SlideShare a Scribd company logo
1 of 57
SECURITY
SAFETY
PRIVACY
ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE
Learning Competencies
•The learners will be able to:
•Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would
relate to their specific professional tracks
•Discuss what constitutes appropriate and
inappropriate online behavior;
Learning Competencies
•The learners will be able to:
•Make the students discern possible deceptive
information and wrongly evaluated data; and
•Make the students understand the importance of
making judgment calls on possible implications and
consequences of making certain information public
Topic Outline
•Online Safety/Internet Safety
•Online Threats & Types
•Online Safety Measures
• Online Ethics and Netiquette
GALLERY WALK
FORMATIVE ASSESSMENT
DIRECTION:
1. The teacher will show some images to the students related
with the upcoming discussion.
2. Each student will be given 1 minutes to write their
observation on the following images.
4. After the activity the students will share their observation
about the image.
ONLINE SAFETY
HOW SAFE ARE YOU?
Type of Information Shared Not Shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous school (s)
5. Your Cellphone Number
6. The Name of your Mother and
Father
7. The Name of your Siblings
8. Your Address
9. Your Home Phone Number
10. Your Birthday
QUESTIONS
1. How many checks you have for Shared?
2. How many checks you have for Not Shared?
3. How safe are you when using the Internet?
ONLINE SAFETY
Refers to the practices and precautions that should be
observed when using the internet to ensure that the
users as well as their computers and personal
information are safe from crimes associated with using
the internet.
ONLINE SAFETY
•Numerous delinquencies that can be
committed on the internet:
•Stalking
•Identity theft
•Privacy violations
•Harassment
ONLINE SAFETY MEASURES
• Never give any personal information out about yourself
over the Internet.
• Do not give any banking or sensitive information unless
you are sure that it is a reputable business having a
secure service. To make sure that you are in a secured
network, the website address should begin with
“https://” as opposed to “http://”. Never access your
accounts by following an email link, instead type the URL
by yourself.
• Never open messages or attachments from someone you
do not know.
ONLINE SAFETY MEASURES
•Regularly review your privacy settings in your online
accounts to make sure you are not sharing important
personal information.
•When using a public computer terminal, be sure to
delete your browsing data before leaving.
•Keep your software updated to avoid security holes.
•Do not download or install software or anything on
your computer or cell phone that is unknown to you.
ONLINE THREATS
DEFINITION & TYPES OF THREATS
ONLINE THREATS
An act performed by a knowledgeable
computer user sometimes referred to as
hacker that illegally browses or steal
someone’s information.
TYPES OF THREATS
P G I M H L N K A B
A H N S Y I J G C N
P H I S H I N G
An email sent from an Internet criminal disguised as an
email from a legitimate, trustworthy source. The
message is meant to lure you into revealing sensitive or
confidential information.
PHISHING
TYPES OF THREATS
P G I M R L N K A B
A H N S Y I J G C N
P H A R M I N G
• A malicious website that resembles a legitimate
website, used to gather usernames and passwords.
PHARMING
TYPES OF THREATS
I B T M A N E T K O
Z N X E R C L S N P
I N T E R N E T
S C A M
• A type of scam that misleads the user in many ways
attempting to take lead of them.
• The purpose of this scam is to cheat the target of
their personal property directly rather than private
information through fabricated promises, confidence
tricks and many more.
INTERNET SCAM
TYPES OF THREATS
I B T M A N E T K O
S N X E R B L O N T
I N T E R N E T
B O T S
• A network of zombie computers that have been
taken over by a robot or bot that performs large-
scale malicious acts for the creator of the botnet.
• Captcha technology is used to avoid this type of
security threat.
BOTNET
TYPES OF THREATS
M K A C L G G D C E
X I V I W H A F R B
M A L W A R E
• A generic term for spyware and adware.
• It is a malicious software disguised as real software
often secretly installed, intended to transfer and
gather private information, like passwords, without
the user's permission.
MALWARE
• Adware - Adware (short for advertising-
supported software) is a type of malware that
automatically delivers advertisements.
• Examples: Banner Ads & Pop-up Ads
• Spyware - A type of malware that functions by
spying on user activity without their knowledge.
• These spying capabilities can include activity
monitoring, collecting keystrokes, data harvesting
(account information, logins, financial data), and
more.
• Example: Keylogger
TYPES OF THREATS
V K W N O E R B S A
Z I R M U S F N M X
V I R U S &
W O R M
• Virus is a program designed to replicate by attaching
itself into other computer programs, data files, or
the boot sector of the hard drive.
• Worm is can be injected into a network by any types
of means, like a USB stick or an email attachment.
VIRUS & WORM
• Trojan Horse
• Commonly known as a “Trojan,” is a type of malware
that disguises itself as a normal file or program to trick
users into downloading and installing malware.
• Iloveyou Virus
• Also known as Love bug or love letter
• A computer worm attached on email that have
infected 10 million of windows personal computer that
cause computer shutdown and deletion of files on the
year 2000.
• Created by a Filipino student: Onel De Guzman and
Reonel Ramones.
Love Letter
Virus Infection on a flash drive
TYPES OF THREATS
C X O L M Q P S U V
E Z R B B R U W G T
C O M P U T E R
B U G
• A malfunction on a computer system through its
runtime.
• The term “bug” originated to the Moth found on the
Mark II by Grace Hopper that cause a system
malfunction.
BUG
BUG
TYPES OF THREATS
C K Y J R T M L O I
G B N E S H A Q K P
C Y B E R
S T A L K I N G
• The use of the internet or other electronic device to
harass or stalk individual, group or organization
TYPES OF THREATS
C K Y J R T M L O I
G B N E S H A Q K P
C Y B E R
B U L L Y I N G
• The act of tormenting, threatening, harassing or
embarrassing another person using the internet or
other technologies.
CYBER HARRASSMENT
TYPES OF THREATS
M K A C L G S D C E
X I V I W H A F P B
S P A M
• An unsolicited email, instant messages, or social
media messages.
• These messages are fairly easy to spot and can be
damaging if you open or respond.
TYPES OF THREATS
P G I M R L N K A B
A H N S Y I J G C N
S P O O F I N G
• Describes a criminal who impersonates another
individual or organization, with the intent to gather
personal or business information.
LESSON RECAP
ONLINE ETHICS AND
NETIQUETTE
Netiquette, Online Safety, Computer Ethics & Privacy
NETIQUETTE
• Comes from the word Network and Etiquette.
• Is a set of rules and norms for acceptable conduct or
behaviour online.
COMPUTER ETHICS
• Concerned with how computing professionals should
make decisions regarding professional and social
conduct.
PRIVACY
• Refers to the right of individuals to deny or restrict the
collection and used of information about them.
HOW DO WE MAINTAIN OUR
PRIVACY?
AUTHENTICATION
• A process where users verifies their identity.
• Deals with the problem of determining whether a user
should be allowed access to a particular system.
• Four commonly authentication methods:
• User Identification
• Possessed Objects
• Biometric Device
• Callback System
USER IDENTIFICATION
POSSESSED OBJECT
BIOMETRIC DEVICE
CALLBACK SYSTEM
THANK YOU FOR LISTENING
BE A RESPONSIBLE NETIZEN

