SlideShare une entreprise Scribd logo
1  sur  21
LESSON 2
ONLINE SAFETY,
SECURITY AND RULES
OF NETIQUETTE
INTERNET SAFETY- it refers to the
online security or safety of people and
their information when using internet.
NETIQUETTE- is network etiquette, the
do’s and don’ts of online communication.
TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
• You need to remember that you are talking to a
real person when you are online.
• The internet brings people together who would
otherwise never meet.
• Remember this saying when sending an email:
Would I say this to the person’s face.
Rule No. 2: Adhere to the same standards online
that you follow in real life.
• You need to behave the same way online that
you do in real life.
• You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
• You are still talking to a real person with feelings
even though you can’t see them.
Rule no. 3: Know where you are in cyberspace.
• Always take a look around when you enter a new
domain when surfing the web.
• Get a sense of what the discussion group is
about before you join it.
Rule no. 4: Respect other people’s time and
bandwidth.
• Remember people have other things to do
besides read your email. You are not the center
of their world.
• Keep your post and emails to minimum by
saying what you want to say.
• Remember everyone won’t answer your
questions.
Rule no. 5: Make yourself look good online.
• Be polite and pleasant to everyone.
• Always check your spelling and grammar before
posting.
• Know what you are talking about and make
sense saying it.
Rule no. 6: Share expert knowledge
• Ask questions online
• Share what you know online.
• Post the answers to your questions online
because someone may have the same question
you do.
Rule no. 7: Help keep flame wars under control
• Netiquette does not forgive flaming.
• Netiquette does however forbid people who
are flaming to hurt discussion groups by putting
the group down.
Rule no. 8: Respect other people’s privacy.
• Do not read other people’s mail without
their permission.
• Going through other people’s things could
cost you, your job or you could even go to jail.
• Not respecting other people’s privacy is a
bad netiquette.
Rule no. 9: Don’t abuse your power.
• Do not take advantage of other people just
because you have more knowledge or power than
them.
• Treat others as you would want them to treat
you if the roles were reversed.
Rule no. 10: Be forgiving of other people’s
mistake.
• Do not point out mistakes to people online.
• Remember that you were once the new kid
on the block.
• You still need to have a good manners even
though you are online and cannot see
the person face to face.
Questions
• Are digital media a big part of your life?
• What kind of impact do digital media have on
you(Little, some, a lot)?
• What are your favorite and least-favorite thing
to do with digital media?
• Do you connect with others or create things
with digital media? Finish this statement: MY
media life is like___________________
• Because___________________
Types of System Intruders
• Masquerader
• Hackers
• Clandestine user
A computer virus has three parts
• Infection mechanism - How a virus spreads, by modifying
other code to contain a (possibly altered) copy of the
virus. The exact means through which a virus spreads is
referred to as its infection vector. This doesn't have to be
unique - a virus that infects in multiple ways is called
multipartite.
• Trigger - The means of deciding whether to deliver the
payload or not.
• Payload - What the virus does, besides spread. The
payload may involve damage, either intentional or
accidental. Accidental damage may result from bugs in
the virus, encountering an unknown type of system, or
perhaps unanticipated multiple viral infections.
Virus Stages
• Dormant phase.
– The virus is idle.
• Propagation phase.
– The virus places an identical copy of itself into other
programs or into certain system areas on the disk.
• Triggering phase.
– The Virus is activated to perform the function for
which it was intended.
– Caused by a variety of system events.
• Execution phase.
– The virus function is performed.
• Key Terms
• Cyber crime- a crime committed or assisted through the
use of the Internet.
• Privacy Policy/Terms of Services (ToS) - tells the user how
the website will handle its data.
• Malware- stands for malicious software.
• Virus- a malicious program designed to transfer from one
computer to another in any means possible.
• Worms- a malicious program designed to replicate itself
and transfer from one file folder to another and also
transfer to other computers.
• Trojan-a malicious program designed that is disguised as a
useful program but once downloaded or installed, leaves
your PC unprotected and allows hacker to get your
information.
• Spyware- a program that runs in the background
without you knowing it. It has the ability to monitor
what you are currently doing and typing through key
logging.
• Adware- a program designed to send you
advertisement, mostly pop-ups.
• Spam- unwanted email mostly from bots or advertisers..
• Copyright- a part of law, wherein you have the rights to
work, anyone who uses it w/o your consent is
punishable by law.
• Fair Use- means that an intellectual property may be
used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
• Keyloggers- used to record the keystrokes done by user.
This is done to steal passwords or any other sensitive
information

Contenu connexe

Tendances

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internetjoy santos
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptxKnepperE
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 

Tendances (20)

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber security
Cyber securityCyber security
Cyber security
 
RATs
RATsRATs
RATs
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Internet security
Internet securityInternet security
Internet security
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
The Do's and DONT's of Internet
The Do's and DONT's of InternetThe Do's and DONT's of Internet
The Do's and DONT's of Internet
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cate tech
Cate techCate tech
Cate tech
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Similaire à Lesson 2

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetHendrixAntonniAmante
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfCedLinc
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Onlinessuser9cd7f3
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 

Similaire à Lesson 2 (20)

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
CAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internetCAS110 Netiquette PPT when using the internet
CAS110 Netiquette PPT when using the internet
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Lesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety OnlineLesson-2-Rules-of-Netiquette safety Online
Lesson-2-Rules-of-Netiquette safety Online
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Nfwordle
NfwordleNfwordle
Nfwordle
 

Plus de Rexly Lasaca

1991 to 2000 timeline exposure
1991 to 2000 timeline exposure1991 to 2000 timeline exposure
1991 to 2000 timeline exposureRexly Lasaca
 
1981 to 1990 timeline exposure
1981 to 1990 timeline exposure1981 to 1990 timeline exposure
1981 to 1990 timeline exposureRexly Lasaca
 
1970-1980 Timeline exposure
1970-1980 Timeline exposure1970-1980 Timeline exposure
1970-1980 Timeline exposureRexly Lasaca
 
Timeline exposu[1]
Timeline exposu[1]Timeline exposu[1]
Timeline exposu[1]Rexly Lasaca
 
Fahad,alano,and al saud
Fahad,alano,and al saudFahad,alano,and al saud
Fahad,alano,and al saudRexly Lasaca
 
Inventions of 1980 1990
Inventions of 1980 1990Inventions of 1980 1990
Inventions of 1980 1990Rexly Lasaca
 
Timeline exposure to traditional and new media
Timeline exposure to traditional and new mediaTimeline exposure to traditional and new media
Timeline exposure to traditional and new mediaRexly Lasaca
 
1991 2000 - timeline exposure
1991 2000 - timeline exposure1991 2000 - timeline exposure
1991 2000 - timeline exposureRexly Lasaca
 
1970s to 1980s timeline exposure
1970s to 1980s timeline exposure1970s to 1980s timeline exposure
1970s to 1980s timeline exposureRexly Lasaca
 
Project in media and information literacy
Project in media and information literacyProject in media and information literacy
Project in media and information literacyRexly Lasaca
 
1970 to 1980 media and technologies
1970 to 1980 media and technologies1970 to 1980 media and technologies
1970 to 1980 media and technologiesRexly Lasaca
 
presentation timeline
presentation timelinepresentation timeline
presentation timelineRexly Lasaca
 
Timeline of gadgets exposure
Timeline of gadgets exposureTimeline of gadgets exposure
Timeline of gadgets exposureRexly Lasaca
 
TIMELINE IN MEDIA INFORMATION DURING 1990-2000
TIMELINE IN MEDIA INFORMATION DURING 1990-2000TIMELINE IN MEDIA INFORMATION DURING 1990-2000
TIMELINE IN MEDIA INFORMATION DURING 1990-2000Rexly Lasaca
 
Hamsa PRESENTITION TIMELINE EXPOSURE
Hamsa PRESENTITION TIMELINE EXPOSUREHamsa PRESENTITION TIMELINE EXPOSURE
Hamsa PRESENTITION TIMELINE EXPOSURERexly Lasaca
 
My presentation - timeline exposure
My presentation - timeline exposureMy presentation - timeline exposure
My presentation - timeline exposureRexly Lasaca
 

Plus de Rexly Lasaca (20)

1991 to 2000 timeline exposure
1991 to 2000 timeline exposure1991 to 2000 timeline exposure
1991 to 2000 timeline exposure
 
1981 to 1990 timeline exposure
1981 to 1990 timeline exposure1981 to 1990 timeline exposure
1981 to 1990 timeline exposure
 
1970-1980 Timeline exposure
1970-1980 Timeline exposure1970-1980 Timeline exposure
1970-1980 Timeline exposure
 
Project[1]
Project[1]Project[1]
Project[1]
 
Norjanah[1]
Norjanah[1]Norjanah[1]
Norjanah[1]
 
Timeline exposu[1]
Timeline exposu[1]Timeline exposu[1]
Timeline exposu[1]
 
Fahad,alano,and al saud
Fahad,alano,and al saudFahad,alano,and al saud
Fahad,alano,and al saud
 
Inventions of 1980 1990
Inventions of 1980 1990Inventions of 1980 1990
Inventions of 1980 1990
 
Timeline exposure to traditional and new media
Timeline exposure to traditional and new mediaTimeline exposure to traditional and new media
Timeline exposure to traditional and new media
 
1991 2000 - timeline exposure
1991 2000 - timeline exposure1991 2000 - timeline exposure
1991 2000 - timeline exposure
 
1970s to 1980s timeline exposure
1970s to 1980s timeline exposure1970s to 1980s timeline exposure
1970s to 1980s timeline exposure
 
timeline exposure
timeline exposuretimeline exposure
timeline exposure
 
Project in media and information literacy
Project in media and information literacyProject in media and information literacy
Project in media and information literacy
 
