SlideShare a Scribd company logo
NETIQUETTE
QUIZ
1. Which of the following is a communication
service provider in the Philippines?
a. Lazada
b. Smart Telecommunication
c. Social Security System
d. Twitter
QUIZ
2. Which of the following is the operating
system of Blackberry phones?
a. Blackberry OS
b. Candy
c. Symbian
d. Windows Mobile
QUIZ
3. What type of social media website is
Pinterest?
a. Blogs and Forums
b. Bookmarking Site
c. Media Sharing
d. Microblogging
QUIZ
4. Which of the following types of social media
websites focuses on short updates posted by the
user?
a. Blogging
b. Hashtagging
c. Microblogging
d. Social Media
QUIZ
5. What is the online platform where you can
store your files online?
a. Google Drive
b. Photoshop
c. PowerPoint
d. YouTube
QUIZ
6. What online platform is use for hashtags
and posting pictures?
a. Facebook
b. Instagram
c. Snapchat
d. Twitter
QUIZ
7. Which platform can be useful for marketing
tangible products?
a. Facebook
b. Instagram
c. Pinterest
d. Twitter
QUIZ
8. Which is the leading video-sharing platform?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
QUIZ
9. What platform is used for advertising?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
QUIZ
10.Which electronic communication platform is
used for broadcasting?
a. Microblog
b. Social Media
c. Social Network
d. YouTube
QUIZ
11. What social networking site can register and post
your profile, connect with friends, and comment on
topics in a generally interactive way?
a. Facebook
b. Instagram
c. Twitter
d. YouTube
QUIZ
12.Which is specially designed for businesses
and professionals?
a. Google Drive
b. Instagram
c. LinkedIn
d. Photoshop
QUIZ
13. Which allows users to create and manage advertising
campaigns, generate reports, and retrieve information
about the ads, campaigns, and organizations associated
with an account?
a. Advertising platforms
b. Communication platforms
c. Grouping platforms
d. Teaching platform
QUIZ
14.What country had a social media penetration rate
of 58 percent, higher than the average of 47
percent in Southern Asia?
a. Argentina
b. Brazil
c. Philippines
d. South Korea
QUIZ
15.Which site allows you to upload and share
media content like images and music?
a. Facebook
b. Pinterest
c. Twitter
d. YouTube
01
NETIQUET
TE
Network Etiquette is concerned with the “proper” manner of
communication in the online environment.
Acceptable rules for online behavior.
OBJECTIVES
consider one’s and others’
safety when sharing
Information using the
Internet
determine and avoid the
dangers of the Internet
be responsible in the use
of social networking sites
browse the Internet
efficiently and properly
through proper referencing
consider one’s and others’
reputation when using the
Internet
LESSON CONTENT
Online security, safety, and ethics
Internet threats
Protecting reputations online
Copyright
Rules of Netiquette
ONLINE
SECURITY,
SAFETY &
ETHICS
“Your safety is your responsibility”
It is also called CYBER
SAFETY or DIGITAL
SAFETY which refers to
practice and precautions
one observe when using
the internet.
ONLINE SAFETY
Netiquette, Safety in using the internet
ONLINE SAFETY
FIRST NAME
 There is still a risk in sharing your first name.
chances are, hacker already knows plenty of
stuff about you even if you only give out your
first name.
LAST NAME
 If sharing your first name has a small risk,
sharing both your first and last name is more
risky.
ONLINE SAFETY
MIDDLE NAME
 Sharing your middle name is probably not the
most risky of these shared information, but
sharing your entire full name would be.
CURRENT & PREVIOUS SCHOOL
 Most people who steal identities study their
subject. They can use this information for
verification purposes.
ONLINE SAFETY
CELL PHONE NUMBER
 Your cell phone number should never be posted
over the internet. The internet is a public place,
it is the same as posting your number on a
billboard.
WHO YOUR MOTHER & FATHER ARE
 Risky yet not as risky as posting their full names,
especially your Mother’s Maiden Name.
ONLINE SAFETY
WHO YOUR SIBLINGS ARE
 This is a huge risk especially if you have a
younger siblings. Strangers may pretend or use
their identity to dupe you.
YOUR ADDRESS
 It would be much easier for criminals to find
you.
ONLINE SAFETY
YOUR LANDLINE NUMBER
 Scams usually use this information to deceive
you, one of which is when a stranger pretends
to know your parents or pretends to be you.
YOUR BIRTHDAY
 Having it in your profile makes you more
vulnerable to identity theft.
HOW TO STAY SAFE ONLINE?
 Create a smart and strong password
(upper and smaller case, number, special characters)
 Use email wisely
 Be smart when using instant
messaging application
 Watch out for phishing scams
HOW TO STAY SAFE ONLINE?
 Makes sure that your security
software is running efficiently
 Use the privacy setting of social
networking sites
 Never post your complete your
identity information
HOW TO STAY SAFE ONLINE?
 Think carefully before posting a
picture or video of yourself
 Shop safely
 When you see something worrisome
or when you feel uncomfortable and
unsafe, leave the website immediately
A very broad issue covering security
relation to a transaction made over the
internet.
INTERNET
SECURITY
SECURITY REQUIREMENT
TRIAD
CONFIDENTIALITY
 Data Confidentiality
 Privacy
INTEGRITY
 Data Integrity
 System Integrity
AVAILABILITY
TYPES OF SYSTEM INTRUDER
MASQUERADER
 Unauthorized user who penetrates a system
exploiting a legitimate user’s account (outside).
HACKER
 Legitimate user who makes unauthorized
accesses or misuses his privileges (inside).
CLANDESTINE USER
 Seizes supervisory control to evade auditing and
access controls or suppress audit
collection (inside/outside)
PARTS OF VIRUS
INFECTION MECHANISM
 The means by which a virus spreads, enabling it
to replicate. The mechanism is also referred to
as the infection vector.
 This is how the virus spreads or propagates. A
virus typically has a search routine, which
locates new files or new disks for infection
PARTS OF VIRUS
TRIGGER
 Also known as a logic bomb, this is the compiled
version that could be activated any time within
an executable file when the virus is run that
determines the event or condition for the
malicious "payload" to be activated or delivered
such as a particular date, a particular time,
particular presence of another program,
capacity of the disk exceeding some limit, or
a double-click that opens a particular file.
PARTS OF VIRUS
PAYLOAD
 The "payload" is the actual body or data which
carries out the malicious purpose of the virus.
Payload activity might be noticeable (e.g.,
because it causes the system to slow down or
"freeze"), as most of the time the "payload" itself
is the harmful activity, or sometimes non-
destructive but distributive, which is called virus
hoax.
VIRUS STAGES
DORMANT PHASE
 The Virus is idle.
PROPAGATION PHASE
 Virus places an identical copy of itself into other
programs or into certain system areas on the
disk.
VIRUS STAGES
TRIGGERING PHASE
 Virus is activated to perform the function for
which it was intended.
EXECUTION PHASE
 It can be destructive such as deleting files on
disk, crashing the system, or corrupting files or
relatively harmless such as popping up
humorous or political messages on screen.
INTERNET
THREATS
INTERNET THREATS
1. CYBER CRIME – a crime committed
or assisted through the use of the
Internet.
a. CYBER BULLYING – can work in the
same way as bullying in the playground;
the victim feels frightened and alone,
while the bully tries to hide from being
caught.
CYBER CRIME
b. CYBER STALKING – Harassment on the
internet can be just as frightening as other
forms of stalking.
c. IDENTITY THEFT – The more information
you make available online, the greater the
risk of identity theft. It can be very tempting
to reply to an email or open an attachment
or post information about yourself on social
networking sites, but you should never do
it.
CYBER CRIME
d. SEXTING – usually refers to sending and
receiving rude messages or videos of:
• Naked pictures
• Underwear shots
• Any sexual texts, images or videos
– These images or videos can be sent from
a boyfriend or girlfriend or a friend or
someone you've met online. You also may
have sent a sexual photo, video or text to
someone else.
CYBER CRIME
d. SEXTING – remember:
 There is no turning back once you press
send.
 Even if you use apps like Snapchat the
person can take a screen shot
 You risk being seen as someone you are
not.
INTERNET THREATS
2. PRIVACY POLICY / TERMS OF SERVICE –
tells the user how the website will handle its
data.
3. MALWARE – stands for malicious software
variants, including viruses, ransom ware
and spyware.
a. Virus - a malicious program designed to
transfer from one computer to another
in any means possible.
MALWARE
b. Worms - a malicious program designed
to replicate itself and transfer from one
file folder to another and also transfer
to other computers.
c. Trojan - a malicious program designed
that is disguised as a useful program
but once downloaded or installed,
leaves your PC unprotected and allows
hacker to get your information.
MALWARE
d. Spyware - a program that runs in the
background without you knowing it. It
has the ability to monitor what you are
currently doing and typing through key
logging.
e. Adware - a program designed to send
you advertisement, mostly pop-ups.
INTERNET THREATS
1. PHARMING – a more complicated
way of phishing where it exploits the
DNS system.
2. SPAM – unwanted email mostly from
bots or advertisers. It can be used to
send malware
3. PHISHING – its goal is to acquire
sensitive personal information like
passwords and credit card details
THINK BEFORE YOU CLICK
 Before you post something on the web,
ask these questions to yourself: Would
you want your parents or grandparents to
see it? Would you want your future boss to
see it? Once you post something on the
web, you have no control of who sees your
posts.
 Your friends depend on you to protect
their reputation online. Talk to your
friends about this serious responsibility.
THINK BEFORE YOU CLICK
 Set your post to “private.” In this way,
search engines will not be able to scan
that post.
 If you feel that a post can affect you or
other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
 Avoid using names. Names are easy for
search engines to scan.
Refers to a set of MORAL
PRINCIPLES that govern an
individual or a group on
what is considered as
ACCEPTABLE BEHAVIOR
while using a computer
ETHICS
RULES OF
NETIQUETT
E
“Do unto others as you would have
others do unto you.“
Rule 1: Remember the
Human
Your written words are read by
real people, all deserving of
respectful communication.
Before you press send or
submit as yourself, “would I be
okay with this is someone else
had written it?”
Rule 2: Adhere to the same standards of
behavior online that you follow in real life
While it can be argued that standards of
behavior may be different in the virtual world,
they certainly should not be lower. You should do
your best to act within the laws and ethical
manners of society whenever you inhabit
"cyberspace." Would you behave rudely to
someone face-to-face? On most occasions, no.
Neither should you behave this way in the virtual
world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain."
(Shea, 1994) Depending on where you are in
the virtual world, the same written
communication can be acceptable in one
area, where it might be considered
inappropriate in another. What you text to a
friend may not be appropriate in an email to a
classmate or colleague.
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read
and time in which to respond. Most people today
lead busy lives, just like you do, and don't have time
to read or respond to frivolous emails or discussion
posts. As a virtual world communicator, it is your
responsibility to make sure that the time spent
reading your words isn't wasted. Make your written
communication meaningful and to the point,
without extraneous text or superfluous graphics or
attachments that may take forever to download.
Rule 5: Make yourself look good online
One of the virtual world's best things is the lack
of judgment associated with your physical
appearance, the sound of your voice, or the
clothes you wear (unless you post a video of
yourself singing Karaoke in a clown outfit.) The
quality of your writing will judge you, so keep
the following tips in mind:
* Always check for spelling and grammar
errors
* Know what you're talking about and state it
clearly
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is
the ease in which information can be shared or
accessed, and in fact, this "information sharing"
capability is one of the reasons the Internet was
founded. So in the spirit of the Internet's "founding
fathers," share what you know! When you post a
question and receive intelligent answers, share the
results with others. Are you an expert at
something? Post resources and references for your
subject matter. You have recently expanded your
knowledge about a subject that might be of
interest to others? Share that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a
strongly held opinion without holding back any
emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on a
sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts
between one another, must be controlled, or the
camaraderie of the group could be compromised.
Don't feed the flames; extinguish them by guiding the
discussion back to a more productive direction.
Rule 8: Respect other people’s privacy
Depending on what you are reading in the virtual
world, be it an online class discussion forum, Facebook
page, or an email, you may be exposed to some private
or personal information that needs to be handled with
care. Perhaps someone is sharing some medical news
about a loved one or discussing a situation at work.
What do you think would happen if this information
"got into the wrong hands?" Embarrassment? Hurt
feelings? Loss of a job? Just as you expect others to
respect your privacy, so should you respect the privacy
of others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual
communication.
Rule 9: Don’t abuse your power
Like in face-to-face situations, there are people in
cyberspace who have more "power" than others.
They have more expertise in technology or have
years of experience in a particular skill or subject
matter. Maybe it is you who possesses all of this
knowledge and power! Just remember, knowing
more than others do or having more power than
others may have does not give you the right to
take advantage of anyone.
Think of Rule 1: Remember the human
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone
knows the rules of Netiquette. At some point, you
will see a stupid question, read an unnecessarily
long response, or encounter misspelled words;
when this happens, practice kindness and
forgiveness as you would hope someone would do if
you had committed the same offense. If it's a minor
"offense," you might want to let it slide. If you feel
compelled to respond to a mistake, do so in a
private email rather than a public forum.
COPYRIGHT
COPYRIGHT
INFRINGEMENT
If you create something—an
idea, an invention, a form of
literary work, or a research, you
have the right of how it should
be used by others. This is called
intellectual property.
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon and infographics & images by Freepik
THANK
S!
DO YOU HAVE ANY QUESTIONS?

More Related Content

PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
itEraLesson3. .pptx
PPTX
Empowerment Technology Lesson 2
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
empowerment technologies Powerpoint presentation
PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
empowermenttechnologylesson2-210114045455.pptx
empowermenttechnologylesson2-210114045455.pptx
itEraLesson3. .pptx
Empowerment Technology Lesson 2
Online-Safety-Security-and-etiquette.pptx
Rules of netiquette-lesson 2.pptx
empowerment technologies Powerpoint presentation
Online Safety, Security, Ethics, and Etiquette.pptx

Similar to Netiquette, Safety in using the internet (20)

PPTX
Online Safety, Security, Ethics, and Etiquette.pptx
PPTX
3- Online Security and Online Netiquette.pptx
PPTX
ONLINE SAFETY-online Etiquette ETEC.pptx
PPTX
ONLINE SAFETY empowerment technolog.pptx
PPTX
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
PPT
Protect Yourself From Internet Pests
PPTX
Empowerment Technologies Classroom Observation
PPTX
Netiquette on using internet
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PPTX
Rules of Netiquette
PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PPTX
Dos and don's on social media
PDF
Empowerment Technologies - Module 2
PPTX
online safety, security and rules of netiquette
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PPTX
Empowerment Technologies - Lesson 2.pptx
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Year 7 - Week 5 esafety
Online Safety, Security, Ethics, and Etiquette.pptx
3- Online Security and Online Netiquette.pptx
ONLINE SAFETY-online Etiquette ETEC.pptx
ONLINE SAFETY empowerment technolog.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
lesson-2-rules-of-netiquette.pdf.bshhsjdj
Protect Yourself From Internet Pests
Empowerment Technologies Classroom Observation
Netiquette on using internet
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Rules of Netiquette
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
Dos and don's on social media
Empowerment Technologies - Module 2
online safety, security and rules of netiquette
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
Empowerment Technologies - Lesson 2.pptx
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Year 7 - Week 5 esafety
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
1. Introduction to Computer Programming.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Machine learning based COVID-19 study performance prediction
1. Introduction to Computer Programming.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
Heart disease approach using modified random forest and particle swarm optimi...
SOPHOS-XG Firewall Administrator PPT.pptx
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
TLE Review Electricity (Electricity).pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Ad

Netiquette, Safety in using the internet

  • 2. QUIZ 1. Which of the following is a communication service provider in the Philippines? a. Lazada b. Smart Telecommunication c. Social Security System d. Twitter
  • 3. QUIZ 2. Which of the following is the operating system of Blackberry phones? a. Blackberry OS b. Candy c. Symbian d. Windows Mobile
  • 4. QUIZ 3. What type of social media website is Pinterest? a. Blogs and Forums b. Bookmarking Site c. Media Sharing d. Microblogging
  • 5. QUIZ 4. Which of the following types of social media websites focuses on short updates posted by the user? a. Blogging b. Hashtagging c. Microblogging d. Social Media
  • 6. QUIZ 5. What is the online platform where you can store your files online? a. Google Drive b. Photoshop c. PowerPoint d. YouTube
  • 7. QUIZ 6. What online platform is use for hashtags and posting pictures? a. Facebook b. Instagram c. Snapchat d. Twitter
  • 8. QUIZ 7. Which platform can be useful for marketing tangible products? a. Facebook b. Instagram c. Pinterest d. Twitter
  • 9. QUIZ 8. Which is the leading video-sharing platform? a. Facebook b. Instagram c. Twitter d. YouTube
  • 10. QUIZ 9. What platform is used for advertising? a. Facebook b. Instagram c. Twitter d. YouTube
  • 11. QUIZ 10.Which electronic communication platform is used for broadcasting? a. Microblog b. Social Media c. Social Network d. YouTube
  • 12. QUIZ 11. What social networking site can register and post your profile, connect with friends, and comment on topics in a generally interactive way? a. Facebook b. Instagram c. Twitter d. YouTube
  • 13. QUIZ 12.Which is specially designed for businesses and professionals? a. Google Drive b. Instagram c. LinkedIn d. Photoshop
  • 14. QUIZ 13. Which allows users to create and manage advertising campaigns, generate reports, and retrieve information about the ads, campaigns, and organizations associated with an account? a. Advertising platforms b. Communication platforms c. Grouping platforms d. Teaching platform
  • 15. QUIZ 14.What country had a social media penetration rate of 58 percent, higher than the average of 47 percent in Southern Asia? a. Argentina b. Brazil c. Philippines d. South Korea
  • 16. QUIZ 15.Which site allows you to upload and share media content like images and music? a. Facebook b. Pinterest c. Twitter d. YouTube
  • 17. 01 NETIQUET TE Network Etiquette is concerned with the “proper” manner of communication in the online environment. Acceptable rules for online behavior.
  • 18. OBJECTIVES consider one’s and others’ safety when sharing Information using the Internet determine and avoid the dangers of the Internet be responsible in the use of social networking sites browse the Internet efficiently and properly through proper referencing consider one’s and others’ reputation when using the Internet
  • 19. LESSON CONTENT Online security, safety, and ethics Internet threats Protecting reputations online Copyright Rules of Netiquette
  • 21. “Your safety is your responsibility” It is also called CYBER SAFETY or DIGITAL SAFETY which refers to practice and precautions one observe when using the internet. ONLINE SAFETY
  • 23. ONLINE SAFETY FIRST NAME  There is still a risk in sharing your first name. chances are, hacker already knows plenty of stuff about you even if you only give out your first name. LAST NAME  If sharing your first name has a small risk, sharing both your first and last name is more risky.
  • 24. ONLINE SAFETY MIDDLE NAME  Sharing your middle name is probably not the most risky of these shared information, but sharing your entire full name would be. CURRENT & PREVIOUS SCHOOL  Most people who steal identities study their subject. They can use this information for verification purposes.
  • 25. ONLINE SAFETY CELL PHONE NUMBER  Your cell phone number should never be posted over the internet. The internet is a public place, it is the same as posting your number on a billboard. WHO YOUR MOTHER & FATHER ARE  Risky yet not as risky as posting their full names, especially your Mother’s Maiden Name.
  • 26. ONLINE SAFETY WHO YOUR SIBLINGS ARE  This is a huge risk especially if you have a younger siblings. Strangers may pretend or use their identity to dupe you. YOUR ADDRESS  It would be much easier for criminals to find you.
