2. QUIZ
1. Which of the following is a communication
service provider in the Philippines?
a. Lazada
b. Smart Telecommunication
c. Social Security System
d. Twitter
3. QUIZ
2. Which of the following is the operating
system of Blackberry phones?
a. Blackberry OS
b. Candy
c. Symbian
d. Windows Mobile
4. QUIZ
3. What type of social media website is
Pinterest?
a. Blogs and Forums
b. Bookmarking Site
c. Media Sharing
d. Microblogging
5. QUIZ
4. Which of the following types of social media
websites focuses on short updates posted by the
user?
a. Blogging
b. Hashtagging
c. Microblogging
d. Social Media
6. QUIZ
5. What is the online platform where you can
store your files online?
a. Google Drive
b. Photoshop
c. PowerPoint
d. YouTube
7. QUIZ
6. What online platform is use for hashtags
and posting pictures?
a. Facebook
b. Instagram
c. Snapchat
d. Twitter
8. QUIZ
7. Which platform can be useful for marketing
tangible products?
a. Facebook
b. Instagram
c. Pinterest
d. Twitter
9. QUIZ
8. Which is the leading video-sharing platform?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
10. QUIZ
9. What platform is used for advertising?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
12. QUIZ
11. What social networking site can register and post
your profile, connect with friends, and comment on
topics in a generally interactive way?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
13. QUIZ
12.Which is specially designed for businesses
and professionals?
a. Google Drive
b. Instagram
c. LinkedIn
d. Photoshop
14. QUIZ
13. Which allows users to create and manage advertising
campaigns, generate reports, and retrieve information
about the ads, campaigns, and organizations associated
with an account?
a. Advertising platforms
b. Communication platforms
c. Grouping platforms
d. Teaching platform
15. QUIZ
14.What country had a social media penetration rate
of 58 percent, higher than the average of 47
percent in Southern Asia?
a. Argentina
b. Brazil
c. Philippines
d. South Korea
16. QUIZ
15.Which site allows you to upload and share
media content like images and music?
a. Facebook
b. Pinterest
c. Twitter
d. YouTube
17. 01
NETIQUET
TE
Network Etiquette is concerned with the “proper” manner of
communication in the online environment.
Acceptable rules for online behavior.
18. OBJECTIVES
consider one’s and others’
safety when sharing
Information using the
Internet
determine and avoid the
dangers of the Internet
be responsible in the use
of social networking sites
browse the Internet
efficiently and properly
through proper referencing
consider one’s and others’
reputation when using the
Internet
19. LESSON CONTENT
Online security, safety, and ethics
Internet threats
Protecting reputations online
Copyright
Rules of Netiquette
21. “Your safety is your responsibility”
It is also called CYBER
SAFETY or DIGITAL
SAFETY which refers to
practice and precautions
one observe when using
the internet.
ONLINE SAFETY
23. ONLINE SAFETY
FIRST NAME
There is still a risk in sharing your first name.
chances are, hacker already knows plenty of
stuff about you even if you only give out your
first name.
LAST NAME
If sharing your first name has a small risk,
sharing both your first and last name is more
risky.
24. ONLINE SAFETY
MIDDLE NAME
Sharing your middle name is probably not the
most risky of these shared information, but
sharing your entire full name would be.
CURRENT & PREVIOUS SCHOOL
Most people who steal identities study their
subject. They can use this information for
verification purposes.
25. ONLINE SAFETY
CELL PHONE NUMBER
Your cell phone number should never be posted
over the internet. The internet is a public place,
it is the same as posting your number on a
billboard.
WHO YOUR MOTHER & FATHER ARE
Risky yet not as risky as posting their full names,
especially your Mother’s Maiden Name.
26. ONLINE SAFETY
WHO YOUR SIBLINGS ARE
This is a huge risk especially if you have a
younger siblings. Strangers may pretend or use
their identity to dupe you.
YOUR ADDRESS
It would be much easier for criminals to find
you.
27. ONLINE SAFETY
YOUR LANDLINE NUMBER
Scams usually use this information to deceive
you, one of which is when a stranger pretends
to know your parents or pretends to be you.
YOUR BIRTHDAY
Having it in your profile makes you more
vulnerable to identity theft.
28. HOW TO STAY SAFE ONLINE?
Create a smart and strong password
(upper and smaller case, number, special characters)
Use email wisely
Be smart when using instant
messaging application
Watch out for phishing scams
29. HOW TO STAY SAFE ONLINE?
Makes sure that your security
software is running efficiently
Use the privacy setting of social
networking sites
Never post your complete your
identity information
30. HOW TO STAY SAFE ONLINE?
Think carefully before posting a
picture or video of yourself
Shop safely
When you see something worrisome
or when you feel uncomfortable and
unsafe, leave the website immediately
31. A very broad issue covering security
relation to a transaction made over the
internet.
