0% found this document useful (0 votes)
401 views

Q1 Week2 Emtech Final

The document discusses online safety, security, ethics and etiquette. It provides tips to stay safe online such as being mindful of what you share, using strong passwords, and avoiding untrusted websites. It also describes various internet threats like malware, spam, phishing and copyright infringement.

Uploaded by

Analyn Torres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
401 views

Q1 Week2 Emtech Final

The document discusses online safety, security, ethics and etiquette. It provides tips to stay safe online such as being mindful of what you share, using strong passwords, and avoiding untrusted websites. It also describes various internet threats like malware, spam, phishing and copyright infringement.

Uploaded by

Analyn Torres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Schools Division of Cauayan City

VILLA CONCEPCION NATIONAL HIGH SCHOOL


Villa Concepcion, Cauayan City
EMPOWERMENT TECHNOLOGY 11
Quarter 1, Week 2

Name: ___________________________________________Grade/Section: _______________________


MELC: Apply online safety, security, ethics, and etiquette standards and practice in the use of
ICTs as it would relate to their specific professional tracks.

I. KEY CONCEPT:
Online Safety, Security, Ethics and Etiquette
Internet is defined as the information superhighway. This means that anyone has access
to this highway, can place information, and can grab that information. This is why social
networking sites like Facebook continue to improve their security features. The threat of
cybercrime is very real. Whatever information we share today could affect our future.
Tips to Stay Safe Online
The Internet is a public place and it is up to you to protect yourself. Here are some tips to
help you stay safe when using the internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will
NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my house at
this date.” 8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one antivirus
software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites

Internet Threats
Here are some of the threats you should be aware of when using the Internet:
1. Malware – or malicious software, is any program or file that is harmful to a computer
user.
Types:
a. Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
b. Worm - a malicious program that transfers from one computer to another by any
type of means. Ex. ILOVEYOU Worm - The malware originated in the Pandacan
neighborhood of Manila in the Philippines on May 5, 2000.
c. Trojan - a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
d. Spyware - a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through keylogging. Ex. Keylogger – used to record keystrokes done by the user.
This is done to steal their password or any other sensitive information. The key
logger software typically uses log file to store its recording.
e. Adware - a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware - or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid.
2. Spam - an unwanted email mostly from bots or advertisers. It can be used to
send malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords
and credit card details. This is done by sending you an e-mail that will direct the
user to visit a fake website and be asked to update his/her username, password,
credit card or personal information.

Protecting Reputations Online

Here are the things you might want to consider before posting something over the
internet:
1. Before your post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.

Copyright Infringement
It is the use of works protected by copyright law without permission for a usage
where such permission4 is required.

Here are some tips that could help you avoid copyright infringement:
1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or information.

II. ACTIVITIES

Activity 1. What I Can Do?


Share something about what you have done in the past that later on, you realized
that it is not a standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.

________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
Activity 2. Solve the crossword below. Write your answers on a separate sheet of paper.
Down:
1. A from of piracy in which a third party
infringes the rights granted to the copyright
such as the exclusive use of a work for a set
period of time.
2. Secretly installed malicious software that is
intended to monitor user’s activity.
3. A type of malware that disguise itself as a
legitimate application to deceive users.
5. An email-based threat which presents users
with different advertising material and
promotional content.
8. This unwanted software has the ability to
harm a computer system, hinder performance
efficiency, or create a state of nuisance.
9. A malicious software that prevents you from
using your computer.
Across:
4. A piece of code designed to replicate itself
and transfer from one computer to another by
attaching itelf to other files.
6. People who use this scheme aims to steal
sensitive information such as, credit card
details and password.
7. A piece of code that spreads itself from one computer to another without human
interaction.
10. Software that is designed to send advertisements, mostly in a form of pop-ups.

III. REFLECTION
I have learned in the activity
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________________

Prepared by:

ANALYN M. TORRES
Teacher

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy