Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DIGITAL

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

DIGITAL/ CYBER

LITERACY
MODULE 9
Technology has been part of
everyone’s life, be it at home, in
school, or anywhere with every facet
of our undertaking. However, in many
instances, we may not be aware that
we have been misusing or abusing it.
DIGITAL LITERACY

Digital Literacy is an individual’s ability to access


both information and methods of communication
through technological tools, such as smartphones,
tablets, laptops, and desktop PCs. It focused on
digital skills and stand-alone computers, it’s focus
has shifted to network devices, including the
internet and the use of social media.
Cybersecurity is the practice of
protecting systems, networks,
and programs from digital
attacks. These cyberattacks are
CYBERSECURITY usually aimed at accessing,
changing or destroying
sensitive information, extorting
money from users, or
interrupting normal business
proceses.
 Monitor behavior on
social networks. Before Here are
posting or uploading some tips on
something online how to
 Keep devices safe protect
 Understand how best to yourself
use passwords against cyber
 Handle unsafe content
threats
 Consider safety for the
future
Citizenship is an old
value that is now
applied to a new
CYBER medium, the internet.
CITIZENSHIP Cyber citizenship
refers to being
responsible when
using the Internet.
It keeps the internet free from
hurtful statements.
It creates a culture of more reliable
information.
It gives provisions for people to be
Importance
given credit for what they have of Cyber
Citizenship
created.
More criminals or bullies can be
caught when kids are honest and
talk to adults.
It keeps information private.
THE TEN
COMMANDMENTS OF
TEACHER CYBER
CITIZENSHIP
1.Thou shall not post any personal matter, confidential
information and obscene pictures and messages online that
can be accessed by students and parents.
2.Thou shall not respond or thread to any personal message
created by students online other than those school-related.
3.Thou shall not lend or let students access your cellphone.
4.Thou shall not give your email password to students.
5.Thou shall not use concepts and information from texts and
references without the author’s citation.
6. Thou shall not express sentiments, disappointments and
disagreements against superiors, colleagues, students and their
parents using their social media account.
7. Thou shall not post to any social media account, for whatever
purposes, the pictures of students without their parents consent.
8. Thou shall not use data from internet sources in any lesson plans,
researches and requirements without the consent of the author.
9. Thou shall not give any personal data or other information to
anyone unless for specific purposes.
10. Thou shall not post any student data publicly online including
academic rankings,school records, class outputs and record of grades.
Internet safety, online safety
or cyber safety means trying
to be safe on the Internet. It
INTERNET is maximizing the user’s
personal safety and security
SAFETY risks to private information
and property associated
with using the internet.
Sensitive information,
such as personal
information, identity and
passwords are often INFORMATION
associated with personal SECURITY
property and privacy and
may present security
concerns if leaked.
COMMON CAUSES OF
INFORMATION SECURITY
BREACHES INCLUDE:
It is a common type of scam,
of which the scammers
disguise as a trustworthy
source in an attempt to
PHISHING obtain private information,
such as passwords, credit
card information, etc.
through the use of fake
websites that look identical
and legitimate.
These are schemes
that deceive the
users in various INTERNET
ways in an attempt SCAMS
to take advantage
of them.
It is a malicious
software disguise to
collect and transmit
MALWARE private information,
such as password
without the user’s
consent or
knowledge.
THE FOLLOWING ARE
COMMON THREATS TO
PERSONAL SAFETY
It is the use of the
internet or other
electronic means to
CYBERSTALKING stalk or harass an
individual, group or
organization through
false accusations,
defamation, slander and
libel.
It is the use of electronic
means, such as instant
messaging, social media, e-
mail and other forms of
online communication with
CYBERBULLYING
the intent to abuse,
intimidate or overpower an
individual or group.
1. INTERNET TROLLING
is a common form of
bullying over the
internet in an online CYBERBULLYING
community to elicit a TYPES
reaction, disruption or
intentionally provoke
and offend others
2. CYBERSTALKING is an
another form of bullying that
uses electronic
communication to stalk a CYBERBULLYING
victim and pose a credible TYPES
threat to harass him/her.
It is the act of engaging an
underage minor into
appropriate sexual
relationships through the
ONLINE internet. Online predators
may attempt to initiate and
PREDATION seduce minors into
relationships through the use
of chat rooms or internet
forums.
Various websites on
the internet contain
material that may
deem offensive, OBSCENE/OFFENSIVE
distasteful or explicit CONTENT
which may often not
be of the user’s
liking.
It is the use of webcams
for flirting and cybersex.
Often, this involves a
cybercriminal posing as
SEXTORTION someone else, such as an
attractive person initiating
communication of a
sexual nature with the
victim.
COMPUTER THREATS
AND
FIXING SOLUTIONS
Cybercrime is now becoming alarming in the
life of every individual and the organization
as they intend to steal information that they
sell or trade.
WAYS TO ENSURE
THAT COMPUTER
NETWORKS CAN
BE PROTECTED
Install anti-virus software
Ensure that the anti-virus software is up-to-date.
Employ a firewall to protect networks
Filter all email traffic
Educate all users to be careful of suspicious e-mails
Scan internet downloads
Do not run programs of unknown origin.
Implement a vulnerability management system
Make regular backups pf critical data
Monito logs and systems
Restrict end-user access to the systems
CHECKLIST OF
CREDIBILITY CRITERIA
 Author
 Date
 Purpose
 Contact
 Fact vs. Opinion
 URL
INTEGRATING
DIGITAL/CYBER
LITERACY INTO
THE CURRICULUM
Allow students to maintain blogs, wikis, web pages related
to their learning.
Allow students to use digital tools, such as mobile phones,
Ipad and netbooks for Google search.
Thinking critically about the medium use to present a
message is as important as the message itself.
Engage in email/video chat exchanges with students
Engage students in discussions about how and why various
media work well.
THANK YOU….

You might also like