EMTECH 11 Lesson 2 - Rules of Netiquette
EMTECH 11 Lesson 2 - Rules of Netiquette
Rules of
Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills
1. First Name Chances are, a hacker already knows plenty of stuff about you
even you only give out your first name. you do not know
whom you can come across.
2. Last Name If sharing your name is a small risk, having both your fist and
last name is riskier. You will be vulnerable to being searched.
Matching a name with a face can bring to cybercrimes and
3. Middle Name like identity
Sharing theft.
just our middle name is probably not the riskiest of
these shared info, but sharing your entire full name would be.
4. Current and Previous School Most people who steal identity study their subject. They can
use these information for verification purposed.
7. Who your siblings are This is a huge risk especially if you have younger siblings.
Strangers may pretend or use their identity to dupe you.
8. Your address Hopefully, you did not give this one. Giving the internet your
number is risky, giving them your address is more dangerous.
9. Your home phone number This information is riskier than sharing your personal phone
number. Scams usually use this information to deceive you,
one of which is when a stranger pretends to know your
parents and pretends
Letting people know yourto be you. is probably a must if you
birthday
10. Your birthday
want to get man gifts. But having it on public makes you
prone to identity theft.
Online Security
• Related to not only the Internet,
often involving browsers
security and World Wide Web,
but also network security as it
applies to other applications or
operating system …. continue
Online Safety
Measures:
1. Never give any personal information about yourself on the internet
2. Never give any banking information not unless it is a reputable business with
secure service
3. Never open messages or attachments from someone you don’t know.
4. Regularly check your privacy settings in your account, to make sure you don’t share
any personal info
5. Make sure to delete your browsing data after using public computers.
Internet
a. Cyber Bullying b. Cyber Stalking
Can work in the same way Harassment on the internet
as bullying in the
Threats
can be just as frightening
playground; the victim feels as other forms of stalking.
frightened and alone, while
Terms)
d. Sexting
The more information you Usually refers to sending and
make available online, the receiving rude messages or
greater the risk of identity videos of:
Naked pictures
theft. Underwear shots
Any sexual texts, images or
videos
2. Privacy Policy / Terms of Service
Tells the user how the website will handle its data
Internet 3. Malware
(Key
designed to disrupt, damage, or gain unauthorized access to a
computer system.
Terms)
a. Virus
A malicious program designed to transfer from one
computer to another in any means possible.
3. Malware
Stands2.for
Privacy Policy
malicious / Terms
software of Service
variants, including
viruses,
Tells the ransom
user how ware and
the website willspyware.
handle its data
Internet
b. Worms c. Trojan
A malicious program A malicious program that is
3. Malware
designed to replicate itself
Threats
disguised as a useful
and transfer from one file program but once
Stands for malicious software variants, including
to another and to transfer downloaded or installed
viruses, ransom ware and spyware.
d. Spyware
leaves our PC unprotected
to hackers.
Terms)
a. Virus e. Adware
A program that runs in the A program designed toone
send you
A malicious program designed to transfer from
background without you advertisements mostly pop-ups.
computer to another in any means possible.
knowing it. It has the ability
to monitor what you are
currently doing.
4. Spam
Unwanted email mostly from advertisers.
Internet 5. Phishing
(Key
passwords and credit card details
Terms)
6. Pharming
A more complicated way of phishing where it exploits the
DNS System.
7. Copyright
A part of law wherein you have the rights to work,
anyone who uses it without your consent is
punishable by law
Threats
Means that an intellectual property ma be used w/o consent as
long as it is used in commentaries, criticisms, parodies,
research etc.
Terms)
Used to record the keystrokes done by user. This is done
to steal passwords or any other sensitive information.