Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Etech Q1M2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1

PRINCE OF PEACE COLLEGE, INC.


Balete, Poblacion, Puerto Galera, Oriental Mindoro

EMPOWERMENT TECHNOLOGIES
12
Quarter 1 – Module 2
Online Safety, Security, Ethics
and Etiquette Standards

Prepared by

Mrs. Mary Grace B. Pacultad


ETECH Teacher
Submitted to

Yolanda L. Manongsong, MaEd


School Principal

i
What I Need to Know

This module was designed and written with you in mind. It is here to
help you master the context of Empowerment Technologies. It contains
varied activities that can help you as a Senior High School student to
succeed in environments that require the use of computer and the
Internet.
The module contains lessons in Online Safety, Security, Ethics, and
Etiquette Standards which allows students to understand the world of ICT.
Happy learning!

MOST ESSENTIAL LEARNING COMPETENCIES:


 apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific
professional tracks
(CS_ICT11/12-ICTPT-Ia-b- 2)

Smart Check - up

Direction: Write True if you agree or False if you do not agree with the
statements below.

1. Add someone in Facebook even if you don’t know the person to


have many friends.
2. Read the terms and conditions before accepting it.
3. You can share your password with your sister.
4. Do not talk to strangers.
5. Only download music or video from a trusted website.
6. Letting people know your birthday in facebook is a must if you
want to get many gifts.
7. You can use a pirated software for personal use only.
8. Avoid replying to negative comments with more negative comments.
9. It is okay to share photos or videos of your friend in your social
media account.
10. You should not add a password to your Wifi at home.
11. Be mindful of what you share and what site you share it to.
12. Install many antivirus to ensure protection to your computer.
13. There is a danger for posting future vacation.
14. Avoid logging in to free WIFI.
15. It is okay to open any attachments or clicking ads if you have
an antivirus in your computer.

Charge - up

What happens in a minute in the Internet?

https://www.capcitycreative.ca/happens-internet-minute-infographic/
This picture shows the speed at which the Internet is changing the
world. The sites we visit are so overwhelmingly popular to both adults and
children. The online world is increasingly integrated into our daily lives.
The Internet, like the physical world, maybe safe or unsafe
depending on our habits. Sometimes, we do not pay much attention about
the information that we share online.
Are you safe and secured online? Using the table below, identify
which among the types of information have you shared or not shared?

Type of Information Share Not Shared


d
First name
Last name
Middle name
Current and
previous schools
Cellphone Number
Name of your parents
Name of your siblings
Address
Home phone number
Birthday
You probably answered shared in the first two items. If that is the
case. Try using a search engine like google then type your first and last
name. Did you get links to your profile page? Is there any danger of being
found by search engines?

Knowledge Bank

Online Safety, Security, and Etiquette Standards


The Internet is defined as the information superhighway. This means
that anyone has access to this highway, can place information, and can
grab that information. The more information you share online, the higher
the risk. Risk such as identity theft, phishing, malware infections, and the
likes. That is why Facebook continues to improve their security features.
Tips to Stay Safe Online
Here are some tips to help you stay safe when using the Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone. Treat your password like a
toothbrush. Don’t let anybody use it and get a new one every six
months.
6. Avoid logging in to public networks/Wi-Fi. One of the biggest threats
with free WiFi is the ability for hackers to position themselves
between you and the connection point. So, instead of talking
directly with the hotspot, you end up sending your information to
the hacker Any
information you share or access on these networks is as good as gone.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation. You are inviting the
burglar to rob your house at that date.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use
only one antivirus software to avoid conflict.
12. If you have a Wi-Fi at home, make it a private network by adding a
password.
13. Avoid downloading anything from untrusted websites. Some
websites carry malwares that can infect your computer.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
It is your responsibility to secure your information online because
there are hackers who can find a backdoor even if your profile is already
set to private. A hacker may steal information to hurt people via identity
theft, damage or bring down systems and, often, hold those systems
hostage to collect ransom.
Internet
Threats Whilst the internet is a fantastic place
forthcommunication
ne so aw and information,
ere are many malicious threats you
ed to dodge along the way. Here
are me of the threats you should
be are of when using the Internet.
1. Spam
Most of our email accounts
https://
504-new-cyber-threats-are-being-populated-on-the-internet/ come with a ‘Spam’ or ‘Junk’
folder. Spam emails are a huge
issue, with more than 50% of emails being syphoned into these folders.
Aside from being an annoyance, spam emails are not a direct threat, but,
many can contain malware.

2. Adware
Adware is a type of malware software that displays unwanted ads
when a user is surfing the internet. It is often included in many shareware
or freeware downloads as a legitimate way of generating advertising
revenues that help fund development. However, some websites are
infected with malicious adware that are automatically downloaded to your
computer.

3. Trojan
Trojans leave your computer completely unprotected, which can mean
that hackers can steal any data from your system. Trojans often present
themselves as harmless computer programs so that hackers can
penetrate your computer without being detected.

4. Virus
One of the most talked about internet threats is a virus. Viruses
usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate. Viruses are often attached to files for
download, shared via CDs, DVDs, and USB sticks, or loaded on to
computers by opening infected email attachments.

5. Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a
worm, it will likely send itself to every email address logged in your
system. To the receiver, your email will appear harmless, until they open
it and are infected by the same worm.

