Sunteți pe pagina 1din 100

INTERNET

SAFETY
PREPARED BY:
JEAN IRISH L.
BADILLA

www.googleslidesppt.com _ 30+ Ready Made Google Slides & PowerPoint Presentation for Free
Objectives:
01 Identifying what is Online Safety &
Security

02 Identifying what is Online Ethics &


Etiquette

03 Identifying what are the examples of


online ethics & etiquettes

04 Identifying the importance of online


ethics & etiquettes
INTRODUCTION TO:
Insert the title of your subtitle Here

ONLINE SAFETY CROSS-SITE


01 & SECURITY 04 SCRIPTING
MALWARE &
02 ONLINE ETHICS
05 ANTI-MALWARE
& ETIQUETTE
SOFTWARE
PHISHING &
03 06 FIREWALL
SCAMMING
Crossword Puzzle
Find the words that are related to our topic as much as you can! 
O N L I N E S E C U R I T Y Q W E R T P
N C X Z L K J H G F D S N A P O I U Y H
L L A W E R I F V B N M E T H I C S M I
I S D F G E T T E U Q I T E G H J K L S
N S A D N O N P E R S I S T E N T U E H
E Q W D A T A B A S E D I A S D G R W I
S E R T Y G N I M M A C S U I O P K H N
A N T I M A L W A R E E R P P O H S F G
F S O C I A L E N G I N E E R I N G G N
E N G I N E E R E D S O P I A L W E R D
T A N T I M A L W A R E S O F T W A R E
Y A S E F G H J L A L E R T S C R I P T
C R O S S S I T E S C R I P T I N G S A
Crossword Puzzle
Find the words that are related to our topic as much as you can! 
O N L I N E S E C U R I T Y Q W E R T P
N C X Z L K J H G F D S N A P O I U Y H
L L A W E R I F V B N M E T H I C S M I
I S D F G E T T E U Q I T E G H J K L S
N S A D N O N P E R S I S T E N T U E H
E Q W D A T A B A S E D I A S D G R W I
S E R T Y G N I M M A C S U I O P K H N
A N T I M A L W A R E E R P P O H S F G
F S O C I A L E N G I N E E R I N G G N
E N G I N E E R E D S O P I A L W E R D
T A N T I M A L W A R E S O F T W A R E
Y A S E F G H J L A L E R T S C R I P T
C R O S S S I T E S C R I P T I N G S A
Online Security and Safety

Online safety and security is the
awareness of the user in
implementing counter measures to
avoid compromise of sensitive
personal data and assets.

An asset is any piece of information
that has certain value to its owner,
which when compromised can
result in loss to the asset's owner.

As the internet continues to grow and
different industries goes online, online
safety and security has become a
growing concern to the netizens.

Common threats faced by the netizens
everyday include other netizens with
malicious intent (scamming,
phishing, and other cybercrimes),
unsecured programmed web
applications, and malwares (virus,
worm, trojan horse, etc.)
What is scamming?

Scamming is an act of the
attacker that seeks to gain the
victim's trust takes advantage of
the victim to perform further
attacks.

Most scams do not involve
technical skills; In fact, the most
common method of scamming
being performed is social
engineering.
What is Social Engineering?

Social engineering is the act
of the attacker to interact with
and psychologically
manipulate the victim which
leads to tricking the victim into
performing an action desired
by the attacker or giving out
confidential information to the
hacker.
What is Phishing?

Phishing is one of the
most common cyber
attacks wherein the
attacker impersonates a
trusted third party in an
attempt to get the
credentials or personal
information of the victim.
What is Phishing?

Phishing is done mostly
via email containing an
external link and the
attacker usually codes a
fake website that looks like
the legitimate one to
mislead the victim.

To avoid phishing attacks, users
should always check the site
they are visiting before inputting
sensitive data and login
credentials.

Fake sites used by attackers to
perform phishing often use
domain names close to the
legitimate one in order to deceive
the users, but upon closer look
they are not really the same.
What is cross-site scripting?

Cross-site scripting is a type of
attack typically found in vulnerable
web applications. Attackers often
take advantage of sites without
proper input validation to inject
malicious payload to attack the
victim.

Cross-site scripting can be
categorized as persistent and
non-persistent.
Type of Cross-site Scripting
(XSS)

Persistent-The persistent (or stored)
XSS vulnerability is a more
devastating variant of a cross-site
scripting flaw: it occurs when the
data provided by the attacker is
saved by the server, and then
permanently displayed on "normal"
pages returned to other users in the
course of regular browsing, without
proper HTML escaping.

A classic example of
this is with online
message boards
where users are
allowed to post HTML
formatted messages
for other users to read

Persistent cross-site scripts
are attacks that get stored
in the database of the
server. This type of attack
usually occur on unsecured
blogs and forums where user
inputs are stored in a
database, but the website
fails to validate the user’s
input.

Persistent cross-site scripts are
meant to exist permanently
on a website and victimize
people who visit the site unless
removed from the database.

Attackers usually use
persistent cross-site scripting
attacks to steal credentials and
credit card information from the
victims.
Type of Cross-site Scripting
(XSS)

Non-persistent cross-site
scripting

also known as Reflected XSS,
affects only the target victim. One of
the causes of non-persistent cross-
site scripting is the website owner
failing to perform proper input
validation on the user input
fields.

Attackers can also perform this
attack by attaching the
malicious payload on the URL
itself. Some of us might think
that it is easy to detect
malicious codes on the URL,
but attackers have several ways
to hide them. In addition, URL
shortening services makes it
even more devastating.

The attacker usually sends
the URL containing the non-
persistent cross-site scripting
malicious payload to the
victim, and as soon as the
victim clicks the URL, the
victim will either be redirected
to a phishing site, or have
his/her credentials stolen
immediately.
How do we know if a website is
secure or not?

Users must always be vigilant
when vising websites because
not all of them are secured.
Below are some steps that can
act as guidelines to determine
whether a website is secured or
not:
1. Check the site URL
 URL comes with the pattern <protocol
identifier>://<resource name>.
 For example, in
http://www.technokids.ph, the protocol
used is HTTP (Hypertext Transfer
Protocol), and the domain name of the
webserver is www.technokids.ph. For
ftp://ccs1.dlsu.edu.ph, the protocol used
is the FTP (file transfer protocol).
The user should also verify if the URL
they are visiting is legitimate or not.
For example, the user received an email that contains a
message stating that his or her Facebook account will be
locked down within three days unless they log in and
change the password. At the end of the email there is a
shortened URL included. For the purpose of this lecture
we will use the URL “goo.gl/fbpwdr”. At first glance, the URL
might seem legitimate because it uses a Google URL
shortener, which is a trusted source. Upon clicking on the
link, a page that looks exactly like Facebook’s password
reset page was displayed, but the URL reads as
“http://facebook.9wg.com/pwd_reset”.
Do not trust URL shorteners because you never know
where they are taking you to. Always verify the URL of the
site you are visiting, make sure that it is really the site
you want to visit before continuing with any transactions.
2. Look for the “Padlock” icon

When accessing secured web
pages, browsers should be
displaying a padlock icon.

Different browsers display the
icon in different locations;
therefore, it is very important to
know where the padlock appears
on your browser.

Do note that the padlock icon
should never be displayed in
the HTML rendering area of the
browser, as some malicious sites
intentionally display a padlock
icon either on the header or the
footer of the page in attempt to
trick the user from believing that
the website is a secured site.

The padlock icon is also not an image.
When you click the padlock, it should
display information regarding the HTTPS
certification issued by the Certificate
Authority (CA) trusted by the browser.

Take note of the certificate’s expiration
date. It should not be expired. There
should also be information on the
encryption algorithm being used. It should
be displayed below the HTTPS
certification information.
Below are screenshots of the padlock in different
browsers commonly used in Windows platform:
1. Google Chrome

Current version of Google
Chrome has the padlock icon
displayed on the left side of the
site URL as shown below:
2. Mozilla Firefox

Mozilla Firefox displays the
padlock on the lower-left
corner of the browser as
shown below:
3. Internet Explorer

Internet Explorer has its
padlock icon displayed on the
right side of the site URL as
shown below:
What is a malware?

Malware comes from the English words
“malicious” and “software”.

