2. • Online security, safety, and
ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search
and research skills
Rules of Netiquette
3. At the end of this lesson, the students should be able to:
1. Identify the rules of Netiquette;
2. Recognize the dangers of the Internet;
3. Discuss the tips to avoid copyright infringement
4. Produce a news casting displaying the
researched news and events related to cybercrime.
5. Consider one’s and others safety when sharing
information on the net.
4. WHAT IS
INTERNET SAFETY?
- it refers to the online
security or safety of people
and their information when
using internet.
6. TEN RULES OF NETIQUETTE
•Rule No. 1: Remember the human
•Rule No. 2: Adhere to the same
standards online that you follow in real
life.
•Rule no. 3: Know where you are in
cyberspace.
•Rule no. 4: Respect other people’s time
and bandwidth.
•Rule no. 5: Make yourself look good
online.
7. TEN RULES OF NETIQUETTE
•Rule no. 6: Share expert knowledge
•Rule no. 7: Help keep flame wars under
control
•Rule no. 8: Respect other people’s
privacy.
•Rule no. 9: Don’t abuse your power.
•Rule no. 10: Be forgiving of other
people’s mistake.
8. Online Safety
and Security
The Internet, truly, is a powerful tool. It can be used
to promote your business, gain new friends, and
stay in touch with the old ones.
It is also a source of entertainment. But like
most things in this world, there is always “another
side of the coin.”
The Internet is one of the most dangerous
places, especially if you do not know what you are
doing.
12. Tips to stay safe online
•Be mindful of what you share online and
what site you share it to;
•Do not just accept terms and conditions,
read it;
•Check out the privacy policy page of a
website to learn how the website handles
the information you share;
•Know the security features of the social
networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile;
13. Tips to stay safe online
•Do not share your password with anyone;
•Avoid logging in to public networks/Wi-Fi.
Browsing in “Incognito mode”, a feature of
the browser, will not protect you from
hackers;
•Do not talk to strangers whether online or
face-to-face;
•Never post anything about a future
vacation. It is similar to posting “Rob my
house at this date.”;
14. Tips to stay safe online
•Add friends you know in real life;
•Avoid visiting untrusted websites;
•Install and update an antivirus software
on your computer. Use only one
antivirus software to avoid conflicts;
•If you have a Wi-Fi at home, make it a
private network by adding a password;
•Avoid downloading anything from
untrusted(e.g. torrents);
15. Tips to stay safe online
•Buy the software; do not use
pirated ones;
•Do not reply or click links from
suspicious emails.
16. Internet Threats:
1. Malware – stands for malicious software
2. Spam – unwanted email mostly from bots
or advertisers. It can be used to send
malware.
3. Phishing – Its goal is to acquire sensitive
personal information like passwords and
credit card details. This is done by sending
you an e-mail that will direct the user to visit a
fake website and be asked to update his/her
username, password, credit card or personal
information.
17. Internet Threats:
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan,
Spyware, Adware
a. Virus – a malicious program designed to
replicate itself and transfer from one
computer to another either through the
Internet and local networks or data storage
like flash drives and CDs
18. Internet Threats:
b. WORM – a malicious program that
transfers from one computer to another by
any types of means.
Ex. ILOVEYOU Worm - The malware originated in the
Pandacan neighborhood of Manila in the Philippines on May 5, 2000.
c. Trojan – a malicious program that is
disguised as a useful program but once
downloaded or installed, leaves your PC
unprotected and allows hackers to get your
information.
19. Internet Threats:
d. Spyware – a program that runs in the
background without you knowing it. It has the
ability to monitor what you are currently
doing and typing through keylogging.
Ex. Keylogger – used to record keystrokes done by the
user. This is done to steal their password or any other sensitive
information. The key logger software typically uses log file to store its
recording.
e. Adware – a program designed to send you
advertisements mostly as pop-ups
20. Internet Threats:
f. Ransomware - or ransom software is
a type of malicious software from crypto
virology that threatens to publish the
victim's data or perpetually
block access to it unless a ransom is
paid.
21. PROTECTING REPUTATIONS
ONLINE
1. Before your post something on the web, ask
these questions to yourself:
• Would you want your parents or
grandparents to see it?
• Would you want your future boss to see
it?
2. If you feel that a post can affect you or
other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
22. COPYRIGHT INFRINGEMENT
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should be
used by others.
This is called intellectual
property.
23. COPYRIGHT INFRINGEMENT
Some tips that could help you
avoid copyright infringement:
Understand – copyright protects literary
works, photographs, painting, drawings,
films, music(lyrics), choreography, and
sculptures, but it generally does NOT
protect underlying ideas and facts.
24. COPYRIGHT INFRINGEMENT
Be responsible – Even if a
material does not say that it is
copyrighted, it is not a valid
defense against copyright. Be
responsible enough to know if
something has a copyright.
25. COPYRIGHT INFRINGEMENT
Be creative – ask yourself whether
what you are making is something
that came from you or something
made from somebody else’s
creativity. It is important to add
your own creative genius in
everything that will be credited to
you.
26. COPYRIGHT INFRINGEMENT
Know the law – in Philippines,
copyright only last a
lifetime(author) plus 50 years.
FAIR USE may be use without
consent as long as it is used in
commentaries, criticism,
education.
27. Think Before You Click
1. Before you post something on the web, ask these questions to
yourself:
Would you want your parents or grandparents to see it?
Would you want your future boss to see it?
Once you post something on the web, you have no control of who sees
your posts.
2. Your friends depend on you to protect their reputation online.
Talk to your friends about this serious responsibility.
3. Set your post to “private.” In this way, search engines will
not be able to scan that post.
4. Avoid using names. Names are easy for search engines to
scan.
5. If you feel that a post can affect you or other’s reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
29. Cyber News Report
•With your group, research for several news
and events related to cybercrime on the
net.
•Be able to identify the sources of the news.
•Using your cellphone or any video-
recording device, report it as if you are a
newscaster.
•Present in 1-2 minutes recording.
31. PERFORMANCE TASK
•The class will be divided into 6 groups.
•Each group will have to present an
INFOMERCIAL or CAMPAIGN with the
theme “THINK BEFORE YOU CLICK”
•The video should not be less than 2
minutes.