INTERNET
SECURITY
33. TYPES OF SYSTEM INTRUDER
MASQUERADER
Unauthorized user who penetrates a system
exploiting a legitimate user’s account (outside).
HACKER
Legitimate user who makes unauthorized
accesses or misuses his privileges (inside).
CLANDESTINE USER
Seizes supervisory control to evade auditing and
access controls or suppress audit
collection (inside/outside)
34. PARTS OF VIRUS
INFECTION MECHANISM
The means by which a virus spreads, enabling it
to replicate. The mechanism is also referred to
as the infection vector.
This is how the virus spreads or propagates. A
virus typically has a search routine, which
locates new files or new disks for infection
35. PARTS OF VIRUS
TRIGGER
Also known as a logic bomb, this is the compiled
version that could be activated any time within
an executable file when the virus is run that
determines the event or condition for the
malicious "payload" to be activated or delivered
such as a particular date, a particular time,
particular presence of another program,
capacity of the disk exceeding some limit, or
a double-click that opens a particular file.
36. PARTS OF VIRUS
PAYLOAD
The "payload" is the actual body or data which
carries out the malicious purpose of the virus.
Payload activity might be noticeable (e.g.,
because it causes the system to slow down or
"freeze"), as most of the time the "payload" itself
is the harmful activity, or sometimes non-
destructive but distributive, which is called virus
hoax.
37. VIRUS STAGES
DORMANT PHASE
The Virus is idle.
PROPAGATION PHASE
Virus places an identical copy of itself into other
programs or into certain system areas on the
disk.
38. VIRUS STAGES
TRIGGERING PHASE
Virus is activated to perform the function for
which it was intended.
EXECUTION PHASE
It can be destructive such as deleting files on
disk, crashing the system, or corrupting files or
relatively harmless such as popping up
humorous or political messages on screen.
40. INTERNET THREATS
1. CYBER CRIME – a crime committed
or assisted through the use of the
Internet.
a. CYBER BULLYING – can work in the
same way as bullying in the playground;
the victim feels frightened and alone,
while the bully tries to hide from being
caught.
41. CYBER CRIME
b. CYBER STALKING – Harassment on the
internet can be just as frightening as other
forms of stalking.
c. IDENTITY THEFT – The more information
you make available online, the greater the
risk of identity theft. It can be very tempting
to reply to an email or open an attachment
or post information about yourself on social
networking sites, but you should never do
it.
42. CYBER CRIME
d. SEXTING – usually refers to sending and
receiving rude messages or videos of:
• Naked pictures
• Underwear shots
• Any sexual texts, images or videos
– These images or videos can be sent from
a boyfriend or girlfriend or a friend or
someone you've met online. You also may
have sent a sexual photo, video or text to
someone else.
43. CYBER CRIME
d. SEXTING – remember:
There is no turning back once you press
send.
Even if you use apps like Snapchat the
person can take a screen shot
You risk being seen as someone you are
not.
44. INTERNET THREATS
2. PRIVACY POLICY / TERMS OF SERVICE –
tells the user how the website will handle its
data.
3. MALWARE – stands for malicious software
variants, including viruses, ransom ware
and spyware.
a. Virus - a malicious program designed to
transfer from one computer to another
in any means possible.
45. MALWARE
b. Worms - a malicious program designed
to replicate itself and transfer from one
file folder to another and also transfer
to other computers.
c. Trojan - a malicious program designed
that is disguised as a useful program
but once downloaded or installed,
leaves your PC unprotected and allows
hacker to get your information.
46. MALWARE
d. Spyware - a program that runs in the
background without you knowing it. It
has the ability to monitor what you are
currently doing and typing through key
logging.
e. Adware - a program designed to send
you advertisement, mostly pop-ups.
47. INTERNET THREATS
1. PHARMING – a more complicated
way of phishing where it exploits the
DNS system.
2. SPAM – unwanted email mostly from
bots or advertisers. It can be used to
send malware
3. PHISHING – its goal is to acquire
sensitive personal information like
passwords and credit card details
48. THINK BEFORE YOU CLICK
Before you post something on the web,
ask these questions to yourself: Would
you want your parents or grandparents to
see it? Would you want your future boss to
see it? Once you post something on the
web, you have no control of who sees your
posts.
Your friends depend on you to protect
their reputation online. Talk to your
friends about this serious responsibility.
49. THINK BEFORE YOU CLICK
Set your post to “private.” In this way,
search engines will not be able to scan
that post.
If you feel that a post can affect you or
other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
Avoid using names. Names are easy for
search engines to scan.
