Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lormatet A. Sulsona: Prepared by

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Prepared by:

LORMATET A. SULSONA
What
happens in a
minute on
the Internet?
Netiquettes
Most Essential Learning Competencies (MELCs):

Apply online safety, security, ethics,


and etiquette standards and
practice in the use of ICTs as it would
relate to their specific
professional tracks.
(CS_ICT11/12-ICTPT-Ia-b- 2)
Objective of the day (OOTD)
At the end of this lesson, you will be able to:
1. determine the dangers of the internet
2. consider one’s safety when sharing
information on the internet
3. be responsible in the use of social
networking sites
Tips to Stay SAFE ONLINE

Be mindful of what Check out the


you share and what privacy policy
site you share it to. page of a
website.

Do not just Know the security


accept terms features of the
and conditions; social networking
read it. site you use.
Tips to Stay SAFE ONLINE

Passwords should Do not talk to


not be shared with strangers whether
anyone. online or face-to-
face.

Logging into Never post


public anything
networks/Wi-Fi is a about future
bad idea. vacation.
Tips to Stay SAFE ONLINE

Add friends you know On your computer,


in real life. install and update
antivirus software. To
avoid conflicts, use only
one antivirus software.

If you have a Wi-Fi


Avoid visiting at home, make it a
untrusted private network by
adding a
websites. password.
Tips to Stay SAFE ONLINE

Downloading anything Do not reply or


from untrusted
websites is a bad idea.
click links from
suspicious emails.

Buy the software;


do not use
pirated ones.
1. SPAM
- unwanted email mostly from bots or
advertisers. Can be used to send malware

2. ADWARE
- designed to send you advertisements,
mostly as pop-ups.
3. TROJAN
- disguised as a useful program but once downloaded or
installed, leaves your PC unprotected.
4. VIRUS
- designed to replicate itself and transfer from one
computer to another either through the internet or data
storages.
5. WORMS
- transfers from one computer
to another by any type of means.
It often uses a computer network
to spread itself.
6. PHISHING
- acquires sensitive information
by sending you an email that will
direct the user to visit a website
and be asked to update his
information.
7. SPYWARE
- programs that runs in the
background without you knowing.
It has the ability to monitor
what you are currently doing.
8. KEYLOGGERS
- which are similar to spyware,
record a user's keyboard operations.

9. PHARMING
- is a more sophisticated form of
phishing that takes advantage of the
DNS system. Pharmers frequently
construct web pages that look like
those of a reputable company, such
as an online banking log-in page.
10. ROGUE SECURITY SOFTWARE
- This is a form of malicious
software and internet fraud that
misleads users into believing
there is a virus on their computer
and aims to convince them to pay
for a fake malware removal tool
that actually, installs malware on
their computer.
Rule 1: Remember the Human

Rule 2: Adhere to the same standards of behavior online that


you follow in real life

Rule 3: Know where you are in cyberspace

Rule 4: Respect other people's time and bandwidth

Rule 5: Make yourself look good online


Rule 6: Share expert knowledge

Rule 7: Help keep flame wars under control

Rule 8: Respect other people's privacy

Rule 9: Don't abuse your power

Rule 10: Be forgiving of other people's mistakes

You might also like