  • 27. ONLINE SAFETY YOUR LANDLINE NUMBER  Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you. YOUR BIRTHDAY  Having it in your profile makes you more vulnerable to identity theft.
  • 28. HOW TO STAY SAFE ONLINE?  Create a smart and strong password (upper and smaller case, number, special characters)  Use email wisely  Be smart when using instant messaging application  Watch out for phishing scams
  • 29. HOW TO STAY SAFE ONLINE?  Makes sure that your security software is running efficiently  Use the privacy setting of social networking sites  Never post your complete your identity information
  • 30. HOW TO STAY SAFE ONLINE?  Think carefully before posting a picture or video of yourself  Shop safely  When you see something worrisome or when you feel uncomfortable and unsafe, leave the website immediately
  • 31. A very broad issue covering security relation to a transaction made over the internet. INTERNET SECURITY
  • 32. SECURITY REQUIREMENT TRIAD CONFIDENTIALITY  Data Confidentiality  Privacy INTEGRITY  Data Integrity  System Integrity AVAILABILITY
  • 33. TYPES OF SYSTEM INTRUDER MASQUERADER  Unauthorized user who penetrates a system exploiting a legitimate user’s account (outside). HACKER  Legitimate user who makes unauthorized accesses or misuses his privileges (inside). CLANDESTINE USER  Seizes supervisory control to evade auditing and access controls or suppress audit collection (inside/outside)
  • 34. PARTS OF VIRUS INFECTION MECHANISM  The means by which a virus spreads, enabling it to replicate. The mechanism is also referred to as the infection vector.  This is how the virus spreads or propagates. A virus typically has a search routine, which locates new files or new disks for infection
  • 35. PARTS OF VIRUS TRIGGER  Also known as a logic bomb, this is the compiled version that could be activated any time within an executable file when the virus is run that determines the event or condition for the malicious "payload" to be activated or delivered such as a particular date, a particular time, particular presence of another program, capacity of the disk exceeding some limit, or a double-click that opens a particular file.
  • 36. PARTS OF VIRUS PAYLOAD  The "payload" is the actual body or data which carries out the malicious purpose of the virus. Payload activity might be noticeable (e.g., because it causes the system to slow down or "freeze"), as most of the time the "payload" itself is the harmful activity, or sometimes non- destructive but distributive, which is called virus hoax.
  • 37. VIRUS STAGES DORMANT PHASE  The Virus is idle. PROPAGATION PHASE  Virus places an identical copy of itself into other programs or into certain system areas on the disk.
  • 38. VIRUS STAGES TRIGGERING PHASE  Virus is activated to perform the function for which it was intended. EXECUTION PHASE  It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
  • 40. INTERNET THREATS 1. CYBER CRIME – a crime committed or assisted through the use of the Internet. a. CYBER BULLYING – can work in the same way as bullying in the playground; the victim feels frightened and alone, while the bully tries to hide from being caught.
  • 41. CYBER CRIME b. CYBER STALKING – Harassment on the internet can be just as frightening as other forms of stalking. c. IDENTITY THEFT – The more information you make available online, the greater the risk of identity theft. It can be very tempting to reply to an email or open an attachment or post information about yourself on social networking sites, but you should never do it.
  • 42. CYBER CRIME d. SEXTING – usually refers to sending and receiving rude messages or videos of: • Naked pictures • Underwear shots • Any sexual texts, images or videos – These images or videos can be sent from a boyfriend or girlfriend or a friend or someone you've met online. You also may have sent a sexual photo, video or text to someone else.
  • 43. CYBER CRIME d. SEXTING – remember:  There is no turning back once you press send.  Even if you use apps like Snapchat the person can take a screen shot  You risk being seen as someone you are not.
  • 44. INTERNET THREATS 2. PRIVACY POLICY / TERMS OF SERVICE – tells the user how the website will handle its data. 3. MALWARE – stands for malicious software variants, including viruses, ransom ware and spyware. a. Virus - a malicious program designed to transfer from one computer to another in any means possible.
  • 45. MALWARE b. Worms - a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers. c. Trojan - a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get your information.
