empowerment technology/ RULES AND NETIQUETE lesson 2.pptx

MariaIvyBonifacio 303 views 35 slides Aug 15, 2024
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

RULES AND NETIQUETTE


Slide Content

EMPOWERMENT TECHNOLOGIES: Rules of Netiquette

Type of Information Shared Not shared Type of Information Shared Not shared 1. First Name 2. Last Name 3. Middle Name 4. Current and previous school(s) 5. Your cellphone number What information you have shared so far online? To check, write Yes if the following information was being shared and No, if not.

Type of Information Shared Not shared 6. The name of your mother and father 7. The name of your siblings 8. Your address 9. Your home phone number 10. Your birthday What information you have shared so far online? To check, write Yes if the following information was being shared and No, if not.

Online Safety and Security The Internet is a powerful tool used to promote business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between. But there is always the “other side of the coin”. Internet is one of the most dangerous places especially if you are unaware of what you are doing with it.

Let us go back to the “How Safe Are You?”

INTERNET is defined as the information superhighway means that anyone has access to this highway, can place information, and can grab that information. Therefore, everyone is a prospect to cybercrime threats.

Government Provisions for Online Courtesy and Etiquette The Philippine government ensures the welfare of its people in their ICT experience by enacting various laws and regulations. Republic Act 10627 or Anti-Bullying Act of 2013 Republic Act 10175 or Cybercrime Prevention Act of 2012 Government Provisions for Online Courtesy and Etiquette

Here are some tips to help you stay safe when using the Internet. Tips to Stay Safe Online 1. Be mindful of what you share and what site you share it to . 2. Do not just accept terms and conditions; read it . 3. Check out the privacy policy page of a website .

Here are some tips to help you stay safe when using the Internet. Tips to Stay Safe Online 4 Know the security features of the social networking site you use. 5. Do not share password with anyone. 6. Avoid logging in to public networks/Wi-Fi. . 7. Do not talk to strangers whether online or face-to-face .

Here are some tips to help you stay safe when using the Internet. Tips to Stay Safe Online 8. Never post anything about future vacation. . 9. Add friends you know in real life. . 10. Avoid visiting untrusted websites. .

Here are some tips to help you stay safe when using the Internet. Tips to Stay Safe Online 11. Install and update an antivirus software on your computer. . 12. If you have a Wi-Fi at home, make it a private network by adding password. . 13. Avoid downloading anything from untrusted websites. .

Here are some tips to help you stay safe when using the Internet. Tips to Stay Safe Online Buy the software; do not use pirated ones. . 15. Do not reply or click links from suspicious emails .

Internet Threats ious prog am desig ious prog am desig ious prog am desig ious prog am desig ious prog am desig ious prog am desig 1. Malware – stands for malicious software. a. Virus –designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives and CDs. b. Worm – transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. the ILOVEYOU worm (Love Bug Worm)

Internet Threats 1. Malware – stands for malicious software. c. Trojan –is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. o Rogue security software – tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but, they are not protected at all.

Internet Threats 1. Malware – stands for malicious software. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It can monitor what you are currently doing and typing through keylogging. Keyloggers - used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.

Internet Threats 1. Malware – stands for malicious software. e . Adware – a program designed to send you advertisements, mostly as pop-ups

2. S PAM unwanted email mostly from bots or advertisers.It can be used to send malware.

3.Phishing Its goal is to acquire sensitive personal information like passwords and credit card details. Pharming –a more complicated way of phishing where it exploits the DNS( DomainNameService ) system. .

Phishing Example:

3.Phishing Effects of Phishing: Internet fraud Identity theft Financial loss to the original institutions Erosion of Public Trust in the Internet.

Protecting Reputations Online In the past, doing something embarrassing was not much a big deal. Nowadays, embarrassing moments are captured using any device you could imagine This could impact not only your reputation but also the people around you.

Think Before You Click 1. Once you post something on the web, you have no control of who sees your posts. 2. Your friends depend on you to protect their reputation online. 3. Set your post to “private”. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.

CYBERBULLYING different? IT CAN HAPPEN anyone anytime posted anonymously impossible to trace DIFFICULT TO DELETE inappropriate pictures harassing messages anywhere DANGER wide audience

Copyright Infringement If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.

Copyright Infringement Intellectual Property Copyright Law Copyright Page “No part of this book may be copied, reproduced……”

Copyright Infringement Understand. Copyright protect literary works, photographs paintings, drawings, films, music (and lyrics), choreography, and sculptures. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.

Copyright Infringement Be creative. Ask yourself whether what you are making is something that came from you or something made from somebody else’s creativity. Know the law. There are some limitations to copyright laws.

PT#2 Campaign Material Create a campaign material promoting “ Think before you click ”. It could be in the form of a small poster using 1 short size bondpaper or Oslo paper. Category Exemplary 96-100 Accomplished 90-95 Developing 83-89 Beginning 82-75 Content The output exceeds the expectations The output is complete The output is somewhat complete The output is incomplete Attractiveness The flow chart is exceptionally attractive in terms of design, layout, and neatness. The flow chart is attractive in terms of design, layout, and neatness. The flow chart is acceptably attractive though it may be a bit messy. The flow chart is distractingly messy or very poorly designed. It is not attractive.

Thanks! Any questions?
Tags