It is a generic term referring to any software
that can disrupt normal business
operations by destructing the network
infrastructure, database, and file systems
or by bypassing the authorization and
authentication scheme of the system, steal
sensitive information, and spamming the
work station or network with undesirable
advertisements.
 Malwares are generally designed to
perform destruction and sabotage
to a system. Although a few
malware are being used to ask for
ransom from the victim, malwares
are usually bound to or disguised
as normal file, which make it hard
for typical computer users to detect
them without the aid of proper tools.

Signs of malware infection may include
degraded performance, unusual
system activities, and frequent pop-
ups.

Although most malware only run when
executed by the user (without the user’s
knowledge of course), there are certain
malwares that can execute and replicate
themselves throughout the network and
cause massive destruction. One example
of this malware is a worm.
How do we detect/prevent malware
infection?

A malware infection can
be detected with the help
of either an anti-malware
software or a firewall
software.
What is a anti-malware software?

An anti-malware software is a software
downloaded and installed by the user
to protect the workstations from
malware threats. There are anti-malware
that require the user to purchase a
license for all their features to work while
some come with free licenses.

Anti-malware can either detect a malware
through database scan or heuristics.
How does anti-malware detect malware
through database scan?

Database scan detects
malwares when the
malwares’ signatures
match the signatures found
and stored in the database.
How about heuristic scan?

Heuristic scanning allows the anti-malware
to analyze the software more thoroughly
hence, allowing the anti-malware to
detect possible threats that are not yet
discovered. When a threat is detected,
the anti-malware can either place the
infected file to a sandbox, which prevents
the infected file from further replicating and
infecting other files, or remove the file from
the system.
What is a firewall?

Firewall acts as the first line of
defense that protects the
workstation or the whole
network from malware threats.
Firewalls also come in the
form of hardware firewall and
software firewall.
What is a hardware firewall?

Hardware firewall are
firewalls that come with a
dedicated hardware and
are considered faster, more
expensive, and harder to
maintain.
To keep yourself safe from the threats of malware, it is suggested
that you do perform the following steps below:

Install an anti-malware on
01 your system

Always keep your anti-


02
malware up-to-date
Always keep your Operating
03
System up-to-date
Frequently use the anti-
04
malware to scan your system
for malware
To keep yourself safe from the threats of malware, it is suggested
that you do perform the following steps below:

05 Visit only trusted websites


Backup important files on different
06 workstation or on a cloud storage
service

07 Use strong passwords


–Password should contain at
least one special character, one
uppercase character, one
lowercase character, and a
number
CREATING A PASSWORD:
Insert the title of your subtitle Here
Do not use easy- Do not use one
to-guess password for all
passwords like of your accounts
P@ssw0rd
When using only one
password for all Change your As much as
accounts, if one account password possible, do not
is compromised, all
accounts are at risk.
frequently reuse passwords
What is a software firewall?

Software firewalls can be
downloaded and installed to
a workstation dedicated for
the firewall’s system and has
enough processing power to
process the inbound and
outbound traffic.

Software firewalls are considered
cheaper and easier to maintain.

Software firewalls can be
classified as open-source,
freeware, or licensed-based.

Although a firewall can detect
attacks and threats, it cannot
detect threats that are already
existing inside the network.

Listed above are some of
the basic guidelines in
securing yourself and your
information and do not
guarantee you 100% safety
as information security is a
never-ending process.

Online safety and security does not
only include technical aspect, it is
strongly recommended that users
always stay vigilant and always
refrain from leaking sensitive
personal information. Always
remember that a person can be
anyone on the internet ; therefore,
give your trust, but at the same
time verify things.
Quiz:
Insert the title of your subtitle Here
Online Ethics
and Etiquette
PREPARED BY:
JEAN IRISH L.
BADILLA

www.googleslidesppt.com _ 30+ Ready Made Google Slides & PowerPoint Presentation for Free
What is netiquette?
 The word “netiquette” is derived
from two words, namely
network and etiquette.
 Netiquette is a set of do’s and
don’ts that netizens should
follow when surfing the internet.
 Although there are no specific
written rules in the cyberspace,
netizens are still expected to follow
a set of guidelines on how to
behave when online.
 It is important for the netizens to
know the proper netiquette so that
one can express freely without
offending anyone.
 Netiquette does not only
cover how one
communicate with others,
it also covers guidelines
on one can properly use
resources online.
How is someone expected to behave
online?