  • 46. MALWARE d. Spyware - a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging. e. Adware - a program designed to send you advertisement, mostly pop-ups.
  • 47. INTERNET THREATS 1. PHARMING – a more complicated way of phishing where it exploits the DNS system. 2. SPAM – unwanted email mostly from bots or advertisers. It can be used to send malware 3. PHISHING – its goal is to acquire sensitive personal information like passwords and credit card details
  • 48. THINK BEFORE YOU CLICK  Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who sees your posts.  Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.
  • 49. THINK BEFORE YOU CLICK  Set your post to “private.” In this way, search engines will not be able to scan that post.  If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.  Avoid using names. Names are easy for search engines to scan.
  • 50. Refers to a set of MORAL PRINCIPLES that govern an individual or a group on what is considered as ACCEPTABLE BEHAVIOR while using a computer ETHICS
  • 52. “Do unto others as you would have others do unto you.“ Rule 1: Remember the Human Your written words are read by real people, all deserving of respectful communication. Before you press send or submit as yourself, “would I be okay with this is someone else had written it?”
  • 53. Rule 2: Adhere to the same standards of behavior online that you follow in real life While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
  • 54. Rule 3: Know where you are in cyberspace "Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague.
  • 55. Rule 4: Respect other people's time and bandwidth Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.
  • 56. Rule 5: Make yourself look good online One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep the following tips in mind: * Always check for spelling and grammar errors * Know what you're talking about and state it clearly
  • 57. Rule 6: Share expert knowledge The Internet offers its users many benefits; one is the ease in which information can be shared or accessed, and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references for your subject matter. You have recently expanded your knowledge about a subject that might be of interest to others? Share that as well.
  • 58. Rule 7: Help keep flame wars under control What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.
  • 59. Rule 8: Respect other people’s privacy Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.
  • 60. Rule 9: Don’t abuse your power Like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or have years of experience in a particular skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just remember, knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human
  • 61. Rule 10: Be forgiving of other people's mistakes Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of Netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.
  • 63. COPYRIGHT INFRINGEMENT If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.
  • 64. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon and infographics & images by Freepik THANK S! DO YOU HAVE ANY QUESTIONS?

Editor's Notes

  • #2: B
  • #3: A
  • #4: B
  • #5: C
  • #6: A
  • #7: D
  • #8: C
  • #9: D
  • #10: A
  • #11: B
  • #12: A
  • #13: C
  • #14: A
  • #15: C
  • #16: A
  • #17: “Break the Barrier” before starting the lesson. Give the etymological meaning of Netiquette and define what the term means.
  • #22: Number your paper form 1-10. write shared or not shared
  • #52: You need to remember that you are talking to a real person when you are online. The internet brings people together who would otherwise never meet. Remember this saying when sending an email: Would I say this to the person’s face.
  • #53: You need to behave the same way online that you do in real life. You need to remember that you can get caught doing things you should not be doing online just like you can in real life. You are still talking to a real person with feelings even though you can’t see them.
  • #54: Always take a look around when you enter a new domain when surfing the web. Get a sense of what the discussion group is about before you join it.
  • #55: Remember people have other things to do besides read your email. You are not the center of their world. Keep your post and emails to minimum by saying what you want to say. Remember everyone won’t answer your questions.
  • #56: Be polite and pleasant to everyone. Always check your spelling and grammar before posting. Know what you are talking about and make sense saying it.
  • #57: Ask questions online Share what you know online. Post the answers to your questions online because someone may have the same question you do.
  • #58: Netiquette does not forgive flaming. Netiquette does however forbid people who are flaming to hurt discussion groups by putting the group down.
  • #59: Do not read other people’s mail without their permission. Going through other people’s things could cost you, your job or you could even go to jail. Not respecting other people’s privacy is a bad netiquette
  • #60: Do not take advantage of other people just because you have more knowledge or power than them. Treat others as you would want them to treat you if the roles were reversed.
  • #61: Do not point out mistakes to people online. Remember that you were once the new kid on the block. You still need to have a good manners even though you are online and cannot see the person face to face.