SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
ONLINE SAFETY, SECURITY
AND RULES OF NETIQUETTE
W3
At the end of this lesson, the students
should be able to:
▪ Consider one’s and others’ safety when sharing information using the
internet;
▪ Consider one’s and others’ reputation when using the internet;
▪ Determine and avoid the dangers of the internet;
▪ Be responsible in the use of social networking sites; and
▪ Browse the internet efficiently and properly through proper referencing.
Objectives
W3
THE
INTERNET
It is also a source of entertainment. But like most
things in this world, there is always “another side
of the coin.” The Internet is one of the most
dangerous places, especially if you do not know
what you are doing.
“
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and
stay in touch with the old ones.
“
INFORMATION YOU MUST LIMIT
TO SHARE ONLINE
PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION INFORMATION
TOPIC
10 COMMANDMENTS
NETIQUETTE
The Core Rules of Netiquette are excerpted from the book Netiquette by
VIRGINIA SHEA.
RULE NO. 1:
REMEMBER THE
HUMAN
• You need to remember that you are talking to
a real person when you are online.
• The internet brings people together who would
otherwise never meet.
• Remember this saying when sending an
email: “Would I say this to the person’s
face.”
RULE NO. 2:
ADHERE TO THE SAME
STANDARDS ONLINE THAT
YOU FOLLOW IN REAL LIFE.
• You need to behave the same way online that
you do in real life.
• You need to remember that you can get
caught doing things you should not be doing
online just like you can in real life.
• You are still talking to a real person with
feelings even though you can’t see them.
10 COMMANDMENTS OF NETIQUETTE
RULE NO. 3:
KNOW WHERE YOU
ARE IN
CYBERSPACE
• Always take a look around when you enter a
new domain when surfing the web.
• Get a sense of what the discussion group is
about before you join it.
RULE NO. 4:
RESPECT OTHER
PEOPLE’S TIME AND
BANDWIDTH
• Remember people have other things to do
besides read your email.
• You are not the center of their world.
• Keep your post and emails to minimum by
saying what you want to say.
• Remember everyone won’t answer your
questions.
10 COMMANDMENTS OF NETIQUETTE
RULE NO. 5:
MAKE YOURSELF
LOOK GOOD
ONLINE
• Be polite and pleasant to everyone.
• Always check your spelling and grammar
before posting.
• Know what you are talking about and make
sense saying it.
RULE NO. 6:
SHARE EXPERT
KNOWLEDGE
• Ask questions online
• Share what you know online.
• Post the answers to your questions online
because someone may have the same
question you do.
10 COMMANDMENTS OF NETIQUETTE
RULE NO. 7:
HELP KEEP FLAME
WARS UNDER
CONTROL
• Netiquette does not forgive flaming.
• Netiquette does however forbid people who
are flaming to hurt discussion groups by
putting the group down.
RULE NO. 8:
RESPECT OTHER
PEOPLE’S PRIVACY
• Do not read other people’s mail without their
permission.
• Going through other people’s things could cost
you, your job or you could even go to jail.
• Not respecting other people’s privacy is a bad
netiquette.
10 COMMANDMENTS OF NETIQUETTE
RULE NO. 9:
DONT ABUSE YOUR
POWER
• Do not take advantage of other people just
because you have more knowledge or power
than them.
• Treat others as you would want them to treat
you if the roles were reversed.
RULE NO. 10:
BE FORGIVING OF
OTHER PEOPLE'S
MISTAKE
• Do not point out mistakes to people
online.
• Remember that you were once the new
kid on the block.
• You still need to have a good manners
even though you are online and cannot
see the person face to face.
10 COMMANDMENTS OF NETIQUETTE
TOPIC
Web-based threats, or online threats, are a category of
cybersecurity risks that may cause an undesirable event
or action via the internet . Web threats are made possible by
end-user vulnerabilities, web service developers/operators, or
web services themselves.
INTERNET
THREATS
“
“
malware
Malware is a catch-all term for any type of malicious software,
regardless of how it works, its intent, or how it's distributed.
❑ Terms for malicious software
❑ Any malicious code
❑ Harms devices and steal data
virus
A virus is a specific type of malware that self-replicates by
inserting its code into other programs.
❑ One type of malware
❑ Must be triggered by a user
❑ Self-replicating
All viruses are malware
but not all types of
malware are viruses.
TROJAN
A Trojan Horse Virus is a form of
malware that installs into a computer
pretending to be a reliable
application. In order to try and
access consumers' systems, an
attacker will frequently utilize social
engineering to conceal malicious
malware in genuine applications.
INTERNET THREATS | EXAMPLES
ROGUE SECURITY
SOFTWARE
Rogue security software is a type of
malicious software and online fraud
that tricks consumers into thinking
their computer has a virus and tries to
persuade them to pay for a phony
malware removal program that in fact
installs malware on their computer.
WORM
A computer worm is a standalone malware
computer program that replicates itself in
order to spread to other computers.
It often uses a computer network to spread
itself, relying on security failures on the
target computer to access it.
It will use this machine as a host to scan
and infect other computers.
INTERNET THREATS | EXAMPLES
Filipino Onel de Guzman, now 44, says he unleashed the Love
Bug computer worm to steal passwords so he could access the
internet without paying.
Victims received an email attachment entitled LOVE-LETTER-
FOR-YOU.
It contained malicious code that would overwrite files, steal
passwords, and automatically send copies of itself to all contacts
in the victim's Microsoft Outlook address book.
Within 24 hours, it was causing major problems across the globe,
reportedly infecting 45 million machines.
White, G. (2020, May 3). Love bug's creator tracked down to repair shop in Manila. BBC News.
Retrieved September 17, 2021, from https://www.bbc.com/news/technology-52458765.
SPYWARE
Malicious software, often known as malware,
such as spyware, is placed on a computer
without the end user's knowledge. It intrudes,
takes private information and internet usage
data, and then passes it to third parties like
advertising, data companies, or other users.
This type of malware that is hard to detect.
INTERNET THREATS | EXAMPLES
KEYLOGGER
The act of secretly recording the keys pressed on a
keyboard such that the person using it is unaware
that their actions are being watched is known as
keystroke logging, also known as keylogging or
keyboard capture. The person running the logging
program can then get the data.
ADWARE
Adware, commonly referred to as advertisement-supported software, makes
money for its creators by displaying banner ads on your screen, typically
inside of a web browser. Although it is frequently made for desktops, adware
can also be discovered on mobile devices. Some types of adware are
extremely manipulative and provide a backdoor for dangerous software.
INTERNET THREATS | EXAMPLES
SPAM
Malspam is an abbreviation for "malware spam" or "malicious
spam," which refers to spam messages that include malware.
When readers open an email attachment or click on a link, they
often download malware such as keyloggers, ransomware,
Trojan horses, bots, info-stealers, cryptominers, spyware, and
Trojans.
PHISHING
Is the deceiving attempt to obtain sensitive information
such as usernames, passwords, credit card details
often for malicious reasons.
TOPIC
Intellectual property (IP) is a category of property that includes
intangible creations of the human intellect. There are many types
of intellectual property, and some countries recognize more than
others. The most well-known types are copyrights, patents,
trademarks, and trade secrets.
INTELLECTUAL
PROPERTY RIGHTS
“
“
4 TYPES OF INTELLECTUAL PROPERTY
Patent
Utility patent-It protects a process, manufacture, composition of matter, and a useful
machine. Design patent-It protects the shape, appearance, pattern design, layout,
and looks of a product. The protection is granted for a limited period, generally 20
years from the filing date of the application.
Trade Secret
A trade secret is any valuable information that is not publicly known (a well guarded
secret)e.g.,. ingredients used in their food products, business methods, customer
data. Trade secret protection is not limited in time (patents last in general for up to
20 years). It may continue indefinitely as long as the secret is not revealed to the
public;
Copyright
Copyright protects the original work of authorship. Such works are literature,
drawings, paintings, songs, music, computer software, films, photos, web content.
The time limit should be equal to or longer than 50 years after the creator’s death.
Longer periods of protection may however be provided at the national level.
Trademark
A trademark offers legal protection for logo, design, symbol, phrase, wordmarks, or
a combination of those that represents a source of goods or services. The term of
trademark registration can vary but is usually ten years. It can be renewed
indefinitely on payment of additional fees.
PLAGIARISM
Plagiarism is using someone else's work or ideas without
giving proper credit.
❑ Not a legal term
❑ Academic crime
❑ Claiming ownership of someone else’s creative work
❑ Not punishable by government, but may be by academic
COPYRIGHT INFRIGEMENT
Copyright infringement includes the unauthorized or
unlicensed copying of a work subject to copyright.
❑ Legal term
❑ Civil crime
❑ Unauthorized used of someone else’s creative work
❑ Monetary damage for infringement
COPYRIGHT INFIGEMENT
& PLAGIARISM
TOPIC
Fair Use means that an intellectual property
may be used without consent as long as it is
used in Fair Uses of Copyrighted Material
WHAT IS
FAIR USE
❑Criticism
❑Comment
❑News reporting
❑Teaching
▪ Includes making copies for use in the classroom
❑Scholarship and research
❑Parody
TOPIC
“
Utilize the Internet as a tool for reliable information gathering and
research to best meet particular class objectives or solve a
situation. Students will use search engines more effectively. They
can have a deeper understanding of search strategies, in
particular, that will produce results that are helpful for their
academic work and career of choice.
“
CONTEXTUALIZED
ONLINE SEARCH & RESEARCH
SKILLS
EVALUATING INFORMATION
Accuracy Content is grammatically correct, verifiable and cited when necessary
Author
Defines who created the content, the individual or group’s credential/expertise and
provides contact information.
Currency Information is current & updated frequently.
Fairness
Content is balanced, presenting all sides of an issue and
multiple points of view.
Relevance Content is relevant to your topic or research.
Search Engine
Search Engines are programs that look for documents based from specified keywords
and return these documents where the keyword were found.
THE MADONNA
SEE HOW MUCH A SINGLE WORD MAKES A BIG
DIFFERENCE?
LET'S SEARCH FOR MADONNA(PICTURE OF JESUS & MARY).
MADONNA
ONLINE SEARCH TIPS:
USING GOOGLE LIKE A PRO
ASTERISK:
• Using * (asterisk) to fill the missing word or phrases
• In the search bar just type
how to * computer
QUOTATION:
• Use " " (quotation) to search for exact word or phrases.
• In the search bar just type
"Artificial Intelligence"
SITE:
• Using site: to search with in specific website
• In the search bar just type:
site: instagram.com computer
HYPHEN:
• Using - (hyphen) to exclude word or phrases
• In the search bar just type
Learn Programming - Java
ONLINE SEARCH TIPS:
USING GOOGLE LIKE A PRO
PLUS:
• Use + to search pages that contain both words
• In the search bar just type
HTML + CSS
LINK:
• Use link to search for a page that is link to another page
• In the search bar just type
link: fatima.edu.ph
RANGE:
• Use ... (range) to search with in a range of numbers
• In the search bar just type
Evolution 2000 ... 2021

Mais conteúdo relacionado

Semelhante a ONLINE SAFETY AND NETIQUETTE RULES

online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxMeiaGuzman1
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 

Semelhante a ONLINE SAFETY AND NETIQUETTE RULES (20)

online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptxONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
ONLINE SAFETY, SECURITY AND NETIQUETTE.pptx
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber security
Cyber securityCyber security
Cyber security
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 

Mais de ExtremelyDarkness2

WEEK-4-Piecewise-Function-and-Rational-Function.pptx
WEEK-4-Piecewise-Function-and-Rational-Function.pptxWEEK-4-Piecewise-Function-and-Rational-Function.pptx
WEEK-4-Piecewise-Function-and-Rational-Function.pptxExtremelyDarkness2
 
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptx
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptxWEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptx
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptxExtremelyDarkness2
 
WK3-1stMTG-Hazards_-962312255.pptx
WK3-1stMTG-Hazards_-962312255.pptxWK3-1stMTG-Hazards_-962312255.pptx
WK3-1stMTG-Hazards_-962312255.pptxExtremelyDarkness2
 
Week-5-Inverse-Function-NGY.pptx
Week-5-Inverse-Function-NGY.pptxWeek-5-Inverse-Function-NGY.pptx
Week-5-Inverse-Function-NGY.pptxExtremelyDarkness2
 

Mais de ExtremelyDarkness2 (7)

WEEK-4-Piecewise-Function-and-Rational-Function.pptx
WEEK-4-Piecewise-Function-and-Rational-Function.pptxWEEK-4-Piecewise-Function-and-Rational-Function.pptx
WEEK-4-Piecewise-Function-and-Rational-Function.pptx
 
W5_MSEXCEL.pdf
W5_MSEXCEL.pdfW5_MSEXCEL.pdf
W5_MSEXCEL.pdf
 
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptx
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptxWEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptx
WEEK-2-FUNCTION-AND-RELATION-EVALAUTION-OF-A-FUNCTIONS.pptx
 
W4_MSWORD-Part-2.pdf
W4_MSWORD-Part-2.pdfW4_MSWORD-Part-2.pdf
W4_MSWORD-Part-2.pdf
 
WEEK 6.pdf
WEEK 6.pdfWEEK 6.pdf
WEEK 6.pdf
 
WK3-1stMTG-Hazards_-962312255.pptx
WK3-1stMTG-Hazards_-962312255.pptxWK3-1stMTG-Hazards_-962312255.pptx
WK3-1stMTG-Hazards_-962312255.pptx
 
Week-5-Inverse-Function-NGY.pptx
Week-5-Inverse-Function-NGY.pptxWeek-5-Inverse-Function-NGY.pptx
Week-5-Inverse-Function-NGY.pptx
 

Último

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Último (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

ONLINE SAFETY AND NETIQUETTE RULES

  • 1. ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE W3
  • 2. At the end of this lesson, the students should be able to: ▪ Consider one’s and others’ safety when sharing information using the internet; ▪ Consider one’s and others’ reputation when using the internet; ▪ Determine and avoid the dangers of the internet; ▪ Be responsible in the use of social networking sites; and ▪ Browse the internet efficiently and properly through proper referencing. Objectives W3
  • 3. THE INTERNET It is also a source of entertainment. But like most things in this world, there is always “another side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what you are doing. “ The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. “
  • 4. INFORMATION YOU MUST LIMIT TO SHARE ONLINE PERSONAL | CONTACT | EDUCATION | FINANCIAL & LOCATION INFORMATION
  • 5. TOPIC 10 COMMANDMENTS NETIQUETTE The Core Rules of Netiquette are excerpted from the book Netiquette by VIRGINIA SHEA.
  • 6. RULE NO. 1: REMEMBER THE HUMAN • You need to remember that you are talking to a real person when you are online. • The internet brings people together who would otherwise never meet. • Remember this saying when sending an email: “Would I say this to the person’s face.” RULE NO. 2: ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN REAL LIFE. • You need to behave the same way online that you do in real life. • You need to remember that you can get caught doing things you should not be doing online just like you can in real life. • You are still talking to a real person with feelings even though you can’t see them. 10 COMMANDMENTS OF NETIQUETTE
  • 7. RULE NO. 3: KNOW WHERE YOU ARE IN CYBERSPACE • Always take a look around when you enter a new domain when surfing the web. • Get a sense of what the discussion group is about before you join it. RULE NO. 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH • Remember people have other things to do besides read your email. • You are not the center of their world. • Keep your post and emails to minimum by saying what you want to say. • Remember everyone won’t answer your questions. 10 COMMANDMENTS OF NETIQUETTE
  • 8. RULE NO. 5: MAKE YOURSELF LOOK GOOD ONLINE • Be polite and pleasant to everyone. • Always check your spelling and grammar before posting. • Know what you are talking about and make sense saying it. RULE NO. 6: SHARE EXPERT KNOWLEDGE • Ask questions online • Share what you know online. • Post the answers to your questions online because someone may have the same question you do. 10 COMMANDMENTS OF NETIQUETTE
  • 9. RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL • Netiquette does not forgive flaming. • Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down. RULE NO. 8: RESPECT OTHER PEOPLE’S PRIVACY • Do not read other people’s mail without their permission. • Going through other people’s things could cost you, your job or you could even go to jail. • Not respecting other people’s privacy is a bad netiquette. 10 COMMANDMENTS OF NETIQUETTE
  • 10. RULE NO. 9: DONT ABUSE YOUR POWER • Do not take advantage of other people just because you have more knowledge or power than them. • Treat others as you would want them to treat you if the roles were reversed. RULE NO. 10: BE FORGIVING OF OTHER PEOPLE'S MISTAKE • Do not point out mistakes to people online. • Remember that you were once the new kid on the block. • You still need to have a good manners even though you are online and cannot see the person face to face. 10 COMMANDMENTS OF NETIQUETTE
  • 11. TOPIC Web-based threats, or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet . Web threats are made possible by end-user vulnerabilities, web service developers/operators, or web services themselves. INTERNET THREATS “ “
  • 12. malware Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. ❑ Terms for malicious software ❑ Any malicious code ❑ Harms devices and steal data virus A virus is a specific type of malware that self-replicates by inserting its code into other programs. ❑ One type of malware ❑ Must be triggered by a user ❑ Self-replicating All viruses are malware but not all types of malware are viruses.
  • 13. TROJAN A Trojan Horse Virus is a form of malware that installs into a computer pretending to be a reliable application. In order to try and access consumers' systems, an attacker will frequently utilize social engineering to conceal malicious malware in genuine applications. INTERNET THREATS | EXAMPLES ROGUE SECURITY SOFTWARE Rogue security software is a type of malicious software and online fraud that tricks consumers into thinking their computer has a virus and tries to persuade them to pay for a phony malware removal program that in fact installs malware on their computer.
  • 14. WORM A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. INTERNET THREATS | EXAMPLES Filipino Onel de Guzman, now 44, says he unleashed the Love Bug computer worm to steal passwords so he could access the internet without paying. Victims received an email attachment entitled LOVE-LETTER- FOR-YOU. It contained malicious code that would overwrite files, steal passwords, and automatically send copies of itself to all contacts in the victim's Microsoft Outlook address book. Within 24 hours, it was causing major problems across the globe, reportedly infecting 45 million machines. White, G. (2020, May 3). Love bug's creator tracked down to repair shop in Manila. BBC News. Retrieved September 17, 2021, from https://www.bbc.com/news/technology-52458765.
  • 15. SPYWARE Malicious software, often known as malware, such as spyware, is placed on a computer without the end user's knowledge. It intrudes, takes private information and internet usage data, and then passes it to third parties like advertising, data companies, or other users. This type of malware that is hard to detect. INTERNET THREATS | EXAMPLES KEYLOGGER The act of secretly recording the keys pressed on a keyboard such that the person using it is unaware that their actions are being watched is known as keystroke logging, also known as keylogging or keyboard capture. The person running the logging program can then get the data.
  • 16. ADWARE Adware, commonly referred to as advertisement-supported software, makes money for its creators by displaying banner ads on your screen, typically inside of a web browser. Although it is frequently made for desktops, adware can also be discovered on mobile devices. Some types of adware are extremely manipulative and provide a backdoor for dangerous software. INTERNET THREATS | EXAMPLES SPAM Malspam is an abbreviation for "malware spam" or "malicious spam," which refers to spam messages that include malware. When readers open an email attachment or click on a link, they often download malware such as keyloggers, ransomware, Trojan horses, bots, info-stealers, cryptominers, spyware, and Trojans. PHISHING Is the deceiving attempt to obtain sensitive information such as usernames, passwords, credit card details often for malicious reasons.
  • 17. TOPIC Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks, and trade secrets. INTELLECTUAL PROPERTY RIGHTS “ “
  • 18. 4 TYPES OF INTELLECTUAL PROPERTY Patent Utility patent-It protects a process, manufacture, composition of matter, and a useful machine. Design patent-It protects the shape, appearance, pattern design, layout, and looks of a product. The protection is granted for a limited period, generally 20 years from the filing date of the application. Trade Secret A trade secret is any valuable information that is not publicly known (a well guarded secret)e.g.,. ingredients used in their food products, business methods, customer data. Trade secret protection is not limited in time (patents last in general for up to 20 years). It may continue indefinitely as long as the secret is not revealed to the public; Copyright Copyright protects the original work of authorship. Such works are literature, drawings, paintings, songs, music, computer software, films, photos, web content. The time limit should be equal to or longer than 50 years after the creator’s death. Longer periods of protection may however be provided at the national level. Trademark A trademark offers legal protection for logo, design, symbol, phrase, wordmarks, or a combination of those that represents a source of goods or services. The term of trademark registration can vary but is usually ten years. It can be renewed indefinitely on payment of additional fees.
  • 19. PLAGIARISM Plagiarism is using someone else's work or ideas without giving proper credit. ❑ Not a legal term ❑ Academic crime ❑ Claiming ownership of someone else’s creative work ❑ Not punishable by government, but may be by academic COPYRIGHT INFRIGEMENT Copyright infringement includes the unauthorized or unlicensed copying of a work subject to copyright. ❑ Legal term ❑ Civil crime ❑ Unauthorized used of someone else’s creative work ❑ Monetary damage for infringement COPYRIGHT INFIGEMENT & PLAGIARISM
  • 20. TOPIC Fair Use means that an intellectual property may be used without consent as long as it is used in Fair Uses of Copyrighted Material WHAT IS FAIR USE ❑Criticism ❑Comment ❑News reporting ❑Teaching ▪ Includes making copies for use in the classroom ❑Scholarship and research ❑Parody
  • 21. TOPIC “ Utilize the Internet as a tool for reliable information gathering and research to best meet particular class objectives or solve a situation. Students will use search engines more effectively. They can have a deeper understanding of search strategies, in particular, that will produce results that are helpful for their academic work and career of choice. “ CONTEXTUALIZED ONLINE SEARCH & RESEARCH SKILLS
  • 22. EVALUATING INFORMATION Accuracy Content is grammatically correct, verifiable and cited when necessary Author Defines who created the content, the individual or group’s credential/expertise and provides contact information. Currency Information is current & updated frequently. Fairness Content is balanced, presenting all sides of an issue and multiple points of view. Relevance Content is relevant to your topic or research. Search Engine Search Engines are programs that look for documents based from specified keywords and return these documents where the keyword were found.
  • 23. THE MADONNA SEE HOW MUCH A SINGLE WORD MAKES A BIG DIFFERENCE? LET'S SEARCH FOR MADONNA(PICTURE OF JESUS & MARY). MADONNA
  • 24. ONLINE SEARCH TIPS: USING GOOGLE LIKE A PRO ASTERISK: • Using * (asterisk) to fill the missing word or phrases • In the search bar just type how to * computer QUOTATION: • Use " " (quotation) to search for exact word or phrases. • In the search bar just type "Artificial Intelligence" SITE: • Using site: to search with in specific website • In the search bar just type: site: instagram.com computer HYPHEN: • Using - (hyphen) to exclude word or phrases • In the search bar just type Learn Programming - Java
  • 25. ONLINE SEARCH TIPS: USING GOOGLE LIKE A PRO PLUS: • Use + to search pages that contain both words • In the search bar just type HTML + CSS LINK: • Use link to search for a page that is link to another page • In the search bar just type link: fatima.edu.ph RANGE: • Use ... (range) to search with in a range of numbers • In the search bar just type Evolution 2000 ... 2021