Online Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Online Safety and

Security
Empowerment Technologies
Review
• Name some of the current trends in Information
and Communications Technology.
• What are the uses and advantages that these
trends give in our daily activities?
• What are some disadvantages these trends give
when they are wrongly used?
• What can we do as benefactors and users of ICT
to make the most out of these trends?
Maria is a Grade 12 student. She loves surfing the Internet and
engage herself with people she barely knows through her social
media accounts. She posts most of her activity on Facebook and
Twitter and uploads her every selfie photos on Instagram, which
she always posts publicly. One day, Maria posts that she will be
going to a local Milktea House where she plans to get her favorite
Wintermelon Tea. On her way to her destination, two unknown
men catch unknowing Maria off-guard, and take her into an
abandoned shed where they get all her belongings. She is terrified
and thankful at the same time because they just want her personal
stuffs. After getting everything, one of the men mockingly tells her,
“That’s what you get for posting everything on FB for all the world
to see.” She reports the incident to the Police and hopes that they
will catch the criminals she attracted by revealing too much online.
CHALLENGE QUESTION
How is your digital media
life like?
(Hint: You have to think figuratively)
Questions to consider:

● Are digital media a big part of your life?


● What kind of impact do digital media have
on you (a little, some, a lot)?
● What are your favorite and least-favorite
things to do with digital media?
● Do you connect with others or create
things with digital media?
MENTAL EXERCISE NO. 4
Finish this statement:
My media life is like _______________
because __________________________.

Illustrate your simile in the box below (or


on a separate piece of paper):
 
 
 
 
 
 
• As we have delved deeper into the world of ICT, we have
known a lot of its advantages. But there is always another
side of the same coin. When used irresponsibly, ICT and one
of its popular tools- the World Wide Web and the Internet,
can be as harmful as they are beneficial.
• It is important that in everything we do- our privacy, identity
and lives are most protected. Even in our dealings with the
Internet and the World Wide Web, we are to be careful and
vigilant that we are not exposing ourselves to virtual dangers
and crimes that can come upon users who used them in a
wrong way.
• The next lesson will help us determine and consider the
dangers of the Internet and equip us to be responsible users.
Online Safety
and Security
• The INTERNET is defined as the Information Superhighway.
This means that anyone has access to this highway, can
place information, and can grab that information.
• Any information, even things that are set on private, can
be accessed one way or another. It is the reason why social
networking sites like Facebook continue to improve their
security features because threats of cybercrime are very
real.
• Whatever information a person share on the Internet
could affect his or her future.
• The Internet is a public place and it is up to every
individual to protect himself.
TIPS ON HOW TO BE RESPONSIBLE USERS ONLINE
1.Be mindful of what you share online and what site you
share it to.
2.Do not just accept terms and conditions; read it.
3.Check out the privacy policy page of a website to learn
how the website handles the information you share.
4.Know the security features of the social networking site
you use. By keeping your profile private, search engines
will not be able to scan your profile.
5.Do not share your password with everyone.
TIPS ON HOW TO BE RESPONSIBLE USERS ONLINE
6. Avoid logging in to public networks or Wi-Fi.
Browsing in “Incognito (or private)” mode, a feature
of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-
face.
8. Never post anything about a future vacation. It is
similar to posting “Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
TIPS ON HOW TO BE RESPONSIBLE USERS ONLINE
11. Install and update an antivirus software on your
computer. Use only one antivirus to avoid conflicts.
12. If you have a Wi-Fi at home, make it a private network
by adding a password.
13. Avoid downloading anything from untrusted websites.
You are most vulnerable in peer-to-peer downloads
(torrents) as the download is most likely not monitored by
the website owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
 
HOW SAFE ARE YOU?
This questionnaire aims to know how much information you have
shared so far on the Internet/ your Social Media accounts. Put a
check under Shared or Not Shared.
TYPE OF INFORMATION SHARED NOT SHARED
1. Your First Name    
2. Your Last Name    
3. Your Middle Name    
4. Your Current and previous schools    
5. Your Cellphone number    
6. Your Mother and Father’s Name    
7. Your Siblings’ Name    
8. Your Address    
9. Your Home Phone Number    
10. Your Birthday    
TYPE OF INFORMATION RISKS
1. FIRST NAME Hackers can know plenty of stuff about a person even
when he/she only gives out his/her first name.
 
2. LAST NAME Sharing one’s first name is a small risk but sharing both
  first and last name is more risky. An individual will be more
vulnerable to being searched by using search engines
including image search. Matching a name with a face is
modus to several cybercrimes like identity theft.
 
3. MIDDLE NAME Sharing a middle name is probably not the most risky but
  sharing one’s full name would be.
 
4. CURRENT AND PREVIOUS Most people who steal identities study their subject, they
SCHOOLS can use this information for verification purposes.
   
5. CELLPHONE NUMBER Should never be posted over the Internet.
 
TYPE OF INFORMATION RISKS
6. YOUR MOTHER AND Risky, yet not as risky as posting their full names, especially
FATHER’S NAME one’s mother’s maiden name, which is one of the most used
secret question when someone loses/forgets his/her
password.
7. YOUR SIBLINGS’ NAME Disclosing this information is a huge risk. Strangers may
pretend or use their identity to dupe you.
 
8. YOUR ADDRESS Sharing this over the Internet makes it easier for criminals to
find you.
 
9. YOUR HOME PHONE More risky than sharing a personal number, scams usually use
NUMBER this information to deceive a lot of persons, one of which is
when a stranger pretends to know your parents or pretends
to be you.
10. YOUR BIRTHDAY Sharing this makes a person more vulnerable to identity theft.
 
Developing Mastery

• Do you believe that there is such a thing as


“oversharing” information on the Internet?
Why is it risky to give too much information as
we engage ourselves in the digital world?

• How can we determine if an information is


safe or is risky to share over the internet?
Generalizations
• What dangers do you identify when a person uses the
internet irresponsibly and wrongly?
• Can you give an instance when you or someone you
know was harmed because of sharing too much
information on the Internet?
• As an individual who is living in a very digitalized world,
what are the habits you can practice to stay safe and
secure when engaging in various activities over the
Internet?
•As someone who can also
consider himself as a digital
citizen, why is it important to
be responsible when sharing
every inch of information we
have on the internet?
EVALUATION
Direction: Choose the
letter of the best answer.
1. It is defined as the Information
Superhighway.
A. Computer
B. Internet
C. Expressway D.
World Wide Web
 2. Any ____________, even those
which are set on private, can be
accessed one way or another.
A. Information
B. Password
C. Internet Connection
D. Software
 3. What should we do to stay safe and
secure over the Internet?
A. Give out our passwords to our best
friends.
B. Post our full names so that our loved
ones can easily find our online accounts.
C. Never use the Internet at all.
D. Practice responsibility as we use and
share information over the Internet.
4. Which of the following are risks
when we overshare information on
the Internet?
A. Being victims of cybercrimes.

B. Being victims of identity theft.

C. Issues of lost/ compromised


5. Which of the following individuals are
bound to be safe and secure over the Internet?
A. Kerby who avoids downloading anything
from unsecured websites.
B. Alex who only adds friends he knows in
real life.
C. Helen who uses pirated copies of
software.
D. Both A and B.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy