ICF-9-week-7-8 2
ICF-9-week-7-8 2
ICF-9-week-7-8 2
EDUCATION (SPTVE)
ICF 9
Internet and Computing
Fundamentals
Protecting Yourself
MODULE 4 Using the Internet
Week 7 Accessing the Internet in a Legal and Safe
Manner
What Is It?
Restricting Access
For the home or school user, several companies provide special software to restrict
access to Internet, or at least to certain types of sites on Internet
Internet filter software can be used to block access based on keywords entered
into software
Could be set up on computers to prevent access to questionable sites at any time
On personal level, can provide certain level of access control by setting options on
browser
Copyright
Libel
When one makes untrue statement in public that defames another person’s character
or reputation
Does not matter whether libelous statement made verbally or in print
Ethically, libel is wrong under any circumstances
Treat libel in the same manner as you would with rumors; don’t start and don’t listen or
respond to any
Plagiarism
When you use information created by another person and present it as if it were your
own
Stealing intellectual property from someone else
If must use information Internet, use in its original form and reference site where you
found information
Always try to cite sources where you found information and author of that product or
service
Give credit where credit is due — with the originator!
Phishing – Internet pirates steal personal financial information with a new type of internet
piracy , pronounced as “fishing” and that’s exactly what these thieves are doing fishing
for your personal financial information.
Unethical Behavior
Some actions not directly illegal but nevertheless considered unethical behavior
Always keep the golden rule of Netiquette (and real life) in mind: do unto others as
you would have them do unto you!
What I Can Do ?
Activity 1: Read and identify the correct answer for each statement below:
Plagiarism Filter
1. Phishing into another computer with intent to destroy or cripple company’s business.
2. People can pretend to be someone else while working online as way of committing crimes.
3. Always keep the golden rule of Netiquette (and real life) in mind: do unto others as you
would have them do unto you!
4. Filter attacks through websites, emails, phone calls, texts . IP addresses and servers.
5. Trademarked item displays GT symbol next to it.
Assessment
Multiple Choice: Read the sentences below and write the correct letter of your choice.
Use a separate paper for your answer.
1. What term is referred to the protection of any material, published or unpublished, created
by individual.
A. Trademark B. Patency C. Restriction D. Copyright
2. Rowena copied information created by another person and take it as her own. What
ethical issue is described?
A. Hacking B. Plagiarism C. Controlling D. Spoofing
3. Many schools control students’ access to computers and the internet through the use of…
A. Password B. Filters C. Firewall D. All of the above
4. When is it acceptable to use information found in the internet?
A. When you copy data for a report and claim it as your own.
B. When you are granted fair use by a company to use a graphic from their website.
C. When you copy a logo from a website and change the colors to make it your own
D. When you download music from a website that does not charge for copyright
material.
REFERENCE
ICF 9 MODULE – LIVING ONLINE
www.google.com
MODULE 4 Looking at the Internet
TOPIC 8 Protecting Yourself
What Is It?
As online communication and social media connect us to more and more people, and as
various entities collect (and reveal) more and more information about us, a chorus of
commentators proclaims that we need privacy—now more than ever
When it comes to privacy and accountability, people always demand the former for
themselves and the latter for everyone else." -- David Brin
"The principles of privacy and data protection must be balanced against additional societal
values such as public health, national security and law enforcement, environmental
protection, and economic efficiency." -- Omer Tene and Jules Polonetsky
What is cybercrime?
Cybercrime is any crime that takes place online or primarily online. Cybercriminals often
commit crimes by targeting computer networks or devices. Cybercrime can range from
security breaches to identity theft.
Other cybercrimes include things like “revenge porn,” cyber-stalking, harassment, bullying,
and child sexual exploitation.
Terrorists collaborate on the internet, moving terrorist activities and crimes into cyberspace.
How to protect yourself against cybercrime
Anyone using the internet should exercise some basic precautions. Here are 11 tips you can
use to help protect yourself against the range of cybercrimes out there.
1. Use a full-service internet security suite
For instance, Norton Security provides real-time protection against existing and emerging
malware including ransomware and viruses, and helps protect your private and financial
information when you go online.
2. Use strong passwords
Don’t repeat your passwords on different sites, and change your passwords regularly. Make
them complex. That don’t repeat your passwords on different sites, and change your
passwords regularly. Make them complex. That means using a combination of at least 10
letters, numbers, and symbols. A password management application can help you to keep
your passwords locked down.
3. Keep your software updated
This is especially important with your operating systems and internet security software.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access to
your system. Patching those exploits and flaws can make it less likely that you’ll become a
cybercrime target.
4. Manage your social media settings
Keep your personal and private information locked down. Social engineering cybercriminals
can often get your personal information with just a few data points, so the less you share
publicly, the better. For instance, if you post your pet’s name or reveal your mother’s maiden
name, you might expose the answers to two common security questions.
5. Strengthen your home network
It’s a good idea to start with a strong encryption password as well as a virtual private
network. A VPN will encrypt all traffic leaving your devices until it arrives at its destination. If
cybercriminals do manage to hack your communication line, they won’t intercept anything but
encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi network, whether
it’s in a library, café, hotel, or airport.
6. Talk to your children about the internet
You can teach your kids about acceptable use of the internet without shutting down
communication channels. Make sure they know that they can come to you if they’re
experiencing any kind of online harassment, stalking, or bullying.
7. Keep up to date on major security breaches
If you do business with a merchant or have an account on a website that’s been impacted by
a security breach, find out what information the hackers accessed and change your
password immediately.
8. Take measures to help protect yourself against identity theft
Identity theft occurs when someone wrongfully obtains your personal data in a way that
involves fraud or deception, typically for economic gain. How? You might be tricked into
giving personal information over the internet, for instance, or a thief might steal your mail to
access account information. That’s why it’s important to guard your personal data. A VPN —
short for virtual private network — can also help to protect the data you send and receive
online, especially when accessing the internet on public Wi-Fi.
9. Know that identity theft can happen anywhere
It’s smart to know how to protect your identity even when traveling. There are a lot of things
you can do to help keep criminals from getting your private information on the road. These
include keeping your travel plans off social media and being using a VPN when accessing
the internet over your hotel’s Wi-Fi network.
10. Keep an eye on the kids
Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect
them against identity theft. Identity thieves often target children because their Social Security
number and credit histories frequently represent a clean slate. You can help guard against
identity theft by being careful when sharing your child’s personal information. It’s also smart
to know what to look for that might suggest your child’s identity has been compromised.
11. Know what to do if you become a victim
If you believe that you’ve become a victim of a cybercrime, you need to alert the local police
and, in some cases,. Your report may assist authorities in their investigations or may help to
thwart criminals from taking advantage of other people in the future. If you think
cybercriminals have stolen your identity. These are among the steps you should consider.
• Contact the companies and banks where you know fraud occurred.
• Place fraud alerts and get your credit reports.
• Report identity theft to the NTC.
Protecting Yourself
Who owns any original work you do on public computer?
In general, if you work on something personal during company time on company
computer, because computer belongs to company, material created also belongs to
company
Same principles apply to any work you do on school computer
You are responsible to ensure you are not violating rules in any way
Consider ethics as reflection of what you may be doing online
If not aware of rules and guidelines, always ask someone who might have an answer
or lead you to where you might find information
Buying Online
Do not ever give credit card information indiscriminately
Be sure web site is valid company with good reputation
If company offers deal that seems too good to be true, research that deal
If receive e-mail or see advertisement about contributing to worthy cause, research
and check validity of charity or cause
Do not share any login ids or passwords with anyone else
Do not switch information with anyone you chat with online
Switch between login id’s and passwords with different sites
For sites where you purchase frequently, go to that site occasionally and change
profile information and password
Consumables
Refer to items such as ink cartridges, toner cartridges, paper, disks, CDs, non-
working or old computer components, etc.
Whenever possible, dispose of consumables in most environmentally friendly manner
If have old computer that still works, consider donating to charitable organization who
may be able to use it
May also want to look at refilling ink cartridges
Check if there are any companies that can recycle old computer items safely
1. What is a cybercrime?
2. How will you protect your privacy from doing online using the Web?
3. Can you cite the different ways on how to protect ourselves from cybercrime?
What I Can Do ?
Activity 1: Be able to supply the correct ideas on how to protect ourselves from cybercrime. Fill in the
correct answer s on the What TO Do column.
Assessment
_____1. Delete cookies from system if begin to receive lot of junk mail.
_____2. One advantage of using Internet is ability to hide information shared by others.
_____3. Consider having separate e-mail address for non-personal items, and use alias
instead who you really are.
_____4. Be sure web site is Invalid company with good reputation.
_____5. Look for privacy statement or policy on web site and ignore it.
_____6. Do not share any login ids or passwords with anyone else.
_____7. Consider ethics as reflection of what you may be doing online.
_____8. Copy your passwords on different sites, and change your passwords.
regularly.
_____9. It’s smart to know how to protect your identity even when traveling.
_____10. You can switch information with anyone you chat with online.
REFERENCE
ICF 9 MODULE – LIVING ONLINE
google.com/ Wikipedia.com
www.google.com
KEY ANSWER
Week 7
Activity 1:
1. Filter
2. Plagiarism
3. Spoofing
4. Libel
5. Copyright
Activity 2:
1. False .
2. True ` .
3. True .
4. False .
5. False
Assessment
1. D 6. B
2. B 7. A
3. D 8. A
4. C 9. C
5. B 10. C
Week 8
Assessment:
1. T
2. F
3. T
4. F
5. F
6. T
7. T
8. F
9. T
10.F
MA. RUBY P. LEDESMA
Teacher III, TVE Dept.- DMLMHS
The Writer