50. Refers to a set of MORAL
PRINCIPLES that govern an
individual or a group on
what is considered as
ACCEPTABLE BEHAVIOR
while using a computer
ETHICS
52. “Do unto others as you would have
others do unto you.“
Rule 1: Remember the
Human
Your written words are read by
real people, all deserving of
respectful communication.
Before you press send or
submit as yourself, “would I be
okay with this is someone else
had written it?”
53. Rule 2: Adhere to the same standards of
behavior online that you follow in real life
While it can be argued that standards of
behavior may be different in the virtual world,
they certainly should not be lower. You should do
your best to act within the laws and ethical
manners of society whenever you inhabit
"cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no.
Neither should you behave this way in the virtual
world.
54. Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain."
(Shea, 1994) Depending on where you are in
the virtual world, the same written
communication can be acceptable in one
area, where it might be considered
inappropriate in another. What you text to a
friend may not be appropriate in an email to a
classmate or colleague.
55. Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read
and time in which to respond. Most people today
lead busy lives, just like you do, and don't have time
to read or respond to frivolous emails or discussion
posts. As a virtual world communicator, it is your
responsibility to make sure that the time spent
reading your words isn't wasted. Make your written
communication meaningful and to the point,
without extraneous text or superfluous graphics or
attachments that may take forever to download.
56. Rule 5: Make yourself look good online
One of the virtual world's best things is the lack
of judgment associated with your physical
appearance, the sound of your voice, or the
clothes you wear (unless you post a video of
yourself singing Karaoke in a clown outfit.) The
quality of your writing will judge you, so keep
the following tips in mind:
* Always check for spelling and grammar
errors
* Know what you're talking about and state it
clearly
57. Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is
the ease in which information can be shared or
accessed, and in fact, this "information sharing"
capability is one of the reasons the Internet was
founded. So in the spirit of the Internet's "founding
fathers," share what you know! When you post a
question and receive intelligent answers, share the
results with others. Are you an expert at
something? Post resources and references for your
subject matter. You have recently expanded your
knowledge about a subject that might be of
interest to others? Share that as well.
58. Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a
strongly held opinion without holding back any
emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on a
sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts
between one another, must be controlled, or the
camaraderie of the group could be compromised.
Don't feed the flames; extinguish them by guiding the
discussion back to a more productive direction.
59. Rule 8: Respect other people’s privacy
Depending on what you are reading in the virtual
world, be it an online class discussion forum, Facebook
page, or an email, you may be exposed to some private
or personal information that needs to be handled with
care. Perhaps someone is sharing some medical news
about a loved one or discussing a situation at work.
What do you think would happen if this information
"got into the wrong hands?" Embarrassment? Hurt
feelings? Loss of a job? Just as you expect others to
respect your privacy, so should you respect the privacy
of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual
communication.
60. Rule 9: Don’t abuse your power
Like in face-to-face situations, there are people in
cyberspace who have more "power" than others.
They have more expertise in technology or have
years of experience in a particular skill or subject
matter. Maybe it is you who possesses all of this
knowledge and power! Just remember, knowing
more than others do or having more power than
others may have does not give you the right to
take advantage of anyone.
Think of Rule 1: Remember the human
61. Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone
knows the rules of Netiquette. At some point, you
will see a stupid question, read an unnecessarily
long response, or encounter misspelled words;
when this happens, practice kindness and
forgiveness as you would hope someone would do if
you had committed the same offense. If it's a minor
"offense," you might want to let it slide. If you feel
compelled to respond to a mistake, do so in a
private email rather than a public forum.
63. COPYRIGHT
INFRINGEMENT
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
64. CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon and infographics & images by Freepik
THANK
S!
DO YOU HAVE ANY QUESTIONS?
#17:“Break the Barrier” before starting the lesson. Give the etymological meaning of Netiquette and define what the term means.
#22:Number your paper form 1-10. write shared or not shared
#52:You need to remember that you are talking to a real person when you are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the person’s face.
#53:You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you can’t see them.
#54:Always take a look around when you enter a new domain when surfing the web.
Get a sense of what the discussion group is about before you join it.
#55:Remember people have other things to do besides read your email. You are not the center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions.
#56:Be polite and pleasant to everyone.
Always check your spelling and grammar before posting.
Know what you are talking about and make sense saying it.
#57:Ask questions online
Share what you know online.
Post the answers to your questions online because someone may have the same question you do.
#58:Netiquette does not forgive flaming.
Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
#59:Do not read other people’s mail without their permission.
Going through other people’s things could cost you, your job or you could even go to jail.
Not respecting other people’s privacy is a bad netiquette
#60:Do not take advantage of other people just because you have more knowledge or power than them.
Treat others as you would want them to treat you if the roles were reversed.
#61:Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manners even though you are online and cannot see the person face to face.