The document discusses online safety, security, ethics, and etiquette. It outlines various types of personal information that could put users at risk if shared online. It then describes common internet threats like malware, spam, phishing, and keyloggers that could steal users' private information. The document also discusses copyright infringement and provides tips to avoid it such as understanding copyright law, being responsible, and being creative. Finally, it defines netiquette as using good manners online.
The document discusses online safety, security, ethics, and etiquette. It outlines various types of personal information that could put users at risk if shared online. It then describes common internet threats like malware, spam, phishing, and keyloggers that could steal users' private information. The document also discusses copyright infringement and provides tips to avoid it such as understanding copyright law, being responsible, and being creative. Finally, it defines netiquette as using good manners online.
The document discusses online safety, security, ethics, and etiquette. It outlines various types of personal information that could put users at risk if shared online. It then describes common internet threats like malware, spam, phishing, and keyloggers that could steal users' private information. The document also discusses copyright infringement and provides tips to avoid it such as understanding copyright law, being responsible, and being creative. Finally, it defines netiquette as using good manners online.
The document discusses online safety, security, ethics, and etiquette. It outlines various types of personal information that could put users at risk if shared online. It then describes common internet threats like malware, spam, phishing, and keyloggers that could steal users' private information. The document also discusses copyright infringement and provides tips to avoid it such as understanding copyright law, being responsible, and being creative. Finally, it defines netiquette as using good manners online.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 25
Online Safety, Security,
Ethics, and Etiquette
Prepared by: Sherwin Santos Are you Safe and Secure Online? How Safe and Secured are you Online? Online Safety and Security The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But like most things in this world, there is always the “other side of the coin.” The Internet is one of the most dangerous places, especially if you do not know what are you doing with it. But there is no need to worry; it is never the late. Hopefully, by the end of this lesson, you are able to consider how you go about your use of the internet. Let’s go back to the
How Safe and
Secured are you Online? Type of Information with Risk: • Mother’s and Father’s Name • Sibling’s name • Address • Home Phone Number • Birthday • Email Type of Information with Risk: • First Name • Last Name • Middle Name • Current and Previous School • Cellphone Number The Internet is defined as the information superhighway. This means that anyone has access to this highway, can place information, and can grap that information. Any information, even things that you have set privately, can be accessed one way or another. That’s why social networking sites like Facebook continue to improve their security features.
The threat of cybercrime is very real.
While you may not experience the threat now, whatever information we share today could affect our future. INTERNET THREATS 1. Malware – stands for malicious software.
a. Virus – a malicious program
designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives. b.Worm – a malicious program that transfers from one computer to another by any type of means. Trojan It might appear harmless and even useful at first, but it leaves your PC unprotected, enabling hackers to steal sensitive information. d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are doing and typing through keylogging. e. Adware – a program designed to send you advertisements, mostly as pop- ups. 2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware
3. Phishing – Its goal is to acquire sensitive
personal information like passwords and credit card details. *Pharming-a more complicated way of phishing where its exploits the DNS (Domain Name Server) system. Keyloggers Designed to record the user’s keystrokes. Keylogging allows criminals to look for particular bits of information that can be used for identity or intellectual property theft. Rogue security software A special type of threat is software that claims to be security software. It tricks users that have installed it to pay a sum of money to be really protected (which they will not be). Most often it pretends to be antivirus and anti spyware programs. COPYRIGHT INFRINGEMENT If you create something – an idea, invention, literary work, or a research, you have the right as to how it should be used by others. This is called Intellectual Property. In other words, the copyright law includes your rights over your work, and anyone who used it without your consent is punishable by law. COPYRIGHT INFRINGEMENT As a responsible user of the internet, you have to consider that not everything out there is free for you to use. Just like your own contents that you see from websites have their respective copyrights. There are several instances where employees or business owners face copyright infringement and are sentenced to a huge fine due to reckless copying of materials. Here are some tips that could help you avoid copyright infringement. 1. Understand-Copyright protects literary works, photographs, paintings, drawings, films, music( and lyrics), but generally does not protect underlying ideas and facts. This means that you can express something using your own words, but you should give credit to the source. Here are some tips that could help you avoid copyright infringement. 2. Be Responsible – Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright. 3. Be Creative – ask yourself whether what you are making is something that came from you or something made from somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you. Here are some tips that could help you avoid copyright infringement. 4. Know the Law - There are some limitations to copyrights law. Which means an intellectual property may be used as long as it is used in commentaries, criticisms, search engines, parodies news reports, research, teaching and education. What is Netiquette?