Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lesson 2 Rules of Netiquette

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 4

TIPS TO STAY SAFE ONLINE - a malicious program designed to

replicate itself and transfer from one computer


- Be mindful of what you share online and what to another either through the internet and local
site you share it to. networks or data storage like flash drives and
CD’s.
- Do not just accept terms and conditions; read it.
WORM
- Check out the privacy policy page of a website
to learn how the website handles the information - a malicious program that transfers from
you share. one computer to another by any type of means.
Often, it uses a computer network to spread
- Know the security features of the social
itself.
networking site you use. By keeping your profile
private, search engines will not be able to scan your TROJAN
profile.
- A malicious program that is disguised as
- Do not share your password with anyone a useful program but once downloaded or
installed, leaves your PC unprotected and allows
- Avoid logging in to public networks/Wi-Fi.
hackers to get your information.
Browsing in private mode will not protect you from
hackers. ROGUE SECURITY SOFTWARE

- Do not talk to strangers whether online or face - tricks the user into posing that it is a
to face. security software. It asks the user to pay to
improve the security but in reality they are not
TIPS TO STAY SAFE ONLINE
protected at all.
- Never post anything about a future vacation. It
SPYWARE
is similar to posting, “Rob my house at this date”
- a program that runs in the background
- Add friends you know in real life.
without you knowing it. It has the ability to
- Avoid visiting untrusted websites. monitor what you are currently doing and typing
through keylogging.
- Install and update an antivirus software on your
computer. Use only one anti virus software to avoid KEYLOGGERS
conflicts.
- used to record the keystroke done by
- If you have a Wi-Fi at home, Make it a private the users. This is done to steal passwords or any
network by adding a password. sensitive information.

- Avoid downloading anything from untrusted ADWARE


websites. - a program designed to send you
- Buy the software; do not use pirated ones. advertisements, mostly as pop-ups.

INTERNET THREATS
- Do not reply or click links from suspicious
emails. SPAM
INTERNET THREATS - unwanted email mostly from bots or
advertisers.
MALWARE
- It can be used to send malware.
- stands for malicious software
PHISHING
VIRUS
- its goal is to acquire sensitive personal o Few programs running on their own
information like passwords and credit card
details. This is done by sending you an email o File multiplying/duplicating on its own
that will direct the use to visit a website and be
asked to update his/her username, password, o Files or programs that are new and
credit card or personal information. unknown

PHARMING o Denied access to files and folders

- a more complicated way of phishing o The sound of a hard drive in continuant


where it exploits the action

- DNS (Domain Name Service) System PROTECTING REPUTATIONS ONLINE

- Your online reputation is the information


WHAT IS ILOVEYOU VIRUS? – DEFINITION people find about you online, so hiding behind
privacy settings actually puts you at risk if
- The ILOVEYOU virus is a computer virus something negative were to come out about you
(or) worm. It’s spread through an email with a or your company. Make no mistake -- everyone
subject line that said “I love you” in 2000. is at risk of negative content online. Of the 75
percent of U.S. adults who Google themselves,
- ILOVEYOU is one of the most well-
nearly half say the results aren’t positive.
known and worst computer viruses of all time.
- The reason is simple. Anyone can write
HISTORY OF ILOVEYOU VIRUS
anything about you online, typically without
- In the third month of the year 1999, the consequence. A jealous competitor can
Melissa virus was circulated in the online space as an anonymously write a critical blog post or fill out
e-mail attachment. This fast-spreading macro virus a damning RipoffReport. An angry client can
when opened disabled a number of security features write a horrible review for your business without
in Word 97 or Word 2000. In the case of users who recourse.
had the MS Outlook e-mail program, aided the virus
to be resent to the first 50 people in each of the BULLYING
user’s address books. It created a havoc crippling
many computers across the globe!

