Вы находитесь на странице: 1из 25

Online Safety, Security,

Ethics, and Etiquette


Prepared by: Sherwin Santos
Are you Safe
and Secure
Online?
How Safe and
Secured are
you Online?
Online Safety
and Security
The Internet, truly, is a powerful tool. It
can be used to promote your
business, gain new friends and stay in
touch with the old ones. It is also a
source of entertainment through
games, online communities, and
everything in between. But like most
things in this world, there is always the
“other side of the coin.”
The Internet is one of the most
dangerous places, especially if you
do not know what are you doing with
it. But there is no need to worry; it is
never the late. Hopefully, by the end
of this lesson, you are able to consider
how you go about your use of the
internet.
Let’s go back to the

How Safe and


Secured are
you Online?
Type of Information with Risk:
• Mother’s and Father’s Name
• Sibling’s name
• Address
• Home Phone Number
• Birthday
• Email
Type of Information with Risk:
• First Name
• Last Name
• Middle Name
• Current and Previous School
• Cellphone Number
The Internet is defined as the
information superhighway. This means
that anyone has access to this
highway, can place information, and
can grap that information.
Any information, even things that you
have set privately, can be accessed
one way or another.
That’s why social networking sites like
Facebook continue to improve their
security features.

The threat of cybercrime is very real.


While you may not experience the
threat now, whatever information we
share today could affect our future.
INTERNET THREATS
1. Malware – stands for
malicious software.

a. Virus – a malicious program


designed to replicate itself and
transfer from one computer to
another either through the internet
and local networks or data storage
like flash drives.
b.Worm – a malicious program that
transfers from one computer to another
by any type of means.
Trojan
It might appear harmless and even useful
at first, but it leaves your PC unprotected,
enabling hackers to steal sensitive
information.
d. Spyware – a program that runs in the
background without you knowing it (thus
called “spy”). It has the ability to monitor
what you are doing and typing through
keylogging.
e. Adware – a program designed to
send you advertisements, mostly as pop-
ups.
2. Spam – unwanted email mostly from
bots or advertisers. It can be used to send
malware

3. Phishing – Its goal is to acquire sensitive


personal information like passwords and
credit card details.
*Pharming-a more complicated way of
phishing where its exploits the DNS
(Domain Name Server) system.
Keyloggers
Designed to record the user’s keystrokes.
Keylogging allows criminals to look for
particular bits of information that can be
used for identity or intellectual property
theft.
Rogue security software
A special type of threat is
software that claims to be
security software. It tricks users
that have installed it to pay a
sum of money to be really
protected (which they will not
be). Most often it pretends to be
antivirus and anti spyware
programs.
COPYRIGHT INFRINGEMENT
If you create something – an idea, invention,
literary work, or a research, you have the
right as to how it should be used by others.
This is called Intellectual Property.
In other words, the copyright law includes
your rights over your work, and anyone who
used it without your consent is punishable by
law.
COPYRIGHT INFRINGEMENT
As a responsible user of the internet, you have
to consider that not everything out there is free
for you to use. Just like your own contents that
you see from websites have their respective
copyrights.
There are several instances where employees
or business owners face copyright infringement
and are sentenced to a huge fine due to
reckless copying of materials.
Here are some tips that could help you avoid
copyright infringement.
1. Understand-Copyright protects literary
works, photographs, paintings, drawings,
films, music( and lyrics), but generally does
not protect underlying ideas and facts. This
means that you can express something
using your own words, but you should give
credit to the source.
Here are some tips that could help you avoid
copyright infringement.
2. Be Responsible – Even if a material does not
say that it is copyrighted, it is not a valid defense
against copyright. Be responsible enough to know
if something has a copyright.
3. Be Creative – ask yourself whether what you
are making is something that came from you or
something made from somebody else’s creativity.
It is important to add your own creative genius in
everything that will be credited to you.
Here are some tips that could help you avoid
copyright infringement.
4. Know the Law - There are some limitations to
copyrights law. Which means an intellectual
property may be used as long as it is used in
commentaries, criticisms, search engines,
parodies news reports, research, teaching and
education.
What is Netiquette?

Using good manners online or in the internet.

Вам также может понравиться