Sunteți pe pagina 1din 14

RULES OF

NETIQUETTE
Online Safety and
Security

TYPE OF INFORMATION:
1. First Name
2. Last Name
3. Middle Name
4. Current and Previous School
5. Your Cell phone Number
6. The name of your father and mother
7. The name of your siblings
8. Your Address
9. Your home phone number
10. Your birthday
Tips to Stay Safe
Online!

1. Be mindful of what you share online and


what site you share it to.

2. Do not just accept terms and conditions;


read it.

3. Check out the privacy policy page of a


website to learn how the website handles
the information you share.
Tips to Stay Safe
Online!

4. Know the security features of the social


networking you use. By keeping your profile
private, search engines will not be able to
scan your profile.

5. Do not share your PASSWORD with


anyone.
Tips to Stay Safe
Online!

6. Avoid logging in to public networks/WI-FI.


Browsing in “incognito (or private) mode,” a
feature of the browser, will not protect you
from hackers.

7. Do not talk to strangers whether online or


face-to-face.
Tips to Stay Safe
Online!

8. Never post anything about a future


vacation. It is similar to posting, “Rob my
house at this date.”

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.


Tips to Stay Safe
Online!

11. Install and update an antivirus software on


your computer. Use only one antivirus
software to avoid conflicts.

12. If you have a WI-FI at home, make it a


private network by adding a password.
Tips to Stay Safe
Online!

13. Avoid downloading anything from


untrusted websites. You are most
vulnerable in peer-to-peer downloads
(torrents) as the download is most likely not
monitored by the site owner.

14. Buy the software; do not use pirated ones.


15. Do not reply or click links from suspicious
emails.
Internet Threats

1. Malware – stands for malicious software


a. Virus – a malicious program designed to
replicate itself and transfer from one computer to
another either thru the Internet and local
networks or data storage like flash drives and
CDs.
b. Worm – a malicious program that transfers from
one computer to another by any type of means.
Often, it uses a computer network to spread
itself. [ILOVEYOU worm (Love Bug Worm)
created by a Filipino.
Internet Threats

c. Trojan – A malicious program that is disguised as


a useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your
information.
*Rogue security software – tricks the user into
posing that it is a security software. It asks the user to pay
to improve his/her security but in reality, they are not
protected at all.
Internet Threats

d. Spyware – runs in the background without you


knowing it (thus, called spy). It has the ability to monitor
what you are currently doing and typing through key
logging.
*Keyloggers – used to record the keystroke done by
the users. This is done to steal their passwords or any
other sensitive information. It can record email, messages,
or any information you type using your keyboard.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.
Internet Threats

2. Spam – Unwanted email mostly from


bots or advertisers. It can be used to
send MALWARE.
3. Phishing – Acquire sensitive personal
information like passwords and credit
cards details.
*Pharming – a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
system.
Protecting
Reputation online

 THINK before you CLICK.

COPYRIGHT INFRINGEMENT.

 Understand
 Be responsible
 Be creative
 Know the Law
ONLINE
RESEARCH

Tips in conducting online research:

1. Have a question in mind


2. Narrow it down
3. Advanced Search
4. Look for credible source
5. Give credit

S-ar putea să vă placă și