0% found this document useful (0 votes)
10 views42 pages

Emtech Lesson 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views42 pages

Emtech Lesson 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Online Safety,

Security and Rules


of Netiquette
Here is where your presentation begins
ENERGIZER!!
Rearrange the Jumbled Letters
UDOCL
UPTIMOCNG

CLOUD COMPUTING
RGEEENNCVOC

CONVERGENCE
ROCIMGGGOLBIN

MICROBLOGGING
LIAOCS
IAEDM

SOCIAL MEDIA
AAEEDTCNTRS

DATACENTERS
IAEPRVT
DUOLC

PRIVATE CLOUD
NAOIRDD

ANDROID
IIUEDSTRBTD
SRVRSEE

DISTRIBUTED
SERVERS
BIMYSNA

SYMBIAN
BBRRLAEYLCK
SO

BLACKBERRY OS
03
Online Safety, Security
and Rules of Netiquette
Lesson 3
Think about it!

01 Internet Safety 02 Netiquette

It refers to the online Is network etiquette,


security or safety of people
and their information when
the do’s and don’ts of
using internet. online communication.
Ten Rules of
Meet us
Netiquette
Rule No. 1
REMEMBER THE
HUMAN
• You need to remember that you are talking to real person when you
are online.
• The internet brings people together who would otherwise never
meet.
• Remember this saying when sending an email: Would I say this to
the person’s face.
Rule No. 2
ADHERE TO THE SAME STANDARDS ONLINE THAT YOU FOLLOW IN
REAL LIFE.
• You need to behave the same way online that you do
in real life.
• You need to remember that you can get caught doing
things you should not be doing online just like you
can in real life.
Rule No. 3

KNOW WHERE YOU ARE IN CYBERSPACE.


• Always take a look around when you enter a
new domain when surfing the web.
• Get a sense of what the discussion group is
about before you join it.
Rule No. 4

RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH.


• Remember people have other things to do besides read
your email. You are not the center of their world.
• Keep your post and emails to minimum by saying what
you want to say.
• Remember everyone won’t answer your questions.
Rule No. 5

MAKE YOURSELF LOOK GOOD ONLINE.


• Be polite and pleasant to everyone.
• Always check your spelling and grammar before
posting.
• Know what you are talking about and make sense
saying it.
Rule No. 6

SHARE EXPERT KNOWLEDGE


• Ask questions online
• Share what you know online.
• Post the answers to your questions online because
someone may have the same question you do.
Rule No. 7

HELP KEEP FLAME WARS UNDER CONTROL


• Netiquette does not forgive flaming.
• Netiquette does however forbid people who
are flaming to hurt discussion groups by
putting the group down.
Rule No. 8

RESPECT OTHER PEOPLE’S PRIVACY.


• Do not read other people’s mail without their
permission.
• Going through other people’s things could cost you, your
job or you could even go to jail.
• Not respecting other people’s privacy is a bad netiquette.
Rule No. 9

DON’T ABUSE YOUR POWER.


• Do not take advantage of other people just
because you have more knowledge or power
than them.
• Treat others as you would want them to treat
you if the roles were reversed.
Rule No. 10

BE FORGIVING OF OTHER PEOPLE’S MISTAKE.


• Do not point out mistakes to people online.
• Remember that you were once the new kid on the
block.
• You still need to have a good manners even though
you are online and cannot see the person face to face.
Security Requirement Triad

Meet us
Security Requirement Triad
• Confidentiality
Data Confidentiality
Privacy

• Integrity
Data Integrity and System
Integrity

• Availability
Misuse: Causes a system component to
perform a function or service that is
detrimental to system security.
Types of System Intruders
• Masquerader
• Hackers
• Clandestine user
Parts of Virus
• Infection mechanism
• Trigger
• PayloaD
VIRUS STAGES
• Dormant phase
Virus is idle.

• Propagation phase
• Virus places an identical copy of itself into other
programs or into certain system areas on the disk.
VIRUS STAGES
• Triggering phase
Virus is activated to perform the function for which it
was intended. Caused by a variety of system events

• Execution phase
• Function is performed
KEY TERMS

Cyber crime- a crime committed or assisted


through the use of the Internet.
Privacy Policy/Terms of Services (ToS) –
tells the user how the website will handle
its data.
Malware- stands for malicious software.
KEY TERMS

Virus- a malicious program designed to transfer from one


computer to another in any means possible.
Worms– a malicious program designed to replicate itself and
transfer from one file folder to another and also transfer to
other computers.
Trojan-a malicious program designed that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get your information.
KEY TERMS

Spyware– a program that runs in the


background without you knowing it. It has
the ability to monitor what you are currently
doing and typing through key logging.
Adware- a program designed to send you
advertisement, mostly pop-ups.
KEY TERMS

Spam– unwanted email mostly from bots or


advertisers.
Phishing- acquires sensitive personal information
like passwords and credits card details.
Pharming- a more complicated way of phishing
where it exploits the DNS system.
KEY TERMS

Copyright- a part of law, wherein you have the


rights to work, anyone who uses it w/o your
consent is punishable by law.
Fair Use- means that an intellectual property may
be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and
etc.
KEY TERMS

Keyloggers- used to record the keystrokes done by user.


This is done to steal passwords or any other sensitive
information.
Rogue security softwares– is a form of malicious software
and internet fraud that misleads users into believing
there is a virus on their computer, and manipulates
them into paying money for a fake malware removal
tool.
Four search strategies

• Keyword searching

Enter terms to search


Use quotation marks to search as a phrase and keep
the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
Four search strategies

• Boolean
AND – enter words connect with AND- it will include sites where both
words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR
greenhouse effect)
NOT – searches for the first term and excludes sites that have the second
term.
(i.e. Washington NOT school)
Four search strategies

• Question
a question may be entered in the search field of search
engine

• Advanced
Features are offered on many engines by going to an
“Advanced search” page and making selections. Effective in
narrowing search returns to a specific topic or phrase.
THANK YOU !

Meet us

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy