Вы находитесь на странице: 1из 39

RULES OF NETIQUETTE

EMPOWERMENT TECHNOLOGY
ONLINE SAFETY AND SECURITY

1. First There is a risk in sharing your first name. Chances are,


name a hacker may already know plenty of stuff about you
even if you only give out your first name.
2. Last If sharing your first name is a small risk, having both
Name your first and last is more risky. You will be vulnerable
to being searched for using search engines, which
include image search.
ONLINE SAFETY AND SECURITY

3. Middle Sharing your middle name alone is probably not the


name most risky of these shared information, but sharing
your full name would be.
4. Current They can use this information for verification
and purposes.
previous
schools
ONLINE SAFETY AND SECURITY

5. Cellphone Your cellphone number should be never posted over


number the internet. The internet is a public place. You would
not want stranger texting or calling you.
6. The name Risky, yet not as risky as posting their full names,
of your especially your mother`s maiden name.
mother and
father
ONLINE SAFETY AND SECURITY

7. The name Disclosing this is a huge risk. Strangers may pretend or


of your use their identity to dupe you.
siblings
8. Your Giving them your address is a whole other level. It
address would be much easier for criminals to find you.
ONLINE SAFETY AND SECURITY

9. Your Scams usually use this information to deceive you, one


home phone of which is when a stranger pretends to know your
number parents or pretends to be you.
10. Your Letting people know your birthday or having it in your
birthday profile makes you vulnerable to identity theft.
The internet is defined as the information super
highway. This means that anyone has access to this highway,
can place information, and can grab that information.
TIPS TO STAY SAFE ONLINE

1. Be mindful of what you share online and what site you


share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn
how the website handles the information you share.
TIPS TO STAY SAFE ONLINE

4. Know the security features of the social networking site you


use. By keeping your profile private, search engines will not be
able to scan your profile
5. Do not share your password with anyone.
6.Avoid logging in to public networks/Wi-Fi. Browsing in
“Incognito (or private) mode,” a feature of the browser, will not
protect you from hackers.
TIPS TO STAY SAFE ONLINE

7. Do not talk to strangers whether online or face-to-face.


8. Never post anything about a future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer. Use only an antivirus software to avoid conflict.
TIPS TO STAY SAFE ONLINE

12. If you have a Wi-Fi at home, make it private network by


adding a password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use the pirated ones.
15. Do not reply or click links for suspicious emails.
INTERNET THREATS

1. Malware- stands for malicious software


a. Virus- a malicious program designed to replicate
itself and transfer from one computer to another either
through the Internet and local networks for data storage like
flash drives and
INTERNET THREATS

b. Worm- a malicious program that transfers from one


computer to another by any type of means. Often, it uses a
computer network to spread itself.
c. Trojan- a malicious program that is disguised as a
useful program but once downloaded or installed, leaves your
PC unprotected and allows hacker to get your information.
INTERNET THREATS

 Rogue security software- tricks the user into


posing that it is a security software. It asks the user
to pay to improve his/her security but in reality
they`re not protected at all.
INTERNET THREATS

d. Spyware- a program that runs in the background


without you knowing it. It has the ability to monitor what
you are currently doing and typing through keylogging.
 Keyloggers- used to record the keystroke done by the
user. This is done to steal password or any other sensitive
information.
Adware

INTERNET THREATS

e. Adware- a program designed to send you


advertisements, mostly as pop-ups.
2. Spam- unwanted email mostly from bots or advertisers. It
can be used to send malware.
INTERNET THREATS

3. Phishing- Its goal is to acquire sensitive personal


information like passwords and credit card details. This is
done by sending you an email that will direct the user to visit
a website and be asked to update his/her username,
password, credit card, personal information.
INTERNET THREATS

Pharming- a more complicated way of phishing


where it exploits the DNS (Domain Name
Services) system.
PROTECTING REPUTATIONS ONLINE

