Online Safety, Security, Ethics, and Etiquette.pptx
ShekhainahRosal
82 views
15 slides
Oct 02, 2024
Slide 1 of 15
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
About This Presentation
Empowerment Technology
Size: 313.27 KB
Language: en
Added: Oct 02, 2024
Slides: 15 pages
Slide Content
Online Safety, Security, Ethics, and Etiquette Lesson 3
netiquette Netiquette, or network etiquette, refers to the "proper" manner of communication in the online environment. The internet is one of the most dangerous places if you do not know what you are doing with it. Thus, the concept of netiquette deals with truth.
Tips to Stay Safe Online These are tips to help you stay safe online 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.
4. Don’t share your password with anyone. 5. Avoid logging in to public networks/Wi-Fi. Browsing in incognito mode will not protect you from hackers. 6. Do not talk to strangers whether online or face-to-face. 7. Never post anything about a future vacation.
8. Add friends you know in real life. 9. Avoid visiting untrusted websites. 10. Install and update an antivirus software on your computer. Use only one anti-virus software to avoid conflicts. 11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites. 13. Buy the software, do not use pirated ones. 14. Do not reply or click links from suspicious emails. 15. Make Online Purchases from Secure Sites
Internet Threats 1. Malware – or malicious software, is any program or file that is harmful to a computer user. Types of Malware: a. Virus – a malicious program designed to replicate itself and transfer from one computer to another.
b. Worm – a malicious program that transfers from one computer to another by any type of means. c. Trojan – a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware – program that runs in the background without you knowing it. It monitors what you are currently doing and typing through keylogging. Ex. Keylogger – used to record keystrokes done by the user. This is done to steal their password or any other sensitive information.
e. Adware – program designed to send you advertisements, mostly as pop-ups. f. Ransomware – or ransom software is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send malware. 3. Phishing – its goal is to acquire sensitive information like passwords and credit card details. This is done by sending you an e-mail that will direct the user to visit a fake website and be asked to update his/her personal information.
Protecting Reputations Online 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? 2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report as inappropriate.
Copyright Infringement It is the use of works protected by copyright law without permission for a usage where such permission is required. Tips to avoid copyright infringement: a. Always assume that the work is copyrighted.
b. Do not copy, share or alter without seeking permission. c. Review and retain licensing agreements. d. Consider buying content. e. Give credit to the original author of the page or information.