0% found this document useful (0 votes)
46 views20 pages

EMTECH 11 Lesson 2 - Rules of Netiquette

EMTECH Grade 11 1st Semester Lesson 2: Introduction to Information and Communication Technology

Uploaded by

Erica Ana Ti-ad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views20 pages

EMTECH 11 Lesson 2 - Rules of Netiquette

EMTECH Grade 11 1st Semester Lesson 2: Introduction to Information and Communication Technology

Uploaded by

Erica Ana Ti-ad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Lesson 2:

Rules of
Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills

By: Ms. Erica Ana P. Ti-ad, LPT


Objectives:
1. consider one’s and others’ safety
when sharing information using the
Internet;
2. consider one’s and others’
reputation when using the Internet;
3. determine and avoid the dangers
of the Internet;
1. consider one’s and others’ safety
when sharing information using the
Internet;
4. be responsible in the use of social
networking sites; and
5. browse the Internet efficiently and
properly through proper referencing.
Netiquette
Is a network
etiquette, the do’s
and don'ts of online
communication.
Online Safety and Security
The Internet, truly, is a powerful tool. It
can be used to promote your business,
gain new friends, and stay in touch with
the old ones. It is also a source of
entertainment. But like most things in this
world, there is always “another side of the
coin.” The Internet is one of the most
dangerous places, especially if you do not
know what you are doing.
Online Safety
• Refers to the safety of people
and their information when
using the internet.
• Refers to the practices and
precautions that should be
observed when using the
internet to ensure safe internet
associated crimes.
Watch
Information and Risk
Type of Information: Risk:

1. First Name Chances are, a hacker already knows plenty of stuff about you
even you only give out your first name. you do not know
whom you can come across.
2. Last Name If sharing your name is a small risk, having both your fist and
last name is riskier. You will be vulnerable to being searched.
Matching a name with a face can bring to cybercrimes and
3. Middle Name like identity
Sharing theft.
just our middle name is probably not the riskiest of
these shared info, but sharing your entire full name would be.

4. Current and Previous School Most people who steal identity study their subject. They can
use these information for verification purposed.

your cellphone number should never be posted over the


5. Cellphone Number Internet. The Internet is a public place. It is the same as
posting your number on a billboard.
Risky, yet not as risky as posting their full names, especially
6. Mother and Father’s Name as posting your mother’s maiden name.
Information and Risk
Type of Information: Risk:

7. Who your siblings are This is a huge risk especially if you have younger siblings.
Strangers may pretend or use their identity to dupe you.

8. Your address Hopefully, you did not give this one. Giving the internet your
number is risky, giving them your address is more dangerous.

9. Your home phone number This information is riskier than sharing your personal phone
number. Scams usually use this information to deceive you,
one of which is when a stranger pretends to know your
parents and pretends
Letting people know yourto be you. is probably a must if you
birthday
10. Your birthday
want to get man gifts. But having it on public makes you
prone to identity theft.
Online Security
• Related to not only the Internet,
often involving browsers
security and World Wide Web,
but also network security as it
applies to other applications or
operating system …. continue
Online Safety
Measures:
1. Never give any personal information about yourself on the internet

2. Never give any banking information not unless it is a reputable business with
secure service
3. Never open messages or attachments from someone you don’t know.

4. Regularly check your privacy settings in your account, to make sure you don’t share
any personal info

5. Make sure to delete your browsing data after using public computers.

6. Keep your software updated to avoid security holes.

7. Do not download or install software or anything on your computer or cellphone that


is unknown to you.
1. Cybercrime
A crime committed or assisted through the use of the
internet.

Internet
a. Cyber Bullying b. Cyber Stalking
Can work in the same way Harassment on the internet
as bullying in the

Threats
can be just as frightening
playground; the victim feels as other forms of stalking.
frightened and alone, while

(Key the bully tries hide from


being caught.
c. Identity Theft

Terms)
d. Sexting
The more information you Usually refers to sending and
make available online, the receiving rude messages or
greater the risk of identity videos of:
 Naked pictures
theft.  Underwear shots
 Any sexual texts, images or
videos
2. Privacy Policy / Terms of Service
Tells the user how the website will handle its data

Internet 3. Malware

Threats Stands for malicious software. It is software that is specifically

(Key
designed to disrupt, damage, or gain unauthorized access to a
computer system.

Terms)
a. Virus
A malicious program designed to transfer from one
computer to another in any means possible.
3. Malware
Stands2.for
Privacy Policy
malicious / Terms
software of Service
variants, including
viruses,
Tells the ransom
user how ware and
the website willspyware.
handle its data

Internet
b. Worms c. Trojan
A malicious program A malicious program that is
3. Malware
designed to replicate itself

Threats
disguised as a useful
and transfer from one file program but once
Stands for malicious software variants, including
to another and to transfer downloaded or installed
viruses, ransom ware and spyware.

(Key to other computers.

d. Spyware
leaves our PC unprotected
to hackers.

Terms)
a. Virus e. Adware
A program that runs in the A program designed toone
send you
A malicious program designed to transfer from
background without you advertisements mostly pop-ups.
computer to another in any means possible.
knowing it. It has the ability
to monitor what you are
currently doing.
4. Spam
Unwanted email mostly from advertisers.

Internet 5. Phishing

Threats Acquires sensitive personal information like

(Key
passwords and credit card details

Terms)
6. Pharming
A more complicated way of phishing where it exploits the
DNS System.
7. Copyright
A part of law wherein you have the rights to work,
anyone who uses it without your consent is
punishable by law

Internet 8. Fair Use

Threats
Means that an intellectual property ma be used w/o consent as
long as it is used in commentaries, criticisms, parodies,
research etc.

(Key 9. Key Loggers

Terms)
Used to record the keystrokes done by user. This is done
to steal passwords or any other sensitive information.

10. Rogue Security Software


Is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer and
manipulates them to pay to remove the fake virus.
Copyright Infringement
If you create something—an
idea, an invention, a form of
literary work, or a research,
you have the right of how it
should be used by others.
This is called intellectual
property.
Think Before You Click
1. Before you post something on the web, ask these questions to yourself:
Would you want your parents or grandparents to see it? Would you want your
future boss to see it? Once you post something on the web, you have no
control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will not be able to
scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.
Activity
• Group yourself by 10’s
• In a 1 whole sheet of
yellow pad create a
script /skit for a
dramatization/commerci
al on the theme: Internet
Safety as a Priority
Activity
• Present a 5-minute
commercial or a campaign
with the theme "Think before
you click.“
• Rubric for Grading:
Relevance to the topic – 5
Application of Lesson/Concept – 5
Clarity of Information- 5
Creativity – 5
Within Given Time Frame - 5
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy