Etech Q1M2
Etech Q1M2
Etech Q1M2
EMPOWERMENT TECHNOLOGIES
12
Quarter 1 – Module 2
Online Safety, Security, Ethics
and Etiquette Standards
Prepared by
i
What I Need to Know
This module was designed and written with you in mind. It is here to
help you master the context of Empowerment Technologies. It contains
varied activities that can help you as a Senior High School student to
succeed in environments that require the use of computer and the
Internet.
The module contains lessons in Online Safety, Security, Ethics, and
Etiquette Standards which allows students to understand the world of ICT.
Happy learning!
Smart Check - up
Direction: Write True if you agree or False if you do not agree with the
statements below.
Charge - up
https://www.capcitycreative.ca/happens-internet-minute-infographic/
This picture shows the speed at which the Internet is changing the
world. The sites we visit are so overwhelmingly popular to both adults and
children. The online world is increasingly integrated into our daily lives.
The Internet, like the physical world, maybe safe or unsafe
depending on our habits. Sometimes, we do not pay much attention about
the information that we share online.
Are you safe and secured online? Using the table below, identify
which among the types of information have you shared or not shared?
Knowledge Bank
2. Adware
Adware is a type of malware software that displays unwanted ads
when a user is surfing the internet. It is often included in many shareware
or freeware downloads as a legitimate way of generating advertising
revenues that help fund development. However, some websites are
infected with malicious adware that are automatically downloaded to your
computer.
3. Trojan
Trojans leave your computer completely unprotected, which can mean
that hackers can steal any data from your system. Trojans often present
themselves as harmless computer programs so that hackers can
penetrate your computer without being detected.
4. Virus
One of the most talked about internet threats is a virus. Viruses
usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate. Viruses are often attached to files for
download, shared via CDs, DVDs, and USB sticks, or loaded on to
computers by opening infected email attachments.
5. Worms
Worms usually make their way on to a computer via a malicious email
attachment or USB stick. Once your computer has been infected by a
worm, it will likely send itself to every email address logged in your
system. To the receiver, your email will appear harmless, until they open
it and are infected by the same worm.
6. Phishing
In its simplest terms, phishing is a form of fraudulent activity. More
often than not, official-looking emails are sent impersonating a well-known
provider, such as a bank. These emails are sent to acquire people’s
passwords and credit card details.
7. Spyware
Another form of malware is spyware. Spyware is an all-encompassing
internet nasty and is usually attached to pop-ups of downloadable files.
Once installed on your computer, spyware can monitor your keystrokes,
read and delete your files, reformat your hard drive, and access your
applications. Whoever is controlling the spyware has access to your
personal details without you even knowing.
8. Keyloggers
Similar to a part of spyware, keyloggers record a user’s keyboard
actions. Most keyloggers will be looking for distinguishable key entries,
such as bank card details and passwords. Keylogging is often linked to
identity and intellectual property theft.
9. Pharming
Pharming is a more complex version of phishing that exploits the DNS
system. Pharmers often create web pages mimicking that of a trustworthy
business, such as an online banking log-in page. Users will then enter their
details, thinking they are logging in to their usual service, and their details
will be stolen by the pharmer.
Netiquette
Netiquette is short for "Internet
etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good
behavior on the Internet. This includes several
aspects of the Internet, such as
email, social media, online chat, https://www.eu-in-the-
media.eu/index.php/meetings/item/15-
web forums, website comments, multiplayer
netiquette-and-online-awareness
gaming, and other types of online
communication.
Skill Exploration
Instruction: Make a journal to manifest your understanding about the
topic. You can start by following the format below. Write it in your
notebook.
Your Turn to Shine
Create a poster promoting “Think before you click”. Post it in your
social media site as an awareness program for your friends. Note: Tag
your Teacher,(If internet connection is not available, do your poster on a
bond paper.)
Rubric
CATEGORY 4 3 2 1
Require The poster All required All but 1 of the Several
d includes all elements are required required
Element required included on the elements are elements
s elements as poster. included on the were missing.
well as poster.
additional
information.
Labels All items of Almost all items Many items of Labels are
importance on of importance on importance on too small to
the poster are the poster are the poster are view OR no
clearly labeled clearly labeled clearly labeled important
with labels with labels that with labels that items were
that can be can be read from can be read labeled.
read from at at least 3 feet from at least 3
least 3 away. feet
feet away. away.
Graphics All graphics All graphics are All graphics Graphics do
- are related to related to the relate to the not relate
Relevanc the topic and topic and most topic. One or to the topic
e make it easier make it easier to two borrowed OR several
to understand. understand. Some graphics have a borrowed
All borrowed borrowed source citation. graphics do
graphics have graphics have a not have a
a source source citation. source
citation. citation.
Layout and The poster is The poster is The poster is The poster is
design exceptionally attractive in acceptably distractingly
attractive in terms of design, attractive messy or
terms of layout, and though it may very poorly
design, layout, neatness. be a bit messy. designed. It
and is
neatness. not attractive.
Organizatio There are no There are 1-2 There are 3-4 There are
n grammatical/m grammatical/me grammatical/me more than 4
echanical c hanical c hanical grammatical/
mistakes on mistakes on the mistakes on the mechanical
the poster. poster.
poster.
mistakes
on the
poster
Answers A B
1. It displays unwanted ads when a a. Spyware
user is surfing the internet. b. Rogue
2. This is a form of malicious security
software and internet fraud that software
misleads users into believing c. Adware
there is a virus on their computer d. Worm
and convince them to pay for a e. Keylogging
fake f. Netiquette
malware removal tool. g. Virus
3. They present themselves as h. Trojans
harmless computer programs so i. Spam
that hackers can penetrate your
j. Phishing
computer without being detected.
4. It can monitor your keystrokes, k. Pharmers
read and delete your files, l. Internet
reformat your hard drive, and
access your applications.
5. These are unwanted emails.
6. They usually make their way on to
a computer via a malicious email
attachment or USB stick.
7. They are often attached to files
for download, shared via CDs,
DVDs, and USB sticks, or loaded
on to computers by opening
infected
email attachments.
8. These are official-looking
emails that are sent
impersonating a well-known
provider, such as a
bank.
9. This is often linked to identity and
intellectual property theft.
10. A code of good behavior on
the Internet.
11. This is defined as an
information superhighway.
12. They create web pages
mimicking that of a trustworthy
business, such as an online
banking log-in
page.
13. This records a user’s keyboard
input.
14. This is not a direct threat but
many can contain malware.
15. It leaves your computer
completely unprotected.