Вы находитесь на странице: 1из 65

Rules of Netiquette

Online Security
Internet threats
Protecting reputations online
Copyright
Contextualized online search and research
skills
Rules of Netiquette
On the next slide is a questionnaire
about how much information you
have shared so far. Put a check
under Shared or Not Shared.
Rules of Netiquette
How Safe Are You?
Type of Information Shared Not shared

1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
Rules of Netiquette
How Safe Are You?
Type of Information Shared Not shared

6. The name of your mother and father


7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Rules of Netiquette
How many checks did you have for shared?
Rules of Netiquette
Rules of Netiquette
1. How many hours do you spend on the
Internet per day?
2. Can you leave without Internet for a week?
3. How many aspects of your life depend on
the Internet?
4. How many times have you complained about
your Internet connection speed?
Rules of Netiquette
Online Safety and Security
The Internet, truly is a powerful tool. It can be
used to promote business, gain new friends, and
stay in touch with the old ones.
Rules of Netiquette
Online Safety and Security

Let us go back to the


How Safe Are You?
Rules of Netiquette
Online Safety and Security
Type of Information:
1. First Name 6. Name of your mother and
2. Last Name father
3. Middle Name 7. The name of your siblings
4. Current and previous 8. Your address
schools 9. Your home phone number
5. Cellphone number 10. Your birthday
Rules of Netiquette
Online Safety and Security
The Internet is defined as the information
superhighway.
Rules of Netiquette
Tips to Stay Safe Online
Here are some tips to help you stay safe when
using the Internet.
1. Be mindful of what you share and what site you
share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
Rules of Netiquette
Tips to Stay Safe Online
4. Know the security features of the social
networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-
to-face.
Rules of Netiquette
Tips to Stay Safe Online
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer.
12. If you have a Wi-Fi at home, make it a private
network by adding password.
Rules of Netiquette
Tips to Stay Safe Online
13. Avoid downloading anything from untrusted
websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Rules of Netiquette
Skill Exploration 2.1 (Privacy Policies)
Visit a social networking site and look for the
sites privacy policy. The link is typically found
at the bottom of the page and sometimes
labelled only Privacy. Write a summary on how
the website handles both your private and
public information.
Rules of Netiquette
Internet Threats
1. Malware stands for Malicious Software.
2. Spam unwanted email mostly from bots or
advertisers.
3. Phishing its goal is to acquire sensitive personal
information like passwords and credit card
details.
Rules of Netiquette
Internet Threats
Malware
a. Virus a malicious program designed to replicate
itself and transfer from one computer to another.
b. Worm a malicious program that transfers from
one computer to another by any type of means.
Rules of Netiquette
Internet Threats
Malware
c. Trojan - a malicious program that is disguised as
a useful program but once downloaded or
installed, leaves your PC unprotected and allows
hacker to get you information
* Rouge security software
Rules of Netiquette
Internet Threats
Malware
d. Spyware - a program that runs in the
background without you knowing it.
* Keyloggers used to record the keystroke done by
the user.
Rules of Netiquette
Internet Threats
Malware
e. Adware - a program designed to send you
advertisements, mostly as pop-ups.
Rules of Netiquette
Protecting Reputations Online
In the past, doing something embarrassing was not
much a big deal.
Nowadays, embarrassing moments are captured
using any device you could imagine
This could impact not only your reputation but also
the people around you.
Rules of Netiquette
Think Before You Click
1. Before you post something on the web, ask these
questions to yourself:
Would you want your parents or grandparents to
see it?
Would you want your future boss to see it?
Rules of Netiquette
Think Before You Click
2. Your friends depend on you to protect their
reputation online.
3. Set your post to private.
4. Avoid using names.
5. If you feel that a post can affect you or others
reputation, ask the one who posted it to pull it
down or report it as inappropriate.
Rules of Netiquette
Copyright Infringement
Intellectual Property
Copyright Law
Copyright Page No part of this book may be copied,
reproduced
Rules of Netiquette
Copyright Infringement
1. Understand. Copyright protect literary works,
photographs paintings, drawings, films, music
(and lyrics), choreography, and sculptures.
2. Be responsible. Even if a material does not say
that it is copyrighted, it is not a valid defense
against copyright.
Rules of Netiquette
Copyright Infringement
3. Be creative. Ask yourself whether what you are
making is something that came from you or
something made from somebody elses creativity.
4. Know the law. There are some limitations to
copyright laws.
The Madonna Madonna
Rules of Netiquette
Online Research
1. Have a question in mind. Focus on a question
you want answered.
Ex:
Why do they call the Virgin Mary Madonna?
What is a Madonna painting?
Who is the artist of Madonna and child?
Who is the religious Madonna?
Rules of Netiquette
Online Research
2. Narrow it down. Search engines like Google, Bing,
or Yahoo use several filters to determine the most
appropriate result for you.

