0% found this document useful (0 votes)
28 views39 pages

Module 4 Living in the It Era

Uploaded by

Akheza Ladeza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views39 pages

Module 4 Living in the It Era

Uploaded by

Akheza Ladeza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

MODULE 4: THE

NETIQUETTE
AND THE
COMPUTER
ETHICS
The Netiquette and The Computer
ethics discusses about the ethical
issues in the field of computer. May it
be in online or practicing in
professional.
Objectives
AT THE END OF THIS MODULE, YOU SHOULD
BE ABLE TO:

• Discuss the importance of being a respons


ible netizen by following the rules of com
mon courtesy online and the informal “rul
es of the road” of cyberspace.
• Discuss the difference between privacy an
d security.
• Explain various risks to internet privacy
Lesson 1: Netiquette
Simple stated, it’s network etiquette – that
is the etiquette of cyberspace and
“etiquette” means the forms of required
by good breeding or prescribed by
authority to be required in social or official
life. In other words, netiquette is a set of
rules for behaving properly online.
Rules That
Will Help You
Communicate
REMEMBER THE GOLDEN RULE

Even though you may be interacting


REMEMBER with a computer screen, you are
THE GOLDEN communicating with a real person
RULE who will react to your message.
Make a good impression - treat
others with the same respect that
you would like to receive and avoid
confrontational or offensive
language.
Rules That Will Help You
1.Communicate
Avoid slang, acronyms, and text talk.
2. Avoid “screaming” in typed messages.
3. Proofread your messages before
sending them.
4. Exercise good judgment when sharing
information with others online.
5. Respect diversity in viewpoints.
Ten
Commandment
s of Computer
Ethics
Ten Commandments of Computer
Ethics
Rule 1: Remember the human
when communicating
electronically
Rule 2: Adhere to the same
standards of behavior online that
you follow in real life
Rule 3: Know where you are in
cyberspace "Netiquette varies from
domain to domain."
Ten Commandments of Computer
Ethics
Rule 4: Respect other people's
time and bandwidth
Rule 5: Make yourself look good
online writing
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under
control
Ten Commandments of Computer
Ethics
Rule 8: Respect other people's
privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's
mistakes
Lesson 2: Cybercrimes
Cybercrime is defined as a crime in which
a computer is the object of the crime
(hacking,
phishing, spamming and child
pornography) is used as a tool to commit
an offense.

Cybercriminals may use computer


technology to access personal information,
Cybercrimes Laws and
Regulations
Republic Act No. 10175 Cybercrime
Prevention Act of 2012 is a law in the
Philippines approved on September
12,2012 which aims to address legal
issues concerning online interactions and
internet.

Republic Act No. 10173 Data Privacy


Act of 2012 is an act protecting
COMMON FORMS
OF
CYBERCRIMES
COMMON FORMS OF
a. CYBERCRIMES
Copyright
The exclusive legal right, given to an originator or
an assignee to print, publish, perform, film, or record
literary, artistic, or musical material, and to authorize
others to do the same.

Copyright infringement is the violation, piracy or


theft of a copyright holder's exclusive rights
through the unauthorized use of a copyrighted
COMMON FORMS OF
b. CYBERCRIMES
Plagiarism
An act or instance of using or closely
imitating the language and thoughts of
another author without authorization.
c. Computer Addiction
• Offline: generally used when speaking about
excessive gaming behavior, which can be practiced
both offline and online.
COMMON FORMS OF
CYBERCRIMES
• Online: Also known as “Internet Addiction”, gets
more attention in general from scientific research
than offline computer addiction, mainly because
most cases of computer addiction are related to
the excessive use of the internet.

Virtual Self - The persona you create about yourself


virtually.
CRIMINAL
ACTIVITIES
A. Hacking
• Unauthorized access of or • Illegal Access
interference with computer systems, • Illegal Interception
servers, or other information and • Data Interference
communication systems • System Interference
• Unauthorized access to corrupt, alter, • Misuse of Devices
steal, or destroy electronic data using • Infection of IT Systems with Malware – if the
computers or other information and act is committed against critical
communication systems without the infrastructure of the Philippines the, penalty
computer or system owner’s is between 12-20 years reclusion temporal
knowledge and consent • Six years up to twelve years of
• The introduction of computer viruses imprisonment also known as prison mayor.
resulting in the corruption, alteration,
B. Computer-related forgery, fraud
and/or identity theft

• An attempt to obtain sensitive information such as


usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
C. Electronic theft

• Illegal Downloading
• Obtaining files that you do not have the right to use from
the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video,
computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
D. Cyberbullying
• The use of electronic communication to bully a person,
typically by sending a message of an intimidating or
threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
E. Cybersex
• Willful engagement, maintenance, control, or operation,
directly or indirectly of any lascivious exhibition of sexual
organs or sexual activity with the aid of a computer system
for favor or consideration.
• There is a discussion on this matter if it involves “couples” or
“people in relationship” who engage in cybersex.
F. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of
2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal

G. Cyber Defamation
• Is an unprivileged false statement of fact which tends to
harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
Lesson 3: Internet Threats

Internet-based threats expose people


and computer systems to harm
online.
Hacking is a term used to describe
actions taken by someone to gain
unauthorized access to a computer.

What it can do:


• Find weaknesses (or pre-existing
bugs) in your security settings and
exploit them in order to access your
information.
• Install a Trojan horse, providing a
back door for hackers to enter and
search for your information.
Malware is one of the more common
ways to infiltrate or damage your
computer.

What it can do:


• Intimidate you with scareware,
which is usually a pop-up message
that tells you your computer has a
security problem or other false
information.
• Reformat the hard drive of your
computer causing you to lose all your
information.
• Alter or delete files.
• Steal sensitive information.
• Send emails on your behalf.
• Take control of your computer and
Pharming is a common type of
online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the legitimate
URL. Even if the URL is entered
correctly, it can still be redirected to
a fake website.

What it can do:


• Convince you that the site is real
and legitimate by spoofing or
looking almost identical to the
actual site down to the smallest
details. You may enter your personal
information and unknowingly give it
to someone with malicious intent.
Phishing is used most often by cyber
criminals because it's easy to execute
and can produce the results they're
looking for with very little effort.
They're sent by criminals to steal
personal and financial information
from you. This is also known as
“spoofing”.

What it does:
• Trick you into giving them
information by asking you to update,
validate or confirm your
account.
• Provides cyber criminals with your
username and passwords so that they
can access your
accounts (your online bank account,
shopping accounts, etc.) and steal
your credit card
numbers.
Ransomware is a type of malware that
restricts access to your computer or
your files and displays a message that
demands payment in order for the
restriction to be removed.
What it does:
• There are two common types of
ransomware:
a. Lockscreen ransomware: displays an
image that prevents you from accessing
your computer
b. Encryption ransomware: encrypts
files on your system's hard drive and
sometimes on shared network drives,
USB drives, external hard drives, and
even some cloud storage drives,
preventing you from opening them
• Ransomware will display a
notification stating that your
computer or data have been locked
and demanding a payment be made
What you can do:
• Do not pay the ransom.
• Contact a reputable computer
technician or specialist to find out
whether your computer can be
repaired and your data retrieved.
• Regularly back-up your data with a
removable external storage drive.
Spam is one of the more common
methods of both sending information
out and collecting it from
unsuspecting people.
What it does:
• Annoy you with unwanted junk mail.
• Create a burden for
communications service providers
and businesses to filter electronic
messages.
• Phish for your information by
tricking you into following links or
entering details with too-good-to-
be-true offers and promotions.
• Provide a vehicle for malware,
scams, fraud and threats to your
privacy.
Spyware and adware are often used
by third parties to infiltrate your
computer. These are software that
collects personal information about
you without you knowing.
What it does:
• Collect information about you
without you knowing about it and
give it to third parties.
• Send your usernames, passwords,
surfing habits, list of applications
you've downloaded, settings, and
even the version of your operating
system to third parties.
• Change the way your computer
runs without your knowledge.
• Take you to unwanted sites or
inundate you with uncontrollable
pop-up ads.
A Trojan horse may not be a term
you're familiar with, but there's a good
chance you or someone you know has
been affected by one. A malicious
program that is disguised as, or
embedded within, legitimate software.
What it does:
• Delete your files.
• Use your computer to hack other
computers.
• Watch you through your web cam.
• Log your keystrokes (such as a
credit card number you entered in
an online purchase).
• Record usernames, passwords and
other personal information.
Virus - Malicious computer programs
that are often sent as an email
attachment or a
download with the intent of infecting
your computer, as well as the
computers of
everyone in your contact list. Just
visiting a site can start an automatic
download of
a virus.
What they can do:
• Send spam.
• Provide criminals with access to
your computer and contact lists.
• Scan and find personal information
like passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• When a program is running, the virus
attached to it could infiltrate your hard
drive and also spread to USB keys and
external hard drives.
How will you know if your computer is
infected?
• It takes longer than usual for your
computer to start up, it restarts on its
own or doesn't start up at all.
• It takes a long time to launch a
program.
• Files and data have disappeared.
• Your system and programs crash
constantly.
• The homepage you set on your web
browser is different (note that this
How will you know if your computer is
infected?
• Web pages are slow to load.
• Your computer screen looks
distorted.
• Programs are running without your
control.
• If you suspect a problem, make sure
your security software is up to date
and run it to check for infection. If
nothing is found, or if you are unsure
of what to do, seek technical help.
WiFi eavesdropping is another method
used by cyber criminals to capture
personal information.
Virtual “listening in” on information
that's shared over an unsecure (not
encrypted)
WiFi network.
What it does:
• Potentially access your computer
with the right equipment.
• Steal your personal information
including logins and passwords.
Worms are a common threat to
computers and the Internet as a
whole.
A worm, unlike a virus, goes to work
on its own without attaching itself to
files or programs. It lives in your
computer memory, doesn't damage or
alter the hard drive and propagates by
sending itself to other computers in a
network – whether within a company
or the computer itself.
What it does:
• Spread to anyone in your contact
list.
• Cause a tremendous amount of
damage by shutting down parts of
the internet, wreaking havoc on an
internal network and costing
Do you have
any
questions?
Send it to us! We hope you
learned something new.
Thank You!!!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy