Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
103 views2 pages

Empowerment Technology

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 2

Empowerment Technology

Lesson 2: Rules of Netiquette

Online Safety and Security


The internet, truly is a powerful tool. It can be used to promote business, gain new friends, and
stay in touch with the old ones.
TIPS TO STAY ONLINE
 Be mindful of what you share and what site you share it to.
 Do not just accept terms and conditions; read it.
 Check out the privacy policy page of a website.
 Know the security features of the social networking site you use.
 Do not share password with anyone.
 Avoid logging in to public networks/Wi-Fi.
 Do not talk to strangers whether online or face to face.
 Never post anything about future vacation.
 Add friends you know in real life.
 Avoid visiting untrusted website.
 Install and update an anti virus software on your computer.
 If you have a Wifi at home , make it a private network by adding password.
 Avoid downloading anything from untrusted websites.
 Buy the software; do not use pirated ones.
 Do not reply or click links from suspicious email.
Internet Threats

 Malware- stands for Malicious Software.


 Spam- unwanted email mostly from bots or advertisers.
 Phishing- its goal is to acquire sensitive personal information like passwords and credit
card details.
Malware
a. Virus- program designed to replicate itself and transfer from one computer to another.
b. Worm- a malicious program that transfers from one computer to another by any types of
means.
c. Trojan- a malicious program that is disguised as a useful program but once downloaded or
installed , leaves your PC unprotected and allows hacker to get you information.
d. Spyware- a software that ruins in the background without you knowing it.
 Keyloggers- used to record the keystroke done by the user.
e. Adware- a program designed to send you advertisements, mostly a pop-ups.
Protecting Reputations Online
In the past, doing something embarrassing was not much a big deal.Nowadays, embarrassing
moments are captured using any device you could imagine.
Copyright Infringement
 Intellectual Property
 Copyright Law
Copyright Page “No part of this book may be copied, reproduced”
 Understand- Copyright protect literary works, photographs paintings, drawing, films,
music choreography and sculptures.
 Be Responsible- even if a material does not say that it is copyrighted, it is not a valid
defense against copyright.
 Be Creative- ask yourself whether what you are making is something that came from you
or something made from somebody else creativity.
 Know the Law- there are some limitations to copyright laws.

Online Research
1. Have a question in mind- Focus on a question you want answered.
2. Narrow it down- Search engines like Google, Bing, or Yahoo use several filters to
determine the most appropriate result for you.
3. Advanced Search- The best way to filter information you get from search engines is by
using the advanced search.
4. Look for a credible sources- Some wikis, filled with updated information, are not a
credible source. When using wikis, check out the link of the cited texts.
5. Give credit- Give credit to the original author of the page or information. To properly site
a reference, you may use the format below.

You might also like