1970 to 1980 media and technologies
1970 to 1980 media and technologies1970 to 1980 media and technologies
1970 to 1980 media and technologies
 
presentation timeline
presentation timelinepresentation timeline
presentation timeline
 
Timeline of gadgets exposure
Timeline of gadgets exposureTimeline of gadgets exposure
Timeline of gadgets exposure
 
TIMELINE IN MEDIA INFORMATION DURING 1990-2000
TIMELINE IN MEDIA INFORMATION DURING 1990-2000TIMELINE IN MEDIA INFORMATION DURING 1990-2000
TIMELINE IN MEDIA INFORMATION DURING 1990-2000
 
Hamsa PRESENTITION TIMELINE EXPOSURE
Hamsa PRESENTITION TIMELINE EXPOSUREHamsa PRESENTITION TIMELINE EXPOSURE
Hamsa PRESENTITION TIMELINE EXPOSURE
 
my project
my projectmy project
my project
 
My presentation - timeline exposure
My presentation - timeline exposureMy presentation - timeline exposure
My presentation - timeline exposure
 

Dernier

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Dernier (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Lesson 2

  • 2.
  • 3. ONLINE SAFETY, SECURITY AND RULES OF NETIQUETTE
  • 4. INTERNET SAFETY- it refers to the online security or safety of people and their information when using internet.
  • 5. NETIQUETTE- is network etiquette, the do’s and don’ts of online communication.
  • 6. TEN RULES OF NETIQUETTE Rule No. 1: Remember the human • You need to remember that you are talking to a real person when you are online. • The internet brings people together who would otherwise never meet. • Remember this saying when sending an email: Would I say this to the person’s face.
  • 7. Rule No. 2: Adhere to the same standards online that you follow in real life. • You need to behave the same way online that you do in real life. • You need to remember that you can get caught doing things you should not be doing online just like you can in real life. • You are still talking to a real person with feelings even though you can’t see them.
  • 8. Rule no. 3: Know where you are in cyberspace. • Always take a look around when you enter a new domain when surfing the web. • Get a sense of what the discussion group is about before you join it.
  • 9. Rule no. 4: Respect other people’s time and bandwidth. • Remember people have other things to do besides read your email. You are not the center of their world. • Keep your post and emails to minimum by saying what you want to say. • Remember everyone won’t answer your questions.
  • 10. Rule no. 5: Make yourself look good online. • Be polite and pleasant to everyone. • Always check your spelling and grammar before posting. • Know what you are talking about and make sense saying it.
  • 11. Rule no. 6: Share expert knowledge • Ask questions online • Share what you know online. • Post the answers to your questions online because someone may have the same question you do.
  • 12. Rule no. 7: Help keep flame wars under control • Netiquette does not forgive flaming. • Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • 13. Rule no. 8: Respect other people’s privacy. • Do not read other people’s mail without their permission. • Going through other people’s things could cost you, your job or you could even go to jail. • Not respecting other people’s privacy is a bad netiquette.
  • 14. Rule no. 9: Don’t abuse your power. • Do not take advantage of other people just because you have more knowledge or power than them. • Treat others as you would want them to treat you if the roles were reversed.
  • 15. Rule no. 10: Be forgiving of other people’s mistake. • Do not point out mistakes to people online. • Remember that you were once the new kid on the block. • You still need to have a good manners even though you are online and cannot see the person face to face.
  • 16. Questions • Are digital media a big part of your life? • What kind of impact do digital media have on you(Little, some, a lot)? • What are your favorite and least-favorite thing to do with digital media? • Do you connect with others or create things with digital media? Finish this statement: MY media life is like___________________ • Because___________________
  • 17. Types of System Intruders • Masquerader • Hackers • Clandestine user
  • 18. A computer virus has three parts • Infection mechanism - How a virus spreads, by modifying other code to contain a (possibly altered) copy of the virus. The exact means through which a virus spreads is referred to as its infection vector. This doesn't have to be unique - a virus that infects in multiple ways is called multipartite. • Trigger - The means of deciding whether to deliver the payload or not. • Payload - What the virus does, besides spread. The payload may involve damage, either intentional or accidental. Accidental damage may result from bugs in the virus, encountering an unknown type of system, or perhaps unanticipated multiple viral infections.
  • 19. Virus Stages • Dormant phase. – The virus is idle. • Propagation phase. – The virus places an identical copy of itself into other programs or into certain system areas on the disk. • Triggering phase. – The Virus is activated to perform the function for which it was intended. – Caused by a variety of system events. • Execution phase. – The virus function is performed.
  • 20. • Key Terms • Cyber crime- a crime committed or assisted through the use of the Internet. • Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data. • Malware- stands for malicious software. • Virus- a malicious program designed to transfer from one computer to another in any means possible. • Worms- a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers. • Trojan-a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
  • 21. • Spyware- a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging. • Adware- a program designed to send you advertisement, mostly pop-ups. • Spam- unwanted email mostly from bots or advertisers.. • Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your consent is punishable by law. • Fair Use- means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research and etc. • Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or any other sensitive information