More Related Content

What's hot

LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationHazel Lorenzo
 
Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Mark Jhon Oxillo
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Aira Shayne Come
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment TechnologyReygie Fabro
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesMark Jhon Oxillo
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Arniel Ping
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Mark Jhon Oxillo
 

What's hot (20)

Trends in ict
Trends in ictTrends in ict
Trends in ict
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Opportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media InformationOpportunities, Challenges and Power of Media Information
Opportunities, Challenges and Power of Media Information
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...Opportunities and Challenges of Media and Information - Media and Information...
Opportunities and Challenges of Media and Information - Media and Information...
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Online Systems, Functions and Platforms
Online Systems, Functions and Platforms Online Systems, Functions and Platforms
Online Systems, Functions and Platforms
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 
Advanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment TechnologiesAdvanced Word Processing Skills - Empowerment Technologies
Advanced Word Processing Skills - Empowerment Technologies
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 

Similar to Online safety, security, ethics & etiquette

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 

Similar to Online safety, security, ethics & etiquette (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Online safety, security, ethics & etiquette

  • 2. Learning Competencies •The learners will be able to: •Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks •Discuss what constitutes appropriate and inappropriate online behavior;
  • 3. Learning Competencies •The learners will be able to: •Make the students discern possible deceptive information and wrongly evaluated data; and •Make the students understand the importance of making judgment calls on possible implications and consequences of making certain information public
  • 4. Topic Outline •Online Safety/Internet Safety •Online Threats & Types •Online Safety Measures • Online Ethics and Netiquette
  • 6. DIRECTION: 1. The teacher will show some images to the students related with the upcoming discussion. 2. Each student will be given 1 minutes to write their observation on the following images. 4. After the activity the students will share their observation about the image.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13. Type of Information Shared Not Shared 1. First Name 2. Last Name 3. Middle Name 4. Current and previous school (s) 5. Your Cellphone Number 6. The Name of your Mother and Father 7. The Name of your Siblings 8. Your Address 9. Your Home Phone Number 10. Your Birthday
  • 14.
  • 15. QUESTIONS 1. How many checks you have for Shared? 2. How many checks you have for Not Shared? 3. How safe are you when using the Internet?
  • 16. ONLINE SAFETY Refers to the practices and precautions that should be observed when using the internet to ensure that the users as well as their computers and personal information are safe from crimes associated with using the internet.
  • 17. ONLINE SAFETY •Numerous delinquencies that can be committed on the internet: •Stalking •Identity theft •Privacy violations •Harassment
  • 18. ONLINE SAFETY MEASURES • Never give any personal information out about yourself over the Internet. • Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. To make sure that you are in a secured network, the website address should begin with “https://” as opposed to “http://”. Never access your accounts by following an email link, instead type the URL by yourself. • Never open messages or attachments from someone you do not know.
  • 19. ONLINE SAFETY MEASURES •Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. •When using a public computer terminal, be sure to delete your browsing data before leaving. •Keep your software updated to avoid security holes. •Do not download or install software or anything on your computer or cell phone that is unknown to you.
  • 20. ONLINE THREATS DEFINITION & TYPES OF THREATS
  • 21. ONLINE THREATS An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone’s information.
  • 22. TYPES OF THREATS P G I M H L N K A B A H N S Y I J G C N P H I S H I N G An email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
  • 24. TYPES OF THREATS P G I M R L N K A B A H N S Y I J G C N P H A R M I N G • A malicious website that resembles a legitimate website, used to gather usernames and passwords.
  • 26. TYPES OF THREATS I B T M A N E T K O Z N X E R C L S N P I N T E R N E T S C A M • A type of scam that misleads the user in many ways attempting to take lead of them. • The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more.
  • 28. TYPES OF THREATS I B T M A N E T K O S N X E R B L O N T I N T E R N E T B O T S • A network of zombie computers that have been taken over by a robot or bot that performs large- scale malicious acts for the creator of the botnet. • Captcha technology is used to avoid this type of security threat.
  • 30. TYPES OF THREATS M K A C L G G D C E X I V I W H A F R B M A L W A R E • A generic term for spyware and adware. • It is a malicious software disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user's permission.
  • 31. MALWARE • Adware - Adware (short for advertising- supported software) is a type of malware that automatically delivers advertisements. • Examples: Banner Ads & Pop-up Ads • Spyware - A type of malware that functions by spying on user activity without their knowledge. • These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. • Example: Keylogger
  • 32. TYPES OF THREATS V K W N O E R B S A Z I R M U S F N M X V I R U S & W O R M • Virus is a program designed to replicate by attaching itself into other computer programs, data files, or the boot sector of the hard drive. • Worm is can be injected into a network by any types of means, like a USB stick or an email attachment.
  • 33. VIRUS & WORM • Trojan Horse • Commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. • Iloveyou Virus • Also known as Love bug or love letter • A computer worm attached on email that have infected 10 million of windows personal computer that cause computer shutdown and deletion of files on the year 2000. • Created by a Filipino student: Onel De Guzman and Reonel Ramones.
  • 35. Virus Infection on a flash drive
  • 36. TYPES OF THREATS C X O L M Q P S U V E Z R B B R U W G T C O M P U T E R B U G • A malfunction on a computer system through its runtime. • The term “bug” originated to the Moth found on the Mark II by Grace Hopper that cause a system malfunction.
  • 37. BUG
  • 38. BUG
  • 39. TYPES OF THREATS C K Y J R T M L O I G B N E S H A Q K P C Y B E R S T A L K I N G • The use of the internet or other electronic device to harass or stalk individual, group or organization
  • 40. TYPES OF THREATS C K Y J R T M L O I G B N E S H A Q K P C Y B E R B U L L Y I N G • The act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies.
  • 42. TYPES OF THREATS M K A C L G S D C E X I V I W H A F P B S P A M • An unsolicited email, instant messages, or social media messages. • These messages are fairly easy to spot and can be damaging if you open or respond.
  • 43. TYPES OF THREATS P G I M R L N K A B A H N S Y I J G C N S P O O F I N G • Describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information.
  • 45. ONLINE ETHICS AND NETIQUETTE Netiquette, Online Safety, Computer Ethics & Privacy
  • 46. NETIQUETTE • Comes from the word Network and Etiquette. • Is a set of rules and norms for acceptable conduct or behaviour online.
  • 47. COMPUTER ETHICS • Concerned with how computing professionals should make decisions regarding professional and social conduct.
  • 48.
  • 49.
  • 50. PRIVACY • Refers to the right of individuals to deny or restrict the collection and used of information about them.
  • 51. HOW DO WE MAINTAIN OUR PRIVACY?
  • 52. AUTHENTICATION • A process where users verifies their identity. • Deals with the problem of determining whether a user should be allowed access to a particular system. • Four commonly authentication methods: • User Identification • Possessed Objects • Biometric Device • Callback System
  • 57. THANK YOU FOR LISTENING BE A RESPONSIBLE NETIZEN

Editor's Notes

  1. Is a unique combination of characters (letter, number or symbol) that identify specific user Examples: Pin number and Password
  2. Is an any item that you must carry to gain access to computer of computer facility Examples: ATM card, credit card, and smart card
  3. Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database. Examples: Fingerprint reader, iris scanner, hand geometric scanner and signature verification system
  4. A system used for protecting a computer network, in which a user calls into a computer, which checks the person's username and password, ends the call, and then calls back the number connected with that username and password