03-Online-Safety-Security-and-Netiquette 2
03-Online-Safety-Security-and-Netiquette 2
Online Safety
It is the knowledge of maximizing the user’s personal safety and security and security risk to private
information, and self-protection for computer crime in general.
10 Safety Tips
Netiquette
10 Rules of Etiquette
In cyberspace, we state this in an even more basic manner: Remember the human.
2. No Flaming
Flame is a personal insult communicated through the internet.
“Flaming” is what people do when they express a strongly held opinion without holding back any emotion.
3. Don’t type ALL CAPS
-People may misinterpret it
-When you are typing something that will need to be said don’t type in all caps. It is rude. It is equivalent of
yelling.
4. Don’t SPAM
-SPAM – it is any unsolicited e-mail from unknown sources.
-Spamming is the use of messaging systems to send an unsolicited message, especially advertising, as well
as sending messages repeatedly on the same site.
5. Don’t talk with the people you don’t know
Do not arrange to meet anyone you meet online
6. Obey Copyright laws
-Don’t steal someone else’s idea. Property and rights.
-Copyright law gives the copyright holder (often the author and the publisher) the right to control certain
uses of works protected by copyright. You must obey any terms that you agreed to in order to gain access
to a copy of a work.
7. Use proper Grammar and Spelling
- Good spelling, correct grammar and the appropriate use of punctuation will give them more confidence in
person (or the company) communicating with them.
8. Be Honest/ Be yourself
-Tell the truth
-Do not pretend to be someone else
9. Follow the TOS
-TOS – Term of Service
-Are rules by which one must agree to abide in order to use a service. Terms of service can also be merely a
disclaimer, especially regarding the use of website.
-URLs begin with “https” instead of just “http” to indicate that they are encrypted.
Internet Threats
1. Malware
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of
malware can include computer viruses, worms, Trojan horses and spyware.
A. Virus
A computer virus is malware attached to another program (such as a document), which can replicate and
spread after an initial execution on a target system where human interaction is required. Many viruses are harmful
and can destroy data, slow down system resources, and log keystrokes.
B. Worms
Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause
the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are
standalone software and do not require a host program or human help to propagate.
C. Trojan
It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing
it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user
(popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and
spreading other malware, such as viruses).
Trojans are also known to create backdoors to give malicious users access to the system. Unlike viruses and
worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user
interaction such as opening an email attachment or downloading and running a file from the Internet.
D. Spyware
Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and
sensitive information.
-It is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't
know that your actions are being monitored.
E. Adware
This type of spyware tracks your browser history and downloads, with the intent of predicting what
products or services you’re interested in. The adware will display advertisements for the same or related products or
services to entice you to click or make a purchase. Adware is used for marketing purposes and can slow down your
computer.
F. Ransomware
It is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom
to get them back.
2. Phishing
It is a type of social engineering attack often used to steal user data, including login credentials and credit
card numbers.It happens when an email is sent from an internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
It is a cyberattack intended to redirect a website's traffic to another, fake site. Pharming can be conducted
either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.
It happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate
one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and
credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector,
including banks, online payment platforms, or other e-commerce destinations.
4. Internet Scam
It generally refers to someone using internet services or software to defraud or take advantage of victims,
typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts,
social networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal
information. Online scams may come in various forms such as lottery scam, charity fraud scams, job offer scams,
and online dating scams to name a few.
It happens when a criminal impersonates a user by stealing his or her personal information to withdraw
money or pay goods online.
It happens when someone or something pretends to be something else to gain our confidence, get access to
our systems, steal data, steal money, or spread malware.
6. Spams
These are unsolicited emails, instant messages coming from recipients that are not granted verifiable
permission for the message to be sent. Spam messages can be damaging if you open or respond to it.
7. Cyberstalking
It refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
V. REFERENCES
This is a list of all sources used in developing this module:
Professionals, I. T. (2016). Empowerment Technologies. Manila: Rex Bookstore Inc.
Lujero, R. P. (2018). Empowerment Technologies. Quezon City: Vibal Group Inc.
https://ictcom444251764.wordpress.com/2018/03/31/empowerment-technologies-lessons-1-15/
https://www.slideshare.net/RochelleNato/rules-of-netiquette-81446275
http://novasexy1.blogspot.com/2017/03/lesson-2-online-safety-security-and.html
https://tools.cisco.com/security/center/resources/virus_differences
https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.
htmlhttps://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-
it.html
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
https://www.enigmasoftware.com/top-5-popular-cybercrimes-how-easily-prevent-them/
https://www.wipo.int/about-ip/en/