Em Tech - Lesson 2 - Online Safety, Ethics and Netiquette.pptx

JCNicolas2 71 views 60 slides Sep 01, 2024
Slide 1
Slide 1 of 60
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60

About This Presentation

EFFWEFEJEFJOWEI WIFJEWFWWE FIWEFIWEFOWEF QFEFEWOFWEFWEIOH EFWEIFWEFIWEO WEOFHEFEFWEOIFIWEFEWHFIWEFHIWEFIHIWHFWEF


Slide Content

— Uncle Ben, Spiderman Comics “With great power comes great responsibility”

Online Safety, Ethics & Netiquette LESSON 2

ESSENTIAL QUESTION How can we ensure safety, security, ethics, and etiquette in the use of ICTs within our chosen professional tracks?

PRESENTATION OF THE LEARNING TARGETS 01 Identify and explain online safety and security practices relevant to their professional tracks. 02 Apply ethical standards and online etiquette in the use of ICTs. 03 Demonstrate understanding of personal and professional impacts of online behavior.

ETHICAL DILEMMAS IN THE DIGITAL WORLD MOTIVATIONAL ACTIVITY

Process Questions What is the main issue in your scenario? How does this issue relate to your professional track? What ethical considerations should be taken into account? What steps would you take to resolve the issue?

Online Crimes

1. Cyberbullying Republic Act 10627 or The Anti-Bullying Act of 2013 defines bullying as "any severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating a hostile environment at school, infringing on the rights of another, or materially or substantially disrupting the education process." Any violation of this act is considered as cyberbullying.

Forms of Cyberbullying Flaming is an online fight using electronic messages with angry and vulgar languages. Harassment is the act of repeatedly sending nasty, mean, and insulting messages. Denigration is sending or posting gossip or rumors about a person to damage his or her reputation or friendships.

Forms of Cyberbullying Impersonation is when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships. Outing is the act of sharing someone's secrets or embarrassing information or images online.

Forms of Cyberbullying Trickery is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online. Exclusion is when one is intentionally or cruelly excluded from an online group. Cyberstalking is the act of repeated, intense harassment and denigration that includes threats or creates significant fear.

2. Identity Theft Also called “identity fraud”, it is all types of crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. It commonly happens on the ff: situations according to the US Department of Justice Shoulder Surfing Improperly discarding pre-approved credit cards Responding to spam mails which require you to input personal data

3. Phishing The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers,

Types of Phishing Emails Spear phishing targets specific individuals or organizations through highly personalized emails. Attackers use information collected from social media or other sources to make the message seem legitimate.

Types of Phishing Emails

Types of Phishing Emails "A whaling attack is a spear phishing attack that focuses on high-profile targets like CEOs, CFOs, or other senior executives. The goal is usually to steal sensitive information from the company or to initiate fraudulent financial transactions."

Types of Phishing Emails

Types of Phishing Emails " Pharming redirects users from legitimate websites to fraudulent ones via DNS hijacking or poisoning to collect personal and financial information. The attack isn’t email-based, but it’s often paired with phishing emails."

Types of Phishing Emails " Pharming redirects users from legitimate websites to fraudulent ones via DNS hijacking or poisoning to collect personal and financial information. The attack isn’t email-based, but it’s often paired with phishing emails."

Types of Phishing Emails "Clone phishing involves creating a nearly identical copy of a previously sent email but with malicious links or attachments. The attacker might claim to be resending the email due to a failed delivery attempt or updating the content."

Types of Phishing Emails

Types of Phishing Emails " Vishing , or voice phishing , uses phone calls instead of emails to scam victims. It’s worth mentioning because it often complements email phishing.“ "For example, a voicemail or direct call claiming to be from your bank, stating suspicious activity on your account and asking you to call back using the provided number, which leads to a scammer."

Types of Phishing Emails " Smishing is similar to phishing but uses SMS texts. It directs users to malicious websites or asks them to provide personal information via text."

Types of Phishing Emails " Smishing is similar to phishing but uses SMS texts. It directs users to malicious websites or asks them to provide personal information via text."

Suspicious Email Addresses Grammar and Spelling Mistakes Unfamiliar Greetings or Sign-offs Suspicious Links or Attachments Requests for Personal Information Urgent of Threatening Language "How to Spot a Phishing Email"

4. Malware This is the shortened form of malicious software which is software that cyber-attackers develop to gain access or cause damage to a computer or network, usually without their victim’s knowledge. To define malware point blank, it’s any piece of software created with the intent to cause harm.  

Type of Malware WORMS Definition : A self-replicating program that spreads independently across networks, without needing to attach to a host program. Impact : Can overload networks, consume bandwidth, and spread rapidly, causing widespread damage.

Type of Malware Trojan Horses (Trojans) Definition: Malware disguised as legitimate software. Once installed, it can create backdoors for attackers, steal data, or damage the system. (“RAT”) Impact: Often used to steal sensitive information, allow remote access, or install additional malware.

Type of Malware Ransomware Definition: Malware that encrypts a victim’s data and demands payment (usually in cryptocurrency) to restore access. Impact: Can cause significant financial loss and data unavailability. Even if a ransom is paid, there’s no guarantee the data will be restored.

Type of Malware Spyware Definition: Malware that secretly monitors and collects information about a user’s activities without their knowledge. Impact: Can capture sensitive data like login credentials, browsing habits, and credit card information.

Type of Malware Adware Definition: Software that automatically displays or downloads advertisements on a device, often bundled with free software. Impact: Can slow down devices, create security vulnerabilities, and lead to more serious malware infections..

Type of Malware Rootkits Definition: Malware that provides unauthorized users with root or administrative access to a system, often hiding its presence. Impact: Allows attackers to control systems, steal data, or install additional malware without detection.

Type of Malware Keyloggers Definition: Malware that records every keystroke made on a keyboard, often used to steal passwords and other sensitive information. Impact: Can lead to identity theft, financial loss, and unauthorized access to accounts..

Type of Malware Bots/Botnets Definition: A bot is malware that can remotely control an infected device. A botnet is a network of such infected devices controlled by a hacker. Impact: Botnets can be used for various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam, or mining cryptocurrency.

Type of Malware Scareware Definition: Malware that tricks users into thinking their system is infected and prompts them to buy fake antivirus software or take other actions. Impact: Can lead to financial loss, installation of additional malware, and unnecessary panic.

Type of Malware Fileless Malware Definition: Malware that operates in memory rather than installing files on the system, making it harder to detect. Impact: Can evade traditional antivirus programs and cause damage or steal data without leaving a trace.

5. Plagiarism and Copyright Infringement Plagiarism is the act of using someone else's work, ideas, or words without giving proper credit, effectively passing them off as your own. It's about honesty and integrity in how you present information.”

5. Plagiarism and Copyright Infringement Copyright is a legal protection given to the creators of original works, like books, music, or art, that gives them exclusive rights to use, distribute, and profit from their creations. It's about the legal rights and control over how a work is used.

5. Plagiarism and Copyright Infringement Copyright infringement occurs when someone uses, reproduces, distributes, or displays a copyrighted work without the permission of the copyright holder or without legal justification, such as "fair use." This can include copying a book, sharing music or movies online, or using a copyrighted image in a commercial project without obtaining the necessary rights.

5. Plagiarism and Copyright Infringement Fair use is a legal principle that allows people to use small portions of copyrighted material without permission in certain situations, like for education, criticism, news reporting, or parody. It's a way to balance the rights of creators with the public's need to use and share information.

5. Plagiarism and Copyright Infringement Fair use is a legal principle that allows people to use small portions of copyrighted material without permission in certain situations, like for education, criticism, news reporting, or parody. It's a way to balance the rights of creators with the public's need to use and share information.

Fair use is determined by evaluating four main factors: Purpose and Character of the Use: Nature of the Copyrighted Work: Amount and Substantiality: Effect on the Market

Examples of Fair Use Educational use Criticism or Commentary Parody News Reporting Research

Online Etiquette - Netiquette

Be Respectful and Kind Online Treat others as you would in person. Avoid offensive language, insults, or spreading rumors. Don’t engage in or encourage harmful behavior towards others. Report and block users who engage in cyberbullying.

Protect Your Personal Information Never share sensitive information like your full name, address, phone number, or financial details publicly online. Use strong, unique passwords for different accounts and enable two-factor authentication where possible. Be cautious when sharing personal details on social media; avoid oversharing.

Be Cautious with Links and Attachments Don’t click on links or download attachments from unknown or suspicious sources. Double-check email addresses and URLs to ensure they are legitimate before responding or entering information. Look for signs of phishing, such as urgent requests for information, grammatical errors, or unfamiliar sender addresses.

Give Credit Where It’s Due Always cite your sources when using someone else’s ideas, text, images, or media in your work. Use plagiarism detection tools to ensure your content is original before publishing. Paraphrase properly and add your own insights when referring to someone else’s work.

Install and Update Security Software Keep your operating system, antivirus software, and other applications up to date to protect against vulnerabilities. Don’t download software or files from untrusted or unknown sources. Be cautious of pop-ups or ads that prompt you to download something or say your device is infected.

Verify the Authenticity of Websites and Emails Use secure websites (look for "https" in the URL) when entering personal information. Verify the authenticity of requests for personal information by contacting the organization directly. Be wary of offers that seem too good to be true, as they often are scams.

Respect Others' Privacy and Boundaries Don’t share private conversations, photos, or videos without permission. Avoid tagging or sharing content that could embarrass or harm someone else. Be mindful of others' privacy settings and preferences.