Top Banner
Lesson2 Rules of Netiquette HOMAPON HIGH SCHOOL Homapon, Legazpi City By: ROCHELLE SABDAO-NATO SHS Teacher Reference: EMPOWERMENT Technologies Innovative Training Work, Inc. First Edition
25

Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Dec 12, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Lesson2Rules of

Netiquette

HOMAPON HIGH SCHOOLHomapon, Legazpi City

By: ROCHELLE SABDAO-NATOSHS Teacher

Reference: EMPOWERMENT TechnologiesInnovative Training Work, Inc.First Edition

Page 2: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

1. Consider one’s and others’ safety when sharing information using the internet.

2. Consider one’s and others’ reputation when using the internet.

3. Know and determined how to avoid the dangers of the internet.

4. Be responsible in the use of social networking sites

Page 3: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Objective:

1. Consider one’s and others’ safety when sharing information using the internet.

2. Consider one’s and others’ reputation when using the internet.

3. Know and determined how to avoid the dangers of the internet

4. Be responsible in the use of social networking sites

Page 4: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Rules of Netiquette

Online Security, safety

and ethics

Internet Threats

Protecting reputations

online

Copyright

Contextualized online search and research

skills

Page 5: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Pre-test

Write YES if you agree with the statement and NO if you disagree.

1. My computer has an antivirus so it is okay to open most e-mail attachments like e-cards and video files.

2. Your friend told you that this college application was rejected due to the fact that you posted a video of him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect your friend’s reputation. Can your friend be right that the college found the video?

Page 6: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

3. You and your best friend play a lot of video games. One time, she asks you for your password so she can help you level up and get in-game money. She promises to keep your password a secret. Is it okay to give away your password?

4. You received an email stating that your mother’s bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?

Page 7: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

5. You forgot that your essay for English class is due tomorrow. While doing your research, you found a website offering free essays. Is it okay to use the essay from this free essay website?

6. A virus is a malware that multiplies and infects other computers through flash drives.

7. Keyloggers are software that show pop-up ads even if you are not using your browser.

Page 8: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

8. Search engines scan websites for search results even if you have set your post to “private”.

9. There is a danger in posting information about a future vacation.

10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identify the theft.

Page 9: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’
Page 10: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

10 best rules of netiquette

The Golden Rule

( Treat others as you would like to be

treated)

No FLAMING

(Flame is a personal insult communicated through the internet

Don’t type in ALL CAPS ( people may misinterpret)

Don’t SPAM (it is any unsolicited e-mail from

unknown sources)

Don’t talk with people you do not know ( do not arrange to meet

anyone you meet online)

Obey Copyright Laws

(Don’t steal someone else’s idea, property

and rights)

Use proper Grammar and Spelling

(errors diminishes the credibility of the

message

BE HONEST / Be yourself

(tell the truth, do not pretend to be someone

else)

Follow the TOS

(TOS- Term of Service)

(Rules and policy of the sites

SHOP SECURE SITES

(These are sites with transport layer security

(TLS or SLS Socket Layer Security

Page 11: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Online Safety and Security

What is internet

Safety?

- It refers to the online security or safety of people and their information when using the internet.

Page 12: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

HTTPS - "Hyper-Text Transfer Protocol Secure"

Page 13: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

TYPE OF INFORMATION RISKS

1. First Name There is a risk in sharing your first name, Chances are , a hacker may already know plenty of stuff about you even if you only give out your first name.

2. Last Name If sharing your first name is a small risk, having both your first and last is more risky. Matching a name with a face is a modus to several cybercrimes' like identity theft

3. Middle Name Sharing your middle name is probably not the most risky of these shared information, but sharing your full name would be.

4. Current and previous school/s

Most people who steal identities study their subject. They can use this information for verification purposes.

5. Your cell phone number

You cell phone number should never be posted over the internet.

Page 14: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’
Page 15: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Internet Threats

1. Malware – Stands

for malicious

software.

- is a set of

instructions that run

on you computer and

make your system do

something that an

attacker wants it to do.

What it is good for?a. Steal personal

informationb. Delete filesc. Click fraudd. Steal software serial

numberse. Use your computer

as relay

Page 16: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Different Kinds of Malware

Virus Worm Trojan Spyware Adware

Rogue

security

software

Keyloggers

Page 17: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Virus

- A computer virus is a piece of maliciouscomputer code that attaches itself to asoftware program, email or computer filewithout your permission.

- It can transfers through the internet andlocal networks or data storage like flashdrives and CD’s

Page 18: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Trojan

A malicious program that is disguised as a useful program but

once downloaded or installed, leaves your PC unprotected and allows hackers to get

your information.

Worm

A malicious program that transfers from one computer to another by

any type of means. It uses computer network

to spread itself.

Ex. ILOVEYOU worm

Love Bug Worm created by Filipino

Spread to other

computers

Rogue security software- tricks the user into posting that is a security software. It asks the user to pay to improve hi/her security but in reality that are not protected at all.

Page 19: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Spyware

- A program that runs in the backgroundwithout you knowing it. It has the ability tomonitor what you are currently doing and typingthrough keylogging.

Keyloggers- used to record the keystrokedone by the user. This is done to steal theirpassword or any other sensitive information. Itcan record email, messages or any informationyou type using your keyboard.

Page 20: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Adware

A program designed to send your advertisement, mostly as pop-ups

SPAM- Refers to the transmission of unsolicited messages from various origins using electric messaging systems

Page 21: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

EXAMPLE

Page 22: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

* Pharming – a more complicated way of phishing where it exploits the DNS (Domain Name Service) system

Phishing – is a software or a program used by an attacker to obtain personal information.

- It targets the passwords to hack and take control of a user account..

Page 23: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

How to avoid these threats?

A very effective way of avoiding these threats is verifying the authenticity and credibility of the WEB source

Page 24: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’
Page 25: Lesson2 Rules of Netiquette · 2018. 10. 1. · Objective: 1. Consider one’s and others’ safety when sharing information using the internet. 2. Consider one’s and others’

Think before You Click !

1. Ask yourself? Would you want your parents or grandparents to see it?

Talk to your friends about this serious responsibility.

Set your post to “private”

Avoid using names. Names are easy for search engines to scan

If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate