SlideShare a Scribd company logo
1 of 4
Download to read offline
E
There are also common threats to personal safety:
Malware. Short for โ€œmalicious software,โ€ malware comes in several forms and can
cause serious damage to a computer or corporate network. There are various forms of
malware ranging from viruses and worms to Trojans and beyond. Malware is often seen
as a catch-all term that refers to any software designed to cause damage to a computer,
server, or network.
Cyberbullying. Is bullying that takes place over digital devices like cell phones,
computers, and tablets. It can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. It
includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else like sharing personal or private information causing embarrassment or
humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior
(What Is Cyberbullying 2020).
ACTIVITY 3.
Directions: Answer the following questions.
1. How would you feel if someone posted something embarrassing about you?
What would you do?
7
Internet safety, or online safety, is the knowledge of maximizing the user's personal
safety and security risks to private information and property associated with using the
internet, and the self-protection from computer crime in general.
Netiquette is a combination of the words network and etiquette and is defined as a
set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable
use of online resources in an online social environment.
Online etiquette is the correct or acceptable way of communicating or behaving on
the Internet, for internet security there are 3 important components in terms of Internet
Security and Cyber-Security; Integrity means protection from unauthorized modification,
Availability means protection from flow of information & Confidentiality means protection
from unauthorized access
Most of us use the internet every day. Sometimes, we do not pay attention on how
much information we share online. Below is a questionnaire about how much information
you have shared so far. Put (โˆš) mark under Shared or Not Shared.
How Safe are you?
Information Shared Not Shared
First Name
Last Name
Middle Name
Current and previous school(s)
Cellphone number
Names of your mother and father
Names of your siblings
Address
Home phone number
Birthday
2
Week # 2 Inclusive Dates: ____________ Quarter: 1 Score: _______
Performance Standard:
The learners should be able to independently compose an insightful reflection paper on
the nature of ICT in the context of their lives, society, and professional tracks
Most Essential Learning Competencies:
apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks
Learning Targets:
1. Consider oneโ€™s and othersโ€™ safety when sharing information using the Internet;
2. Consider oneโ€™s and othersโ€™ reputation when using the Internet;
3. Determine and avoid the dangers of the Internet;
4. Be responsible in the use of social networking sites; and
5. Browse the Internet efficiently and properly through proper referencing.
2. Illustrate at least one internet threat and discuss how will you avoid it.
(Please use separate sheet of paper for your output if needed)
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
Rubrics: Attractiveness = 30 Content = 30 Organization = 15 Grammar = 15 Originality = 10
1
8
Division of Nueva Ecija
NEHS โ€“ Senior High School
Quezon District, Cabanatuan City
Empowerment Technologies
Creative & Critical Thinking Activities
Name: ____________________________________________
Grade & Section: ___________________________________
Parent / Guardian Name & Signature: __________________
Teacher: __________________________________________
Email Spoofing - is the creation of emails with a forged sender address. The goal of email
spoofing is to get recipients to open, respond and engage with the email message. Email
spoofing can greatly increase the effectiveness of phishing and other email-based cyber-
attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is
usually used by spammers to hide the origin of the spam.
Phishing โ€“ is a deceitful practice of getting your personal information using email or text