6. Phishing
In its simplest terms, phishing is a form of fraudulent activity. More
often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank. These emails are sent to acquire people’s
passwords and credit card details.
7. Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files.
Once installed on your computer, spyware can monitor your keystrokes,
read and delete your files, reformat your hard drive, and access your
applications. Whoever is controlling the spyware has access to your
personal details without you even knowing.

8. Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries,
such as bank card details and passwords. Keylogging is often linked to
identity and intellectual property theft.

9. Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their
details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.

10.Rogue Security Software


This is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer and aims to
convince them to pay for a fake malware removal tool that
actually installs malware on their computer.

Netiquette
Netiquette is short for "Internet
etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good
behavior on the Internet. This includes several
aspects of the Internet, such as
email, social media, online chat, https://www.eu-in-the-
media.eu/index.php/meetings/item/15-
web forums, website comments, multiplayer
netiquette-and-online-awareness
gaming, and other types of online
communication.

While there is no official list of netiquette


rules
or guidelines, the general idea is to respect others online. Below are ten
examples of rules to follow for good netiquette:

1. Avoid posting inflammatory or offensive comments online


(a.k.a flaming).
2. Respect others' privacy by not sharing personal information,
photos, or videos that another person may not want published
online.
3. Never spam others by sending large amounts of unsolicited email.
4. Show good sportsmanship when playing online games, whether
you win or lose.
5. Don't troll people in web forums or website comments by
repeatedly nagging or annoying them.
6. Stick to the topic when posting in online forums or when
commenting on photos or videos, such as YouTube or Facebook
comments.
7. Don't swear or use offensive language.
8. Avoid replying to negative comments with more negative
comments. Instead, break the cycle with a positive post.
9. If someone asks a question and you know the answer, offer to help.
10. Thank others who help you online.
The Internet provides a sense of anonymity since you often do not see
or hear the people with whom you are communicating online. But that is
not an excuse for having poor manners or posting incendiary comments.
While some users may feel like they can hide behind their keyboard or
smartphone when posting online, the fact is they are still the ones
publishing the content. Remember – if you post offensive remarks online
and the veil of anonymity is lifted, you will have to answer for the
comments you made.

In summary, good netiquette benefits both you and others on the


Internet. Posting a positive comment rather than a negative one just
might make someone's day.

Skill Exploration
Instruction: Make a journal to manifest your understanding about the
topic. You can start by following the format below. Write it in your

notebook.
Your Turn to Shine
Create a poster promoting “Think before you click”. Post it in your
social media site as an awareness program for your friends. Note: Tag
your Teacher,(If internet connection is not available, do your poster on a
bond paper.)

Rubric

CATEGORY 4 3 2 1
Require The poster All required All but 1 of the Several
d includes all elements are required required
Element required included on the elements are elements
s elements as poster. included on the were missing.
well as poster.
additional
information.
Labels All items of Almost all items Many items of Labels are
importance on of importance on importance on too small to
the poster are the poster are the poster are view OR no
clearly labeled clearly labeled clearly labeled important
with labels with labels that with labels that items were
that can be can be read from can be read labeled.
read from at at least 3 feet from at least 3
least 3 away. feet
feet away. away.
Graphics All graphics All graphics are All graphics Graphics do
- are related to related to the relate to the not relate
Relevanc the topic and topic and most topic. One or to the topic
e make it easier make it easier to two borrowed OR several
to understand. understand. Some graphics have a borrowed
All borrowed borrowed source citation. graphics do
graphics have graphics have a not have a
a source source citation. source
citation. citation.
Layout and The poster is The poster is The poster is The poster is
design exceptionally attractive in acceptably distractingly
attractive in terms of design, attractive messy or
terms of layout, and though it may very poorly
design, layout, neatness. be a bit messy. designed. It
and is
neatness. not attractive.
Organizatio There are no There are 1-2 There are 3-4 There are
n grammatical/m grammatical/me grammatical/me more than 4
echanical c hanical c hanical grammatical/
mistakes on mistakes on the mistakes on the mechanical
the poster. poster.
poster.
mistakes
on the
poster

Check What you Know

I. Match Column A with Column B. Read each item carefully and


use your notebook to write your answers.

Answers A B
1. It displays unwanted ads when a a. Spyware
user is surfing the internet. b. Rogue
2. This is a form of malicious security
software and internet fraud that software
misleads users into believing c. Adware
there is a virus on their computer d. Worm
and convince them to pay for a e. Keylogging
fake f. Netiquette
malware removal tool. g. Virus
3. They present themselves as h. Trojans
harmless computer programs so i. Spam
that hackers can penetrate your
j. Phishing
computer without being detected.
4. It can monitor your keystrokes, k. Pharmers
read and delete your files, l. Internet
reformat your hard drive, and
access your applications.
5. These are unwanted emails.
6. They usually make their way on to
a computer via a malicious email
attachment or USB stick.
7. They are often attached to files
for download, shared via CDs,
DVDs, and USB sticks, or loaded
on to computers by opening
infected
email attachments.
8. These are official-looking
emails that are sent
impersonating a well-known
provider, such as a
bank.
9. This is often linked to identity and
intellectual property theft.
10. A code of good behavior on
the Internet.
11. This is defined as an
information superhighway.
12. They create web pages
mimicking that of a trustworthy
business, such as an online
banking log-in
page.
13. This records a user’s keyboard
input.
14. This is not a direct threat but
many can contain malware.
15. It leaves your computer
completely unprotected.

Take the Challenge

Research about cybercrime news. Using any video-recording device,


report it as if you were a newscaster. Save your file and send it to our e-
classroom.

You might also like