not know what you are doing.

4 August 2019 Department of Education Region VIII 3


Netiquette
- the correct and acceptable way of
communicating in the internet

Netizen
- an active participant in the online
community of the internet

4 August 2019 Department of Education Region VIII 4


4 August 2019 Department of Education Region VIII 5
4 August 2019 Department of Education Region VIII 6
Internet Threats:
1. Malware – stands for malicious software
Types of Malware:
a) Virus - a malicious program designed to replicate itself and
transfer from one computer to another through the internet
and local networks or data storage like flash drives and CDs
b) Worm - a malicious program that transfers from one
computer to another by aby type of means.
c) Trojan – a malicious program that is disguised as a useful
program but once downloaded or installed, leaves you PC
unprotected and allows hackers to get your information
*Rogue Security Software – tricks the user into posing that it is a
security software

4 August 2019 Department of Education Region VIII 7


Internet Threats:

Types of Malware:
d. Spyware – a program that runs in the background
without you knowing it. It has the ability to monitor
what you are currently doing and typing through
keylogging.

*keyloggers – used to record the keystroke


done by the users. This is done to steal their
password or any other sensitive information.

e) Adware – a program designed to send you


advertisements mostly as pop-ups.

4 August 2019 Department of Education Region VIII 8


Internet Threats:

2. Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware.

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and credit
card details.
*Pharming- a more complicated way of
phishing where it exploits the DNS System

4 August 2019 Department of Education Region VIII 9


Think Before You Click

1. Before you post something on the web, ask these questions to


yourself: Would you want your parents or grandparents to see it?
Would you want your future boss to see it? Once you post something
on the web, you have no control of who sees your posts.

2. Your friends depend on you to protect their reputation online.


Talk to your friends about this serious responsibility.

3. Set your post to “private.” In this way, search engines will not be able
to scan that post.

4. Avoid using names. Names are easy for search engines to scan.

5. If you feel that a post can affect you or other’s reputation, ask the one
who posted it to pull it down or report it as inappropriate.
If you create something—an
idea, an invention, a form of literary
work, or a research, you have the
right of how it should be used by
others. This is called intellectual
property.
Cybercrime – a crime committed or assisted through the use
of the internet
Privacy Policy – tells the user how the website will handle its
data.
Copyright – a part of the law, wherein you have the right to
your work, and anyone who uses it without your consent is
punishable by law.
Fair use – means that an intellectual property may be used
without a consent as long as it is used in commentaries,
criticisms, search engines, parodies, news reports, research,
library archiving, teaching and education.

4 August 2019 Department of Education Region VIII 12


GOVERNMENT PROVISION FOR ONLINE
COURTESY AND ETIQUETTE

• Republic Act 10627 or Anti-Bullying Act of 2013

Bullying is defined as severe or repeated use by


one or more students of a written, verbal or
electronic expression, or a physical gesture or any
combination thereof, directed to another student
that has the effect of actually causing or placing the
latter in reasonable fear of physical or emotional
harm or damage to his property.

4 August 2019 Department of Education Region VIII 13


GOVERNMENT PROVISION FOR ONLINE
COURTESY AND ETIQUETTE
• Republic Act 10175 or Cybercrime Prevention Act of
2012
This law protects an individual from various unwanted
online and cyber acts that may harm or evade one’s
privacy and integrity.

cybercrime offenses include but are not limited to,


integrity ad availability of data, illegal access of computer
s through remote means without permission, interception
of one’s information from a private conversation or
correspondence, acquisition of passwords and other vital
information from an individual, computer forgery and
libel.

4 August 2019 Department of Education Region VIII 14


4 August 2019 Department of Education Region VIII 15
Write the letter of your answer

A. Virus I. Private
B. Rogue J. Malware
C. Keylogger K. Incognito
D. Adware L. Internet
E. Spam M. Trojan
F. Phising N. Copyright
G. Fair use O. Pharming
H. Spyware
GROUP ACTIVITY

Research for several news and events related to


cybercrime. Using your cellphone or any video
recording device, report it as if you were a
newscaster. Present in 1-2 minutes recording.

4 August 2019 Department of Education Region VIII 17


4 August 2019 Department of Education Region VIII 18

S-ar putea să vă placă și