Empowerment Technologies: ICT: 2nd Sem - 3rd Grading
Empowerment Technologies: ICT: 2nd Sem - 3rd Grading
Empowerment Technologies: ICT: 2nd Sem - 3rd Grading
TECHNOLOGIES:
ICT
2nd Sem - 3rd Grading
Lesson 2
Rules in
Netiquette
Online Safety and Security
Risky information to share
1. First name 6. Name of parents
2. Last name 7. Name of your siblings
3. Middle name 8. Home phone number
4. Current and previous schools 9. Your address
5. Your cellphone number 10. Your birthday
vInternet - defined as the information
superhighway.
vmeans that anyone has access to this
highway, can place information and can
grab information.
vThis is why social networking sites like
Facebook continue to improve their security
features.
Tips to Stay Safe Online
1. Be mindful of what you share online and
what site you share it to.
2. Do not just accept terms and conditions;
read it.
3. Check out the privacy policy page of a
website to learn how the website handles the
information you share.
4. Know the security features of the social
networking site you use. By keeping your profile
picture private, search engines will not be able to
scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
Browsing in “incognito (or private) mode”, a feature
of the browser, will not protect you from the
hackers.
7. Do not talk to strangers whether online or
face-to-face.
8. Never post anything about a future
vacation. It is similar to posting, “Rob my
house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus
software on your computer. Use only
one antivirus software to avoid conflicts.
12. If you have a Wi-Fi at home, make it
a private network by adding a password.
13. Avoid downloading anything from
untrusted websites. You are most vulnerable
in peer-to-peer dowloads (torrents) as the
download is most likely not monitored by the
site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious
emails.
Internet Threats
1. Malware - malicious software
a. Virus - malicious program designed to
replicate itself and transfer from one
computer to another either through the
Internet and local networks or data storage
like flash drives and CDs.
b. Worm - malicious program that transfers from one
computer to another by any type of means. Often uses
a computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a
Filipino.
c. Trojan - a malicious program that is disguised as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get
your information.
*Rogue security software - tricks the user into
posing that it is a security software. It asks the user
to pay to improve his/her security but in reality,
they are not protected at all.
d. Spyware - a program that runs in the
background without you knowing it (thus called
“spy”). It has the ability to monitor what you are
currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke
done by the users. This is done to steal their
password or any other sensitive information.
It can record email, messages, or any
information you type using your keyboard.
e. Adware - a program designed to send you
advertisements, mostly as pop-ups.
2. Spam - unwanted email mostly from bots or
advertisers. It can be used to send malware.
3. Phishing - its goal is to acquire sensitive personal
information like passwords and credit card details. This
is done by sending you an email that will direct the user
to visit a website and asked to update his/her username,
password, credit card or personal information.
*Pharming - more complicated way of phishing where
it exploits the DNS (Domain Name Service) system.
Protecting Reputations Online
vEmbarassing moments are captured using any
device and worse is that people can easily upload
it to the Internet, where it can be stored forever.
vThis could impact not only your reputation but
also the people around you.
vOnce you post something over the Internet,
Search Engines keep them in their archives for
search results.
Think Before You Click
1. Before you post something on the web,
ask these questions to yourself:
üWould you want your parents or
grandparents to see it?
üWould you want your future boss to see it?
2. Your friends depend on you to protect their reputation
online. Talk to your friends about this serious
responsibility.
3. Set your post to “private”. In this way, search engines
will not be able to scan that post.
4. Avoid using names. Names are easy for search
engines to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it down or
report it as inappropriate.
Copyright Infringement
ØIntellectual property - you create
something-- an idea, an invention, a form of
literary work or a research, you have the
right as to how it should be used by others.
ØCopyright law - includes your rights over
your work and anyone who uses it without
your consent is punished by law.
Tips that could help you avoid Copyright
Infringement
1. Understand - it means that you can
express something using your own words but
you should give credit to the source.
2. Be responsible - not a valid defense
against copyright. Be responsible enough to
know if something has a copyright.
3. Be creative - it is important to add your
own creative genius in everything that will be
credited to you.
4. Know the law - there are some limitations
to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of
the author) plus 50 years.
vThere are also provisions for “fair use”
which mean that an intellectual property
may be used without a consent as long
as it is used in commentaries, criticisms,
search engines, parodies, news reports,
research, library archiving, teaching and
education.
vAnother misconceptionis that fan-
fiction is not copyright infringement.
In reality, it is and some copyright
holders ignore them but they can
opt to use their rights.
Online Research
ØThe information that we need is
more likely already in the Internet. It
is just a matter of how to look for it
and how to use information from the
most credible source.
Tips in Conducting Online
Research
1. Have a question in mind - focus
on a question you want answered. If it
is a series of questions, start with one.
Never search everything on one go.
2. Narrow it down - Search Engines like
Google, Bing or Yahoo use several filters to
determine the most appropriate result for
you.
üExample: If you were to look for Tom
Sawyer the animation series, you would
better use the keywords “Tom Sawyer
animation” rather than just “Tom Sawyer”
3. Advanced Search - the
best way to filter
information you get from
search engines is by using
the advanced search.
- this will allow you to filter
out information you do not
needed.
Microsoft Search Engine Bing Keywords &
Symbols for Advanced Search
Symbol Function
+ Finds web pages that contain all the terms that are preceded by the + symbol; allows you to include terms
that are usually ignored.
““ Finds the exact words in a phrase.
AND or & Finds web pages that contain all the terms or phrases.