messages. Scammers may try to steal your passwords, account numbers, or Social Security
numbers. If they get that information, they could gain access to your email, bank, or other
accounts (Federal Tr. Comm. โ€™19)
Pharming - is a scamming practice in which malicious code is installed on a personal
computer or server, misdirecting users to fraudulent Web sites without their knowledge or
consent. This happened when the code sent in an e-mail modifies local host files on a
personal computer. A computer with a compromised host file will go to the fake Web site
even if a user types in the correct Internet address or clicks on an affected bookmark entry
(Rouse, Pharming n.d.).
Computer Viruses - are small programs or scripts that can negatively affect the health of
your computer. These malicious little programs can create files, move files, erase files,
consume your computer's memory, and cause your computer not to function correctly.
Some viruses can duplicate themselves, attach themselves to programs, and travel across
networks. In fact, opening an infected e-mail attachment is the most common way to get a
virus (Christensson, Virus Definition 2011).
Spyware โ€“ a program that runs in the background without you knowing it. It has the ability
to monitor what you are currently doing and typing through keylogging. Hacker - a clever or
expert programmer who can gain unauthorized access to other computers. He can "hack"
his way through the security levels of a computer system or network (Christensson, Hacker
Definition 2006). And can vandalizes the victimsโ€™ website, steals personal information,
obtains intellectual property, and performs credit card fraud.
The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment. But like
most things in this world, there is always โ€œanother side of the coin.โ€ The Internet is one
of the most dangerous places, especially if you do not know what you are doing.
6 3
6. Respect people's privacy one
7. Fact check before reposting
8. Respond to emails promptly in doing this, you can easily check whether the emails you
received are spams, unsolicited messages or crafty stuffs and delete this right away.
9. Update online information don't leave inaccurate information online that will mislead
your friends or your customers if you have an online business.
10. Think before you click.
Tips to Stay Safe Online
The internet is a public place and it is up to you to protect yourself. Here are some tips to
help you stay safe when using Internet.
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding password.
13. Never post anything about future vacation.
14. Add friends you know in real life.
15. Avoid visiting untrusted websites.
The following are some of the internet threats you need to be aware of:
Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an
unknown source with identical message sent to multiple recipients. Usually not
dangerous but can be time and space consuming. Dangerous ones can carry viruses
and other malicious software or malware.
Activity 2. Privacy Policies
Directions: Visit a social networking site and look for the siteโ€™s privacy policy. The link is
typically found at the bottom of the page and sometimes labelled only โ€œPrivacyโ€. Write a
summary on how the website handles both your private and public information. (20 points)
Rubrics: Content = 10 Organization = 6 Grammar = 4
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
Name of Website: _________________________________________
URL: ______________________________________________________________________
Summary:
10 Basic Rules of Netiquette
The rules of etiquette are just as important in cyberspace as they are in the real world
(Hartney, 2020)
1. Make real people a priority.
2. Use respectful language avoid name-calling, cursing, expressing deliberately offensive
opinions.
3. Share with discretion avoid sending naked sexy pictures, drunk pictures, drug use pictures or
unedited home video
4. Don't exclude others donโ€™t let others feel that they are the one you are talking to in your
obscure comment to your Facebook status, Forum or Instagram story.
5. Choose friends wisely. 4 5

