Module 4 Living in the It Era
Module 4 Living in the It Era
NETIQUETTE
AND THE
COMPUTER
ETHICS
The Netiquette and The Computer
ethics discusses about the ethical
issues in the field of computer. May it
be in online or practicing in
professional.
Objectives
AT THE END OF THIS MODULE, YOU SHOULD
BE ABLE TO:
• Illegal Downloading
• Obtaining files that you do not have the right to use from
the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video,
computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
D. Cyberbullying
• The use of electronic communication to bully a person,
typically by sending a message of an intimidating or
threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
E. Cybersex
• Willful engagement, maintenance, control, or operation,
directly or indirectly of any lascivious exhibition of sexual
organs or sexual activity with the aid of a computer system
for favor or consideration.
• There is a discussion on this matter if it involves “couples” or
“people in relationship” who engage in cybersex.
F. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of
2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion temporal
G. Cyber Defamation
• Is an unprivileged false statement of fact which tends to
harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
Lesson 3: Internet Threats
What it does:
• Trick you into giving them
information by asking you to update,
validate or confirm your
account.
• Provides cyber criminals with your
username and passwords so that they
can access your
accounts (your online bank account,
shopping accounts, etc.) and steal
your credit card
numbers.
Ransomware is a type of malware that
restricts access to your computer or
your files and displays a message that
demands payment in order for the
restriction to be removed.
What it does:
• There are two common types of
ransomware:
a. Lockscreen ransomware: displays an
image that prevents you from accessing
your computer
b. Encryption ransomware: encrypts
files on your system's hard drive and
sometimes on shared network drives,
USB drives, external hard drives, and
even some cloud storage drives,
preventing you from opening them
• Ransomware will display a
notification stating that your
computer or data have been locked
and demanding a payment be made
What you can do:
• Do not pay the ransom.
• Contact a reputable computer
technician or specialist to find out
whether your computer can be
repaired and your data retrieved.
• Regularly back-up your data with a
removable external storage drive.
Spam is one of the more common
methods of both sending information
out and collecting it from
unsuspecting people.
What it does:
• Annoy you with unwanted junk mail.
• Create a burden for
communications service providers
and businesses to filter electronic
messages.
• Phish for your information by
tricking you into following links or
entering details with too-good-to-
be-true offers and promotions.
• Provide a vehicle for malware,
scams, fraud and threats to your
privacy.
Spyware and adware are often used
by third parties to infiltrate your
computer. These are software that
collects personal information about
you without you knowing.
What it does:
• Collect information about you
without you knowing about it and
give it to third parties.
• Send your usernames, passwords,
surfing habits, list of applications
you've downloaded, settings, and
even the version of your operating
system to third parties.
• Change the way your computer
runs without your knowledge.
• Take you to unwanted sites or
inundate you with uncontrollable
pop-up ads.
A Trojan horse may not be a term
you're familiar with, but there's a good
chance you or someone you know has
been affected by one. A malicious
program that is disguised as, or
embedded within, legitimate software.
What it does:
• Delete your files.
• Use your computer to hack other
computers.
• Watch you through your web cam.
• Log your keystrokes (such as a
credit card number you entered in
an online purchase).
• Record usernames, passwords and
other personal information.
Virus - Malicious computer programs
that are often sent as an email
attachment or a
download with the intent of infecting
your computer, as well as the
computers of
everyone in your contact list. Just
visiting a site can start an automatic
download of
a virus.
What they can do:
• Send spam.
• Provide criminals with access to
your computer and contact lists.
• Scan and find personal information
like passwords on your computer.
• Hijack your web browser.
• Disable your security settings.
• When a program is running, the virus
attached to it could infiltrate your hard
drive and also spread to USB keys and
external hard drives.
How will you know if your computer is
infected?
• It takes longer than usual for your
computer to start up, it restarts on its
own or doesn't start up at all.
• It takes a long time to launch a
program.
• Files and data have disappeared.
• Your system and programs crash
constantly.
• The homepage you set on your web
browser is different (note that this
How will you know if your computer is
infected?
• Web pages are slow to load.
• Your computer screen looks
distorted.
• Programs are running without your
control.
• If you suspect a problem, make sure
your security software is up to date
and run it to check for infection. If
nothing is found, or if you are unsure
of what to do, seek technical help.
WiFi eavesdropping is another method
used by cyber criminals to capture
personal information.
Virtual “listening in” on information
that's shared over an unsecure (not
encrypted)
WiFi network.
What it does:
• Potentially access your computer
with the right equipment.
• Steal your personal information
including logins and passwords.
Worms are a common threat to
computers and the Internet as a
whole.
A worm, unlike a virus, goes to work
on its own without attaching itself to
files or programs. It lives in your
computer memory, doesn't damage or
alter the hard drive and propagates by
sending itself to other computers in a
network – whether within a company
or the computer itself.
What it does:
• Spread to anyone in your contact
list.
• Cause a tremendous amount of
damage by shutting down parts of
the internet, wreaking havoc on an
internal network and costing
Do you have
any
questions?
Send it to us! We hope you
learned something new.
Thank You!!!