Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Netiquette: Research On The Following

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Assignment no. 3 8.

Be Careful What You Post


Research on the following: The internet does not have a delete key, contrary to the popular
belief. Make sure that you will not be regretting a post because it might
>Netiquette
not be taken back
is short for "Internet etiquette." Just like etiquette is a code of polite
9. Be Careful Who You Meet Online
behavior in society, netiquette is a code of good behavior on the Internet.
Catfishing is a popular cybercrime where hackers use fake accounts
>Tips to stay safe online (Kaspersky.com)
to increase their profits.
1. Keep Personal Information Professional and Limited
10. Keep Your Antivirus Program Up To Date
There is no need to broadcast personal information such as home
Antiviruses makes sure your device can sort of fight back against
address and relationship status online.
the latest viruses and malwares.
2. Keep Your Privacy Settings On
>Information to be shared and not be shared online
As much as marketers use search histories for offers, so are hackers.
The internet is a place of sharing and interaction. However, too
We can change our privacy settings in various websites too.
much sharing may lead to bad circumstances. Here are top 5 things not
3. Practice Safe Browsing to share online according to trend micro:

Resist the urge to click on suspicious and dangerous sites, for it may 1. Confidential information about your identity – This includes your
be a bait for cybercrimes address, phone number, social security number, and birth date.
4. Make Sure Your Internet Connection is Secure 2. Financial information – includes necessary online banking
information.
Refrain from inputting crucial information (e.g. bank info.) while
connected to unsecure internet connections such as public wi-fi. 3. Your schedule

5. Be Careful What You Download 4. Work information – You don’t want to reveal confidential
information about your company or clients, and meddle with your
Do not download suspicious apps for it can be a malware, a harmful workmate’s personal lives.
software for users.
5. Passwords or information that could be clues to your password –
6. Choose Strong Passwords Don’t post information that could allow a scammer to figure out your
A unique password is harder to demystify for hackers and intruders. password.

7. Make Online Purchases From Secure Sites


Make sure that you shop from secure websites, so that critical
personal information will not be leaked to numerous internet thieves.
>Define the following: Check your search results for anything that may be damaging for your
reputation. If you spotted one, you can try to contact the site to have it
A. Malware- or malicious software, is any program or file that is
removed. If not, publish new content that can appear at the top of the
harmful to a computer user
list.
B. Spam- irrelevant or inappropriate messages sent on the Internet to a
2. Set up a comprehensive Google Alert.
large number of recipients.
This system may help you in tracking published articles containing your
C. Phishing- he fraudulent practice of sending emails purporting to be
full name and/or your business.
from reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers. 3. Take advantage of people search tools.
D. Virus- is a malicious software program loaded onto a user's computer Ask people search tools like pipl.com or whitepages.com to remove
without the user's knowledge and performs malicious actions. some information from your profile when you think it is revealing too
much.
E. Worm- is a type of malicious software program whose primary
function is to infect other computers while remaining active on infected 4. Don’t allow anyone to tag you in pictures that might damage your
systems. reputation.
F. Trojan- (or Trojan horse) is a type of malware that is often disguised Inappropriate or private photos should not be leaked online, so
as legitimate software. It is any malware which misleads users of its true communicate with the person who tagged you if you feel uncomfortable
intent.
5. Think twice before you post.
G. Spyware- software that enables a user to obtain covert information
Do not post negative comments against the people around you and make
about another's computer activities by transmitting data covertly from
sure your posts are aligned to your ‘brand name’.
their hard drive.
H. Keylogger- s a type of surveillance software that once installed on a
system, has the capability to record every keystroke made on that >Things you might want to consider before posting something over the
system. This is usually used to obtain personal information from user. internet (according to: icsi)
I. Adware- (or advertising-supported software) is free computer 1. Who can see/read this post? Public posts can be seen by everybody,
software that contains commercial advertisements. E.g. games so make sure it is appropriate.
2. Will my post offend people, and am I okay with the potential results
of offending people? If the information in this post is shared with people
>How to protect your reputation online?
I didn't anticipate sharing it with, will that cause any problems?
Here are a few tips from All Business on how one can protect his
3. Is there hidden data (such as geotags in photos/video, for example)
reputation when searched online:
included in my post? Is it okay to share that information?
1. Conduct a simple Google search.
4. Knowing that this information will still exist online decades in the
future, do I really want to share it?
5. Are you sharing information about somebody else? Think about it:
How would you feel if somebody shared this information about you?
Consider asking for permission after discussing 1-4

You might also like