More Related Content

What's hot

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
ย 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
ย 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
ย 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
ย 

What's hot (20)

Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
ย 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
ย 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
ย 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
ย 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
ย 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
ย 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
ย 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
ย 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
ย 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
ย 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
ย 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
ย 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
ย 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
ย 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
ย 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
ย 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
ย 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
ย 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
ย 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
ย 

Similar to Emp tech las-week-2

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
ย 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
ย 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
ย 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
Pasquale Tursi
ย 

Similar to Emp tech las-week-2 (20)

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
ย 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
ย 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
ย 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
ย 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
ย 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
ย 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
ย 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
ย 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
ย 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
ย 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
ย 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
ย 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
ย 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
ย 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
ย 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
ย 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
ย 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
ย 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
ย 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
ย 

Recently uploaded

Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
TechFinland
ย 
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 

Recently uploaded (20)

W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
ย 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
ย 
Vip Call Girls Rasulgada๐Ÿ˜‰ Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada๐Ÿ˜‰  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada๐Ÿ˜‰  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada๐Ÿ˜‰ Bhubaneswar 9777949614 Housewife Call Girls Servic...
ย 
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
ย 
Vip Call Girls Bhubaneswar๐Ÿ˜‰ Bhubaneswar 9777949614 Housewife Call Girls Serv...
Vip Call Girls Bhubaneswar๐Ÿ˜‰  Bhubaneswar 9777949614 Housewife Call Girls Serv...Vip Call Girls Bhubaneswar๐Ÿ˜‰  Bhubaneswar 9777949614 Housewife Call Girls Serv...
Vip Call Girls Bhubaneswar๐Ÿ˜‰ Bhubaneswar 9777949614 Housewife Call Girls Serv...
ย 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
ย 
โœ‚๏ธ ๐Ÿ‘… Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
โœ‚๏ธ ๐Ÿ‘… Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...โœ‚๏ธ ๐Ÿ‘… Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
โœ‚๏ธ ๐Ÿ‘… Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
ย 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
ย 
Mahendragarh Escorts ๐Ÿฅฐ 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts ๐Ÿฅฐ 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts ๐Ÿฅฐ 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts ๐Ÿฅฐ 8617370543 Call Girls Offer VIP Hot Girls
ย 
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
Call Girls in Benson Town / 8250092165 Genuine Call girls with real Photos an...
ย 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
ย 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
ย 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
ย 
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
ย 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
ย 
2999,Vashi Fantastic Ellete Call Girls๐Ÿ“ž๐Ÿ“ž9833754194 CBD Belapur Genuine Call G...
2999,Vashi Fantastic Ellete Call Girls๐Ÿ“ž๐Ÿ“ž9833754194 CBD Belapur Genuine Call G...2999,Vashi Fantastic Ellete Call Girls๐Ÿ“ž๐Ÿ“ž9833754194 CBD Belapur Genuine Call G...
2999,Vashi Fantastic Ellete Call Girls๐Ÿ“ž๐Ÿ“ž9833754194 CBD Belapur Genuine Call G...
ย 
Thane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call GirlsThane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call Girls
ย 
Kopar Khairane Cheapest Call Girlsโœ”โœ”โœ”9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girlsโœ”โœ”โœ”9833754194 Nerul Premium Call Girls-Navi...Kopar Khairane Cheapest Call Girlsโœ”โœ”โœ”9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girlsโœ”โœ”โœ”9833754194 Nerul Premium Call Girls-Navi...
ย 
Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...
ย 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
ย 