Ex: Use Tom Sawyer animation rather than


Tom Sawyer
Rules of Netiquette
Online Research
3. Advanced Search. The best way to filter
information you get from search engines is by
using the advanced search.
Google Search Tricks

1. Use quotes to search for an exact phrase

Example: cookie recipe chocolate chip


Google Search Tricks

2. Use an asterisk within quotes to specify


unknown or variable words
Example: All the * moves by onerepublic
Google Search Tricks

3. Use the minus sign to eliminate results


containing certain words

Example: cookie recipe -chocolate chip


Google Search Tricks

4. OR
Find web pages that contain either of the term
phrases

Example: cookie recipe OR chocolate chip


Google Search Tricks

5. Search privately without IP address and


location tracking

* Use INCOGNITO MODE


Google Search Tricks

56 Look for similar sites

Example:
related: cookinglight.com
Google Search Tricks

7. Find GIFs using google images

Note: click search Image Tools Type


Google Search Tricks

8. Compare foods or things using vs

Example:
rice vs. quinoa
Google Search Tricks

9. Press the mic icon on Googles search bar,


and say flip a coin or heads or tails
Google Search Tricks

10. Don't worry about cases


Search isn't case sensitive. A search for new york
times is the same as a search for New York
Times.
Google Search Tricks

11. Search within a specific site


Precede your query with site: if you know you
want your answer from within a specific site or
type of site (.org, .edu)
Examples:
maute site:cnnphilippines.com
lesson 1 empowerment technology
site:slideshare.net
Google Search Tricks

12. Search by file type


Search for specific types of files, such as PDFs,
PPTs, or XLS, by adding filetype: and the 3-letter
file abbreviation.
Example:
lesson 1 empowerment technology filetype:ppt
Google Search Tricks

A final bonus tip:


Try these popular search engines (but there are many
others as well):
Yahoo
Bing
DuckDuckGo
Ask
Dogpile
Rules of Netiquette
Online Research
4. Look for a credible sources. Some wikis, filled
with updated information, are not a credible
source. When using wikis, check out the link of
the cited text.
Rules of Netiquette
Online Research
5. Give credit. Give credit to the original author of
the page or information. To properly site a
reference, you may use the format below.
Rules of Netiquette

Example:
Accounting: What You Should Know. Jargon Online Network.
http://www.jargononline.com/accounting101.html. Viewed on
April 13, 2015.
KEY TERMS
Cybercrime a crime committed or assisted through the
use of the Internet

Privacy policy tells the user how the website will handle
its data

Malwares stands for malicious software

Virus malicious program designed to replicate


itself and transfer from one computer to another
KEY TERMS
Worm malicious program that transfer from one
computer to another by any type of means

Example: The ILOVEYOU Bug flooded internet users with


ILOVEYOU messages in May 2000, forwarding itself to
everybody in the user's address book.
It was designed to steal internet access passwords for its
Filipino creators Onel A. de Guzman and Reonel Ramones.
The outbreak was later estimated to have caused US$5.5
8.7 billion in damages worldwide,
and estimated to cost US$15 billion to remove the worm.
KEY TERMS
Trojan malicious program that is disguised as a useful
program but once downloaded or installed, leaves PC
unprotected and allows hackers to get your information
Example: Zeus Trojan that steals online banking information

Spyware a program that runs in the background without


you knowing it. It has the ability to monitor what you are
currently doing and typing through keylogging
Example: Zango transmits detailed information to
advertisers about the Web sites which users visit.
KEY TERMS
Adware a program designed to send you
advertisements, mostly pop-ups

Spam unwanted email mostly from bots or advertisers

Phishing acquire sensitive personal information like


passwords and credit card details

Pharming more complicated way of phishing where it


exploits the Domain Name Service system
KEY TERMS
Copyright - part of the law, wherein you have the
rights to your work, and anyone who uses it without your
consent is punishable by law

Fair use Means that an intellectual property may


be used without a consent as long as it is used in
commentaries, criticisms, search engines, parodies, news,
reports, research, library archiving, teaching and
education
Lesson Summary

Most teenager spend time online. It is vital to


consider what information you share because
the Internet is a public place. There are several
ways to stay safe online and it is essential that
we know and apply them.
Lesson Summary

Several Internet threats include malwares,


spams, and phishing.
Malwares could be in the form of a virus, worm,
Trojan, spyware, or adware.
We are responsible of what we post online
It is also out responsibility to protect others
reputation
We should be mindful of what we post online
when others are involved
Lesson Summary

Copyright laws protect the authors or producers


of literary works, photographs, paintings,
drawings, films, music, choreography, and
sculptures from having their work used without
their permission.
It is important for everyone to understand the
laws to avoid being sanctioned.
Lesson Summary

When researching online, remember to narrow


down your topic.
Use advanced search features.
Look for credible source and cite your
references
Rules of Netiquette
Exploration 2.2 Cyber News Report
Form groups with three members each. Search for
several news and events related to cybercrime.
Together with your group, create a campaign
materials promoting Think before you click.
It could be in a form of small posters posted along the
hallway or bulletin boards as approved by the school.

Вам также может понравиться