Etech Session 1-4 (Modular)
Etech Session 1-4 (Modular)
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
SPAM – the fact that most of our email accounts come with a “Spam” or “Junk” folder insinuates
that spam emails is a huge issue. Aside from being an annoyance, spam emails are not a direct
threat. However, many can contain malware.
• Unwanted email mostly from bots or advertisers. An internet bot, also known as web robot or
simply bot, is a software application that runs automated tasks (scripts) over the internet.
ADWARE – it is a type of malware software that displays unwanted ads when a user is surfing
the internet.
TROJAN - Trojans leave your computer completely unprotected which can mean that hackers
can steal any data from your system. Trojans often present themselves as harmless computer
programs so that hackers can penetrate your computer without being detected.
VIRUS – viruses usually attach themselves covertly to downloads as they are designed to
spread at an alarming rate virus are often attached to files for download, shared via CDs, DVDs,
and USB sticks or loaded on to computers by opening infected email attachments.
PHISHING – in its simplest terms, phishing is a form of fraudulent activity. Often, official looking
emails are sent impersonating a well-known provider, such as a bank.
• The attempt to obtain personal information.
SPYWARE – it is usually attached to pop-ups of downloadable files. Whoever is controlling the
spyware has access to your personal details without you even knowing.
KEYLOGGER – like a part of spyware, keyloggers record a user’s keyboard action.
PHARMING – Pharmers often create web pages mimicking that of a trustworthy business, such
as an online banking log-in page. Users will then enter their details, thinking they are logging
into their usual service, and their details will be stolen by the pharmer.
ROGUE SECURITY SOFTWARE – if you are ever downloading antivirus or anti-spyware
programs, make sure you have purchased it from a legitimate source. Rogue Security Software
will often ask you to pay for extra protection, which is huge. The security software is completely
useless, and criminals have robbed you of your money.
TEN CORE RULES OF NETIQUTTE
1. Remember the human. Remember the quotation from Confucious, “do not do unto others,
what you don’t want to do unto you”. While you’re interacting online, always be mindful to be
vigilant and to be cautious of who you interact with.
2. Adhere to the same standards of behavior online that you follow in real life. How you
talk in real life, should also be how you do it online. Don’t pretend to be somebody you are not
just because you are behind your computer desks. Be professional.
3. Know where you are in cyberspace. Always bear in mind that there are many threats online
so you must know where to go and always check your activities to make sure that what you are
doing is still safe and will not endanger your life or your work.
4. Respect other people’s time and bandwidth. Not because you’re online, you can do
anything anytime you want. Respect your clients time and privacy. Contact during reasonable
hours and never use their information and disclose it to someone unauthorized, even for your
own sake
5. Make yourself look good online. Try to be formal and as presentable as you can online. It
won’t harm you to get a nice and good first impression from possible clients.
6. Share expert knowledge. Don’t spread unreliable news. Never be part of fake news
perpetrators and to the rampant mis and disinformation of netizens.
7. Help keep flame wars under control. Don’t engage in online wars. As long as you can don’t
involve your work with your personal agendas.
8. Respect other people’s privacy. Don’t take your client’s information for granted. They
trusted you enough to give it to you, and so you must hold and keep that trust to create a good
customer - service provider relationship.
9. Don’t abuse your power. Just like how the Spiderman movie states, “with great power,
comes great responsibility.” Use your authority wisely.
10. Be forgiving of other people’s mistakes. Nobody’s perfect. Learn how to manage
whenever a colleague creates a mistake. Teach them, don’t flaunt their flaws.
It is the practice of using Internet information, especially free information on the World Wide
Web, in research.
focused and purposeful (so not recreational browsing)
uses Internet information or Internet-based resources (like Internet discussion
forum)
tends towards the immediate (drawing answers from information you can access
without delay)
tends to access information without a purchase price.
Research
1. Make a comparison of two online platforms and which do you prefer to use?
Example: Facebooks Versus Instagram: I prefer to use Facebook because I can browse
more pictures, videos and even chat my friends everyday.
2. Directions: Using the Internet, look for the online platforms and applications listed below.
Evaluate whether they are Social Media, Search Engines, Communication Services,
Payment Systems and Advertising Platforms.
Yahoo-
Facebook -
Google-
Instagram-
Tiktok-
Paymaya-
Gcash-
Smart-
Globe-
Twitter-
3. What is Cybercrime?
4. What is Netiquette?
6. What do you think is the biggest obstacle that researchers are facing when using Internet?
7. Give a sample scenario where in the violation of copyright infringement law was violated.