0% found this document useful (0 votes)
100 views29 pages

Lesson 2 - Netiquette

Uploaded by

Glere Tolentino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views29 pages

Lesson 2 - Netiquette

Uploaded by

Glere Tolentino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Lesson 2: Rules

of Netiquette
OBJETIVES
At the end of this lesson, the students should be able to:
 1. Consider one’s and others’ safety when sharing
information using the internet;
 2. Consider one’s and others’ reputation when using the
internet;
 3. Determine and AVOID the dangers of the internet;
 4. Be responsible in the use of social networking sites; &
 5. Browse the internet efficiently & properly through proper
referencing.
Online Safety and Security
Internet
Internet
is defined as
information
superhighway.
Anyone who has access to this
highway, can place information
and can grab that information.
Internet Threats
Malware
 malicious software
computer viruses Spam
 worms Phishing
Trojan horses other malicious
spyware programs.
adware, and
 Itcan take the form of executable code,
scripts, active content, and other software.
Computer Virus
A computer virus is a malware that; when executed,
replicates by reproducing itself or infecting other
programs by modifying them.

 The term computer virus was a misnomer until it was


coined by Fred Cohen in 1985.
Worm
A computer worm is a
standalone malware computer
program that replicates itself in
order to spread to other computers.
Trojan
a malicious program that is
disguised as useful program
but once installed, leave your
PC unprotected and allows
hackers to get your
information.
Adware
a program designed to send
advertisement, mostly as pop-
ups.
Spyware
a program that runs in the
background without you knowing it. It
has ability to monitor what are you
currently doing and typing through
keylogging.
keyloggers – used to record the
keystroke done by the users
Spam
unwanted emails mostly from
bots or advertisers. It can be used
to send malware.
Phishing
its goal is to acquire sensitive
information like password and
credit card details.
Tips to stay safe online
1. Be mindful of what you shares
online and what site you share it
to.
2. don’t just accept terms and
conditions;READ IT.
3. Check out the privacy policy
page of a website.
4. Know the security features of
social networking site you use.
5. Do not share your password
with anyone
6. Avoid logging in to public
networks/Wi-Fi.
7. Do not talk to strangers
whether online or face-to-face.
8. Never post anything about a
future vacation.
“Rob my house at this date”
9. Add friends you know in real
life.
10. Avoid visiting untrusted
website
11. Install and update antivirus
software on your computer.
12. If you have a Wi-Fi at home,
make a private network by adding
a password.
13. Avoid downloading anything
from untrusted websites.
14. Buy the software; do not use
pirated ones.
15. Do not reply or click links from
suspicious emails.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy