2. At the end of this lesson, the students
should be able to:
▪ Consider one’s and others’ safety when sharing information using the
internet;
▪ Consider one’s and others’ reputation when using the internet;
▪ Determine and avoid the dangers of the internet;
▪ Be responsible in the use of social networking sites; and
▪ Browse the internet efficiently and properly through proper referencing.
Objectives
W3
3. THE
INTERNET
It is also a source of entertainment. But like most
things in this world, there is always “another side
of the coin.” The Internet is one of the most
dangerous places, especially if you do not know
what you are doing.
“
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and
stay in touch with the old ones.
“
4. INFORMATION YOU MUST LIMIT
TO SHARE ONLINE
PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION INFORMATION
6. RULE NO. 1:
REMEMBER THE
HUMAN
• You need to remember that you are talking to
a real person when you are online.
• The internet brings people together who would
otherwise never meet.
• Remember this saying when sending an
email: “Would I say this to the person’s
face.”
RULE NO. 2:
ADHERE TO THE SAME
STANDARDS ONLINE THAT
YOU FOLLOW IN REAL LIFE.
• You need to behave the same way online that
you do in real life.
• You need to remember that you can get
caught doing things you should not be doing
online just like you can in real life.
• You are still talking to a real person with
feelings even though you can’t see them.
10 COMMANDMENTS OF NETIQUETTE
7. RULE NO. 3:
KNOW WHERE YOU
ARE IN
CYBERSPACE
• Always take a look around when you enter a
new domain when surfing the web.
• Get a sense of what the discussion group is
about before you join it.
RULE NO. 4:
RESPECT OTHER
PEOPLE’S TIME AND
BANDWIDTH
• Remember people have other things to do
besides read your email.
• You are not the center of their world.
• Keep your post and emails to minimum by
saying what you want to say.
• Remember everyone won’t answer your
questions.
10 COMMANDMENTS OF NETIQUETTE
8. RULE NO. 5:
MAKE YOURSELF
LOOK GOOD
ONLINE
• Be polite and pleasant to everyone.
• Always check your spelling and grammar
before posting.
• Know what you are talking about and make
sense saying it.
RULE NO. 6:
SHARE EXPERT
KNOWLEDGE
• Ask questions online
• Share what you know online.
• Post the answers to your questions online
because someone may have the same
question you do.
10 COMMANDMENTS OF NETIQUETTE
9. RULE NO. 7:
HELP KEEP FLAME
WARS UNDER
CONTROL
• Netiquette does not forgive flaming.
• Netiquette does however forbid people who
are flaming to hurt discussion groups by
putting the group down.
RULE NO. 8:
RESPECT OTHER
PEOPLE’S PRIVACY
• Do not read other people’s mail without their
permission.
• Going through other people’s things could cost
you, your job or you could even go to jail.
• Not respecting other people’s privacy is a bad
netiquette.
10 COMMANDMENTS OF NETIQUETTE
10. RULE NO. 9:
DONT ABUSE YOUR
POWER
• Do not take advantage of other people just
because you have more knowledge or power
than them.
• Treat others as you would want them to treat
you if the roles were reversed.
RULE NO. 10:
BE FORGIVING OF
OTHER PEOPLE'S
MISTAKE
• Do not point out mistakes to people
online.
• Remember that you were once the new
kid on the block.
• You still need to have a good manners
even though you are online and cannot
see the person face to face.
10 COMMANDMENTS OF NETIQUETTE
11. TOPIC
Web-based threats, or online threats, are a category of
cybersecurity risks that may cause an undesirable event
or action via the internet . Web threats are made possible by
end-user vulnerabilities, web service developers/operators, or
web services themselves.
INTERNET
THREATS
“
“
12. malware
Malware is a catch-all term for any type of malicious software,
regardless of how it works, its intent, or how it's distributed.
❑ Terms for malicious software
❑ Any malicious code
❑ Harms devices and steal data
virus
A virus is a specific type of malware that self-replicates by
inserting its code into other programs.
❑ One type of malware
❑ Must be triggered by a user
❑ Self-replicating
All viruses are malware
but not all types of
malware are viruses.
13. TROJAN
A Trojan Horse Virus is a form of
malware that installs into a computer
pretending to be a reliable
application. In order to try and
access consumers' systems, an
attacker will frequently utilize social
engineering to conceal malicious
malware in genuine applications.
INTERNET THREATS | EXAMPLES
ROGUE SECURITY
SOFTWARE
Rogue security software is a type of
malicious software and online fraud
that tricks consumers into thinking
their computer has a virus and tries to
persuade them to pay for a phony
malware removal program that in fact
installs malware on their computer.
14. WORM
A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers.
It often uses a computer network to spread
itself, relying on security failures on the
target computer to access it.
It will use this machine as a host to scan
and infect other computers.
INTERNET THREATS | EXAMPLES
Filipino Onel de Guzman, now 44, says he unleashed the Love
Bug computer worm to steal passwords so he could access the
internet without paying.
Victims received an email attachment entitled LOVE-LETTER-
FOR-YOU.
It contained malicious code that would overwrite files, steal
passwords, and automatically send copies of itself to all contacts
in the victim's Microsoft Outlook address book.
Within 24 hours, it was causing major problems across the globe,
reportedly infecting 45 million machines.
White, G. (2020, May 3). Love bug's creator tracked down to repair shop in Manila. BBC News.
Retrieved September 17, 2021, from https://www.bbc.com/news/technology-52458765.
15. SPYWARE
Malicious software, often known as malware,
such as spyware, is placed on a computer
without the end user's knowledge. It intrudes,
takes private information and internet usage
data, and then passes it to third parties like
advertising, data companies, or other users.
This type of malware that is hard to detect.
INTERNET THREATS | EXAMPLES
KEYLOGGER
The act of secretly recording the keys pressed on a
keyboard such that the person using it is unaware
that their actions are being watched is known as
keystroke logging, also known as keylogging or
keyboard capture. The person running the logging
program can then get the data.
16. ADWARE
Adware, commonly referred to as advertisement-supported software, makes
money for its creators by displaying banner ads on your screen, typically
inside of a web browser. Although it is frequently made for desktops, adware
can also be discovered on mobile devices. Some types of adware are
extremely manipulative and provide a backdoor for dangerous software.
INTERNET THREATS | EXAMPLES
SPAM
Malspam is an abbreviation for "malware spam" or "malicious
spam," which refers to spam messages that include malware.
When readers open an email attachment or click on a link, they
often download malware such as keyloggers, ransomware,
Trojan horses, bots, info-stealers, cryptominers, spyware, and
Trojans.
PHISHING
Is the deceiving attempt to obtain sensitive information
such as usernames, passwords, credit card details
often for malicious reasons.
17. TOPIC
Intellectual property (IP) is a category of property that includes
intangible creations of the human intellect. There are many types
of intellectual property, and some countries recognize more than
others. The most well-known types are copyrights, patents,
trademarks, and trade secrets.
INTELLECTUAL
PROPERTY RIGHTS
“
“
18. 4 TYPES OF INTELLECTUAL PROPERTY
Patent
Utility patent-It protects a process, manufacture, composition of matter, and a useful
machine. Design patent-It protects the shape, appearance, pattern design, layout,
and looks of a product. The protection is granted for a limited period, generally 20
years from the filing date of the application.
Trade Secret
A trade secret is any valuable information that is not publicly known (a well guarded
secret)e.g.,. ingredients used in their food products, business methods, customer
data. Trade secret protection is not limited in time (patents last in general for up to
20 years). It may continue indefinitely as long as the secret is not revealed to the
public;
Copyright
Copyright protects the original work of authorship. Such works are literature,
drawings, paintings, songs, music, computer software, films, photos, web content.
The time limit should be equal to or longer than 50 years after the creator’s death.
Longer periods of protection may however be provided at the national level.
Trademark
A trademark offers legal protection for logo, design, symbol, phrase, wordmarks, or
a combination of those that represents a source of goods or services. The term of
trademark registration can vary but is usually ten years. It can be renewed
indefinitely on payment of additional fees.
19. PLAGIARISM
Plagiarism is using someone else's work or ideas without
giving proper credit.
❑ Not a legal term
❑ Academic crime
❑ Claiming ownership of someone else’s creative work
❑ Not punishable by government, but may be by academic
COPYRIGHT INFRIGEMENT
Copyright infringement includes the unauthorized or
unlicensed copying of a work subject to copyright.
❑ Legal term
❑ Civil crime
❑ Unauthorized used of someone else’s creative work
❑ Monetary damage for infringement
COPYRIGHT INFIGEMENT
& PLAGIARISM
20. TOPIC
Fair Use means that an intellectual property
may be used without consent as long as it is
used in Fair Uses of Copyrighted Material
WHAT IS
FAIR USE
❑Criticism
❑Comment
❑News reporting
❑Teaching
▪ Includes making copies for use in the classroom
❑Scholarship and research
❑Parody
21. TOPIC
“
Utilize the Internet as a tool for reliable information gathering and
research to best meet particular class objectives or solve a
situation. Students will use search engines more effectively. They
can have a deeper understanding of search strategies, in
particular, that will produce results that are helpful for their
academic work and career of choice.
“
CONTEXTUALIZED
ONLINE SEARCH & RESEARCH
SKILLS
22. EVALUATING INFORMATION
Accuracy Content is grammatically correct, verifiable and cited when necessary
Author
Defines who created the content, the individual or group’s credential/expertise and
provides contact information.
Currency Information is current & updated frequently.
Fairness
Content is balanced, presenting all sides of an issue and
multiple points of view.
Relevance Content is relevant to your topic or research.
Search Engine
Search Engines are programs that look for documents based from specified keywords
and return these documents where the keyword were found.
23. THE MADONNA
SEE HOW MUCH A SINGLE WORD MAKES A BIG
DIFFERENCE?
LET'S SEARCH FOR MADONNA(PICTURE OF JESUS & MARY).
MADONNA
24. ONLINE SEARCH TIPS:
USING GOOGLE LIKE A PRO
ASTERISK:
• Using * (asterisk) to fill the missing word or phrases
• In the search bar just type
how to * computer
QUOTATION:
• Use " " (quotation) to search for exact word or phrases.
• In the search bar just type
"Artificial Intelligence"
SITE:
• Using site: to search with in specific website
• In the search bar just type:
site: instagram.com computer
HYPHEN:
• Using - (hyphen) to exclude word or phrases
• In the search bar just type
Learn Programming - Java
25. ONLINE SEARCH TIPS:
USING GOOGLE LIKE A PRO
PLUS:
• Use + to search pages that contain both words
• In the search bar just type
HTML + CSS
LINK:
• Use link to search for a page that is link to another page
• In the search bar just type
link: fatima.edu.ph
RANGE:
• Use ... (range) to search with in a range of numbers
• In the search bar just type
Evolution 2000 ... 2021