1. Be polite
A. Begin a message by greeting the
recipient
i. Good day Mr./Ms./Mrs. <Recipient
last name>,
ii. Dear Mr./Ms./Mrs. <Recipient last
name>
B. End the email with your name
i. Yours Sincerely,
<Your name>
ii. Yours Truly,
<Your name>
iii. Best Regards,
<Your name>
C. Include a signature (if applicable)
D. Think before writing
i. Use appropriate wording
1. No foul language
2. As much as possible maintain
correct grammar and spelling
3. Avoid sarcasm
4. Use appropriate language
Ex: I leik these pecture so very nyss. Lol
2. Read and reply to messages promptly
- Acknowledge and return messages
promptly

3. Do not spam other people’s mail box


a. Avoid forwarding useless
advertisements and chain mails
b. Respect other’s privacy(Do not quote
or forward personal email without the
original author’s permission.
4. Use appropriate mail subject
- Include a subject line
- No spam (a.k.a. junk mail)
5. When using intellectual property
online, do not forget to give credits
to the owner of the resource.
- Copy with caution
- Obey Copyright Laws
- don’t steal someone else’s idea,
property, and rights.
6. NO Flaming
FLAME – is a personal insult
communicated through the internet.
- watch your posts or comments
7. Don’t Type in ALL CAPS
- people may misinterpret it.
8. Don’t talk with people you do not
know
- do not arrange to met anyone you
meet online
Comment 1: So annoying shot!! Looser! LOL
Comment 2: WHY WEAR A SHADES? MATAAS BA
ANG ARAW? HAHAHAHAHA! FUNNY!
Unknown User: Hi! How are
you?
You: I’m fine. You?
Unknown User: Can I have
your phone number?
You: 091774*****
9. Be HONEST / Be Yourself
- tell the truth
- do not pretend to be
someone else.

10. The Golden Rule.


- treat others as you would like
to be treated.
Republic Act 10175 or Cybercrime
Prevention Act of 2012

Protects on individual from various
unwanted online and cyber acts that
may harm or evade one’s privacy and
integrity.

The Cybercrime Prevention Act of 2012,
officially recorded as Republic Act No.
10175, is a law in the Philippines
approved on September 12, 2012.
Republic Act 10175 or Cybercrime
Prevention Act of 2012

It aims to address legal issues
concerning online interactions and
the Internet in the Philippines.
Among the cybercrime offenses
included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal
access to data and libel.
What is Intellectual Property?

Intellectual property is anything that is a
result of one’s creativity.

This may be an invention, a design, or any
form of art.

Intellectual properties are protected by
Intellectual Property Rights, a right of the
property owner to decide to whom the
property will be shared, and gives the
owner the right to sue anyone who uses
the property without his/her authorization.

Different types of Intellectual
Property Rights addressed
different types of intellectual
property.

The table below shows how
different types of intellectual
properties are being protected
under the Intellectual Property
Rights:
Intellectual Property Type of Intellectual Example
Right Property
Patent Inventions Oculus Rift, Google
Glass, Siri
Copyright Any form of art or works Book, song, movie
Industrial Design Right Designs iPhone’s designs,
Samsung Galaxy
designs
Plant Breeders’ Right Plant variety iPhone’s designs,
Samsung Galaxy
designs
Trademarks Anything that distinguishes Yahoo! logo, Google
a brand from others logo, Facebook logo
Trade Dress Product appearance and Interface design of
packaging Google Search Engine
Trade Secrets Information kept secret by a Confidential files and
business that can give the data
owner cutting edge against
competitors
What are online research tools?

Online research tools are a set
of digital tool that aid the user
in performing research. Just
like any internet tool, online
research tools also have their
advantages and
disadvantages.
What are the advantages?

Online research tools offer a single source
of information where the user can perform
data gathering from a single point of
location.

It also allow you to save a topic that you
found online, securely store it and access it
on a later time.

Online research tools increase the pace of
researchers when gathering and
organizing data.