Once you post something over the internet, search


engines keep them in their archives for search results. This
makes anything you post to last forever even if you deleted it
in your page. Something you and your friends find funny
today may be something that could harm someone`s
reputation later.
THINK BEFORE YOU CLICK

1. Before you post something on the web, ask these questions


to yourself: Would you want your parents or grandparents to
see it? Once you post something on the web, you have no
control of who sees your posts.
2. Your friends depend on you to protect their reputation
online. Talk to your friends about this serious responsibility.
THINK BEFORE YOU CLICK

3. Set your post to “private”. In this way, search engines will


not be able to scan that posts.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other`s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.
COPYRIGHT INFRINGEMENT

If you create something−an idea, an invention, a form of literary


work, or a research, you have the right as to how it should be used
by others. This is called intellectual property. In other words, the
copyright law includes your rights over your work, and anyone who
uses it without your consent is punishable by law.
TIPS TO AVOID COPYRIGHT INFRINGEMENT

1. Understand. Copyright protects literary works,


photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does not protect
underlying ideas and facts. This means that you can express
something using your own words, but you should give credit to
the source.
TIPS TO AVOID COPYRIGHT INFRINGEMENT

2. Be responsible. Even if a material does not say that it is


copyrighted, it is not a valid defense against copyright. Be
responsible enough to know if something has copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you or something made from
somebody else`s creativity.
TIPS TO AVOID COPYRIGHT INFRINGEMENT
4. Know the law. There are some limitations to copyright
laws for instance in the Philippines, copyrights only last a
lifetime (of the author) plus 50 years. There are also
provisions for “fair use” which mean that an intellectual
property may be used without a consent as long as it is used
in commentaries, criticisms, search engines, parodies, news
report, research, library archiving, teaching, and education.
FAIR USE LOGO
ONLINE RESEARCH
Have you ever searched the internet for certain
information where the search engine returned a different
result? For example, if you were to search “The Madonna” as
the representation of Mary in the form of an art, you would
probably use the keyword “Madonna” but there are chances
that you stumble upon “Madonna” the music artist instead.
But if you used “The Madonna” to search for it in the first
place, you will be directed in the right place.
GOOGLE SEARCH RESULTS WHEN MADONNA IS
THE KEYWORD
WHEN THE MADONNA IS THE KEYWORD
TIPS IN CONDUCTING ONLINE RESEARCH

1. Have a question in mind.


2. Narrow it down.
3. Advance search.
HOW TO CONDUCT ADVANCE SEARCH
In Google, simply
search a word like you
would normally do, then
click the advanced
search option on the
options button located at
the upper right corner
of the page.
ONCE DONE YOU CAN NOW FILTER YOUR
SEARCH RESULTS
KEYWORDS AND SYMBOLS

Symbol Function
+ Finds web pages that contain all the terms that are
preceded by the + symbol; allows you to include
terms that are usually ignored.
“” Finds the exact words in a phrase.
KEYWORDS AND SYMBOLS

Symbol Function
() Finds or excludes web pages that contain a group
of words
AND or Finds web pages that contain all the terms or
& phrases.
KEYWORDS AND SYMBOLS

Symbol Function
NOT Excludes web pages that contain a term or phrase.
or -
OR or Finds web pages that either of the terms or
│ phrases.
• By default, all searches are AND searches.
• You must capitalize the NOT and OR functions.
• Stop words, and all punctuation marks, except for the
symbols noted in this topic, are ignored unless they are
surrounded by quotation marks or preceded by the symbol
+
• Only the first ten terms are used to get search results.
• Similar to MDAS term grouping nd Boolean functions are
supported in the following order:
1. parentheses ( ) 4. AND &
2.quotation marks “” 5. OR │
3. NOT + -
TIPS IN CONDUCTING ONLINE SEARCH

4. Look for credible source.


TIPS IN CONDUCTING ONLINE SEARCH

5. Give credit.
Name of the person or organization (the author of the
information). Title of the homepage in italics (title is shown
in title bar but is sometimes missing of unrelated) URL Date
last seen.

Вам также может понравиться