- The ILOVEYOU virus was set free in the wild


from the Philipines very soon after the Melissa virus
issue was settled. It attacked tens of millions of
Windows PCs on and after 5th of May 2000. Notably,
while the ‘Melissa’ was a virus attack, the ILOVEYOU
digital menace came in the form of a worm. The
ILOVEYOU virus sometimes related to as Love Letter
or Love Bug, was triggered as an email message with
the subject line “ILOVEYOU” and the attachment
“LOVE-LETTER-FOR-YOU.txt.vbs”.

SIGNS OF A VIRUS INFECTION

- It is vital to know these signs and


symptoms to steer clear of the dangers-

o Comp performance is slower than usual

o Irrelevant pop-ups that keep coming


back to back
THINK BEFORE YOU CLICK
- here are things you might want to
consider before posting something over the
internet:
1. Would you want your parents or grandparents
see it? Future boss?

- Once you post something on the web,


you have no control of who sees your posts.

2. Your friends depend on you to protect their


reputation online. TIPS TO AVOID COPYRIGHT INFRINGEMENT

3. set your posts to “private”. In this way search UNDERSTAND


engines will not be able to scan your posts.
- Copyright protects literacy works,
4. Avoid using names, Names are easy for search photographs, paintings, drawings, films,
engines to scan. music/lyrics, choreography and sculptures, but
it generally does NOT protect underlying ideas
5. If you feel that a post can affect you or other’s
and facts. It means that you can express
reputation, ask the one who posted it to pull it down
something using your own words, but you
or down or report it as inappropriate.
should give credit to the source.
COPYRIGHT INFRINGEMENT
BE RESPONSIBLE
- Copyright infringement (colloquially - Even if a material does not say that is
referred to as piracy) is the use of works copyrighted, it is not a valid defense against
protected by copyright law without permission, copyright. Be responsible enough to know if
infringing certain exclusive rights granted to the something has a copyright.
copyright holder, such as the right to reproduce,
BE CREATIVE
distribute, display or perform the protected
- Ask yourself whether what you are
work, or to make derivative works.
making is something that came from you or
- The copyright holder is typically the something made from somebody else’s
work's creator, or a publisher or other business creativity. It is important to add your own
to whom copyright has been assigned. Copyright creative genius in everything that will be
holders routinely invoke legal and technological credited to you.
measures to prevent and penalize copyright
KNOW THE LAW
infringement.
- There are some limitations to copyright
- A copyright infringement is a violation of
laws. Seek permission first.
an individual or organization's copyright. It
describes the unauthorized use of copyrighted ONLINE RESEARCH
material, such as text, photos, videos, music,
software, and other original content. In the - The information we need is more likely
computer industry, copyright violations often already in the internet. It is just a matter of
refer to software programs and websites. how to look for it and how to use information
from the most CREDIBLE source.
1. Have a question in mind
2. Narrow it down
3. Advance Search
4. Look for a credible source ◦ Parentheses ()
5. Give credit
◦ Quotation Marks “”
TIPS FOR ADVANCE SEARCHING
◦ NOT + -
- In Microsoft search engine, Bing, you
can use certain keywords and symbols for your
advance search:
◦ AND &

Symbol Function ◦ OR |
+ Finds web pages that contain all the terms that
are preceded by the + symbol; allows you to include
terms that are usually ignored

“” Finds the exact words in a phrase

() Finds or excludes web pages that contains a


group of words

AND or & Finds web pages that contain all the


terms or phrases

NOT or - Excludes web pages that contain a term


or phrase

OR or | Finds web pages that contain either of the


terms or phrases

HOW BING SEARCH ENGINE WORKS

- By default, all searches are AND


searches

- You must capitalize the NOT and OR


functions. Otherwise, Bing will ignore them as
stop words; which are commonly occurring
words and numbers that are omitted to speed a
full-text search

- Stop words and all punctuation marks,


except for the symbols noted in the table are
ignored unless they are surrounded by
quotation marks or preceded by the + symbol.

- Only the first ten terms are used to get


search results

- Similar to the MDAS, whenever you


solve an arithmetic problem, term grouping and
Boolean functions are supported in the
following preferred order

You might also like