Audios and videos can sometimes be a
better source of information as compared
to pure text information because there are
just things that audios and videos can do
that textbooks cannot.

If used efficiently, the internet is like a large
library that can provide you with all the
information you need to perform your
research. In spite of the advantages of
online research tools, they also have a
number of disadvantages.
What are the disadvantages?

Unlike resources found in the library,
some online resources come with
additional fee for you to fully access
their contents.

Some will require you one-time
payment while others will require
you to pay a monthly subscription
before you can access the content
you need.

Since everyone is free to post
anything online, articles published
online more likely has gone through
lesser quality assurance checks as
compared to published books we
found in physical libraries.

For a book to be published, it often
needs to meet certain standards set
by the publishing house.

Journals are also often
verified by several experts
before getting published.

On the other hand, anyone
can just spend a few bucks to
buy a domain name and start
publishing articles online.

These contents are not strictly
moderated, hence quality
control is harder on the
internet.

In fact, there are many articles
out there that are biased
towards specific brand/service
they are advertising for.
How do we determine whether a
source is credible?
There are few simple steps that we can
follow to check if the source website is
credible or not:

1.) Check the URL


a.) We can easily determine the type
of organization behind the website
i.) .com is for commercial use
ii.) .edu is for educational use
iii.) .gov is for government use
iv.) .org is usually for nonprofit
organizations
v.) .net is usually for network
service providers, and lastly
vi.) .mil are for military use only

b.) The URL often contains the name


of the abbreviation of the
organization/publisher’s name in its
URL
2.) We should also take note of the
following:
a.) Credibility of the content publisher
b.) The content must be unbiased and of no
commercial use
c.) What are the target audience of the
article and how recent was it published?
d.) The date of publish
e.) Citation and references

When performing online research,
we tend to be easily distracted by
the other contents on the internet.
This dramatically reduces our
pace and productivity. When
performing online research, we
must maintain self-discipline so
that we can efficiently perform our
tasks.
A few of this tricks when performing
online research:
1. Use of boolean operators:
a.) Involves adding the words
“AND”, “OR”, and “NOT” into the
search keywords
b.) The operators should be
always capitalized

OR:
 Does not matter which
concept shows up in your
results as long as one concept
is included
 e.g. “baby” OR “infant”; does
not matter which result you get

NOT:
 Removes search results you do
not need by filtering out search
results
 e.g. when you search for
“computer” and laptops keep
showing up, you can search
“computer” NOT “laptop” to filter
2.) Truncation:
–Includes “*”
–Used at the end of the keyword
–Usefulwhen searching for concepts
with multiple ending
–e.g. When you search for the
keyword “canad”, it will return results
for “canada”, “canadian” and
3.) Quotation marks (“):
–Used to keep words together in
seach
–e.g. If you search the keyword: jump
street, it will return results for both
jump and street, but if you added
quotation marks, your search engine
will recognize the two words as one
Group
Activity
Insert the title of your subtitle Here
Group Activity

ESTABLISHING PARTNERSHIPS

The goal is to gain a partnership between a
non-profit professional organization and
your student organization. You are an officer
of a student organization.

The target audience is the board members
of a non-profit professional organization.

You need to convince a non-profit
professional organization that a partnership
with your current student organization will be
beneficial for both parties.

You need to create a presentation that will
explain what your student organization is about
and how a partnership with a non-profit
organization will be beneficial to both
organizations.

Your presentation should be able to show why
a partnership between your student
organization and the non-profit professional
organization will be beneficial for both
organizations.

The creation of your presentation should use
at least 3 different ICT tools and show

Your presentation's content and
ideas should be well organized.

Your presentation should be clear,
easy to understand and is
appropriate to the audience.

Your presentation will be evaluated
based on content, resourcefulness,
originality, organization & clarity.
Example: Platform used is Emaze https://www.emaze.com/
Individua
l Ass.
Assignment#1
Thank you
Insert the title of your subtitle Here

Write a 600-800 word essay that
identifies how they use internet as a
tool for research.

Guide questions for the essay:
 How did I use internet as a tool for
doing my research in the previous class
activities?
 What are important things to remember
when using the internet as a research
tool

S-ar putea să vă placă și