Emp tech las-week-2

  • 1. E There are also common threats to personal safety: Malware. Short for โ€œmalicious software,โ€ malware comes in several forms and can cause serious damage to a computer or corporate network. There are various forms of malware ranging from viruses and worms to Trojans and beyond. Malware is often seen as a catch-all term that refers to any software designed to cause damage to a computer, server, or network. Cyberbullying. Is bullying that takes place over digital devices like cell phones, computers, and tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else like sharing personal or private information causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior (What Is Cyberbullying 2020). ACTIVITY 3. Directions: Answer the following questions. 1. How would you feel if someone posted something embarrassing about you? What would you do? 7 Internet safety, or online safety, is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment. Online etiquette is the correct or acceptable way of communicating or behaving on the Internet, for internet security there are 3 important components in terms of Internet Security and Cyber-Security; Integrity means protection from unauthorized modification, Availability means protection from flow of information & Confidentiality means protection from unauthorized access Most of us use the internet every day. Sometimes, we do not pay attention on how much information we share online. Below is a questionnaire about how much information you have shared so far. Put (โˆš) mark under Shared or Not Shared. How Safe are you? Information Shared Not Shared First Name Last Name Middle Name Current and previous school(s) Cellphone number Names of your mother and father Names of your siblings Address Home phone number Birthday 2
  • 2. Week # 2 Inclusive Dates: ____________ Quarter: 1 Score: _______ Performance Standard: The learners should be able to independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks Most Essential Learning Competencies: apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to their specific professional tracks Learning Targets: 1. Consider oneโ€™s and othersโ€™ safety when sharing information using the Internet; 2. Consider oneโ€™s and othersโ€™ reputation when using the Internet; 3. Determine and avoid the dangers of the Internet; 4. Be responsible in the use of social networking sites; and 5. Browse the Internet efficiently and properly through proper referencing. 2. Illustrate at least one internet threat and discuss how will you avoid it. (Please use separate sheet of paper for your output if needed) _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ _________________________________________________________________________________ Rubrics: Attractiveness = 30 Content = 30 Organization = 15 Grammar = 15 Originality = 10 1 8 Division of Nueva Ecija NEHS โ€“ Senior High School Quezon District, Cabanatuan City Empowerment Technologies Creative & Critical Thinking Activities Name: ____________________________________________ Grade & Section: ___________________________________ Parent / Guardian Name & Signature: __________________ Teacher: __________________________________________
  • 3. Email Spoofing - is the creation of emails with a forged sender address. The goal of email spoofing is to get recipients to open, respond and engage with the email message. Email spoofing can greatly increase the effectiveness of phishing and other email-based cyber- attacks by tricking the recipient into trusting the email and its sender (Tunggal 2019). It is usually used by spammers to hide the origin of the spam. Phishing โ€“ is a deceitful practice of getting your personal information using email or text messages. Scammers may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts (Federal Tr. Comm. โ€™19) Pharming - is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. This happened when the code sent in an e-mail modifies local host files on a personal computer. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry (Rouse, Pharming n.d.). Computer Viruses - are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact, opening an infected e-mail attachment is the most common way to get a virus (Christensson, Virus Definition 2011). Spyware โ€“ a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. Hacker - a clever or expert programmer who can gain unauthorized access to other computers. He can "hack" his way through the security levels of a computer system or network (Christensson, Hacker Definition 2006). And can vandalizes the victimsโ€™ website, steals personal information, obtains intellectual property, and performs credit card fraud. The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment. But like most things in this world, there is always โ€œanother side of the coin.โ€ The Internet is one of the most dangerous places, especially if you do not know what you are doing. 6 3
  • 4. 6. Respect people's privacy one 7. Fact check before reposting 8. Respond to emails promptly in doing this, you can easily check whether the emails you received are spams, unsolicited messages or crafty stuffs and delete this right away. 9. Update online information don't leave inaccurate information online that will mislead your friends or your customers if you have an online business. 10. Think before you click. Tips to Stay Safe Online The internet is a public place and it is up to you to protect yourself. Here are some tips to help you stay safe when using Internet. 1. Be mindful of what you share and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website. 4. Know the security features of the social networking site you use. 5. Do not share password with anyone. 6. Avoid logging in to public networks/Wi-Fi. 7. Do not talk to strangers whether online or face-to-face. 8. Never post anything about future vacation. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your computer. 12. If you have a Wi-Fi at home, make it a private network by adding password. 13. Never post anything about future vacation. 14. Add friends you know in real life. 15. Avoid visiting untrusted websites. The following are some of the internet threats you need to be aware of: Email Scam/Junk Mail/Spam Mail - Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients. Usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software or malware. Activity 2. Privacy Policies Directions: Visit a social networking site and look for the siteโ€™s privacy policy. The link is typically found at the bottom of the page and sometimes labelled only โ€œPrivacyโ€. Write a summary on how the website handles both your private and public information. (20 points) Rubrics: Content = 10 Organization = 6 Grammar = 4 Name of Website: _________________________________________ URL: ______________________________________________________________________ Summary: Name of Website: _________________________________________ URL: ______________________________________________________________________ Summary: 10 Basic Rules of Netiquette The rules of etiquette are just as important in cyberspace as they are in the real world (Hartney, 2020) 1. Make real people a priority. 2. Use respectful language avoid name-calling, cursing, expressing deliberately offensive opinions. 3. Share with discretion avoid sending naked sexy pictures, drunk pictures, drug use pictures or unedited home video 4. Don't exclude others donโ€™t let others feel that they are the one you are talking to in your obscure comment to your Facebook status, Forum or Instagram story. 5. Choose friends wisely. 4 5