SH003 Lesson 2_ Netiquette using the Internet.pptx
MarkAnthonyAurellano
30 views
33 slides
May 03, 2024
Slide 1 of 33
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
About This Presentation
"Netiquette" refers to the code of behavior or set of rules governing acceptable online communication. It encompasses guidelines for interacting with others, expressing oneself appropriately, and maintaining civility in online interactions. Examples of netiquette include being respectful ...
"Netiquette" refers to the code of behavior or set of rules governing acceptable online communication. It encompasses guidelines for interacting with others, expressing oneself appropriately, and maintaining civility in online interactions. Examples of netiquette include being respectful to others, avoiding offensive language, using proper grammar and punctuation, and respecting others' privacy.
Size: 3.44 MB
Language: en
Added: May 03, 2024
Slides: 33 pages
Slide Content
WARM-UP: THUMBS UP IF YOUR AGREE
1. MY COMPUTER HAS AN ANTIVIRUS SO IT IS OKAY TO OPEN MOST EMAIL ATTACHMENTS LIKE E-CARDS AND VIDEO FILES.
2. YOUR FRIEND TOLD YOU THAT HIS COLLEGE APPLICATION WAS REJECTED DUE TO THE FACT THAT YOU POSTED A VIDEO OF HIM DOING CRAZY STUFF AT A PARTY. YOU POSTED THE VIDEO SEVERAL YEARS AGO BUT LATER TOOK IT DOWN TO PROTECT YOUR FRIEND’S REPUTATION. CAN YOUR FRIEND BE RIGHT THAT THE COLLEGE FOUND THE VIDEO?
3. YOU AND YOUR BEST FRIEND PLAY A LOT OF VIDEO GAMES. ONE TIME, SHE ASK YOU FOR YOUR PASSWORD SO SHE CAN HELP YOU LEVEL UP AND GET IN-GAME MONEY. SHE PROMISES TO KEEP YOUR PASSWORD SECRET. IS IT OKAY TO GIVE AWAY YOUR PASSWORD?
4. YOU RECEIVED AN EMAIL STATING THAT YOUR MOTHER’S BANK ACCOUNT IS GOING TO BE FORFEITED IF YOU DO NOT RESPOND TO THE EMAIL. IS IT SAFE TO REPLY?
5. YOU FORGOT THAT YOUR ESSAY FOR ENGLISH CLASS IS DUE TOMORROW. WHILE DOING YOUR RESEARCH, YOU FOUND A WEBSITE OFFERING FREE ESSAYS. IS IT OKAY TO USE THE ESSAYS FROM THIS FREE ESSAY WEBSITE?
NETIQUETTE Empowerment Technologies
ONLINE SAFETY AND SECURITY
FIRST NAME There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.
LAST NAME If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face is a modus to several cybercrimes like identity theft.
MIDDLE NAME Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.
CURRENT AND PREVIOUS SCHOOL(S) Most people who steal identities study their subject. They can use this information for verification purposes.
YOUR CELLPHONE NUMBER Your cellphone number should never be posted over the Internet. The internet is a public place. It is the same as posting your number on a billboard. You would not want random strangers to text or call you, or worse, pretend that they are someone else.
THE NAME OF YOUR MOTHER AND FATHER Risky, yet not as risky as posting their full names, especially your mother’s maiden name. In fact, you may have already encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password.
THE NAME OF YOUR SIBLINGS Disclosing this is a huge risk. Strangers may pretend or use their identity to fool you.
YOUR ADDRESS Hopefully, you answered “no” to this one. Giving the internet your number is one thing; giving them your address is a whole other level. It would be much easier for criminals to find you.
YOUR HOME PHONE NUMBER This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.
YOUR BIRTHDAY Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
TIPS TO STAY SAFE ONLINE Protecting yourself
1. BE MINDFUL OF WHAT YOU SHARE ONLINE AND WHAT SITE YOU SHARE IT TO. 2. DO NOT JUST ACCEPT THE TERMS AND CONDITIONS; READ IT. 3. CHECK OUT THE PRIVACY POLICY PAGE OF A WEBSITE TO LEARN HOW THE WEBSITE HANDLES THE INFORMATION YOU SHARE.
4. KNOW THE SECURITY FEATURES OF THE SOCIAL NETWORKING SITE YOU USE. BY KEEPING YOUR PROFILE PRIVATE, SEARCH ENGINES WILL NOT BE ABLE TO SCAN YOUR PROFILE. 5. DO NOT SHARE YOUR PASSWORD WITH ANYONE. 6. AVOID LOGGING IN TO PUBLIC NETWORKS/WI-FI. BROWSING IN INCOGNITO OR PRIVATE MODE, WILL NOT PROTECT YOU FROM HACKERS.
7. DO NOT TALK TO STRANGERS WHETHER ONLINE OR FACE-TO-FACE. 8. NEVER POST ANYTHING ABOUT A FUTURE VACATION. 9. ADD FRIENDS YOU KNOW IN REAL LIFE.
10. AVOID VISITING UNTRUSTED WEBSITES. 11. INSTALL AND UPDATE AN ANTIVIRUS SOFTWARE ON YOUR COMPUTER. USE ONLY ONE ANTI-VIRUS SOFTWARE TO AVOID CONFLICTS. 12. IF YOU HAVE WI-FI AT HOME, MAKE IT A PRIVATE NETWORK BY ADDING A PASSWORD.
13. AVOID DOWNLOADING ANYTHING FROM UNTRUSTED WEBSITES. YOU ARE MOST VULNERABLE IN PEER-TO-PEER DOWNLOADS (TORRENTS) AS THE DOWNLOAD IS MOST LIKELY NOT MONITORED BY THE SITE OWNER. 14. BUY THE SOFTWARE; DO NOT USE PIRATED ONES. 15. DO NOT REPLY OR CLICK LINKS FROM SUSPICIOUS EMAILS.
INTERNET THREATS Malwares, Spam, and Phishing
MALWARES Stands for Malicious Software. Software that are designed to disrupt, damage, or gain unauthorized access to a computer system.
VIRUS A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
WORM A malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself. For example the Love Bug Worm created by a Filipino.
TROJAN A Trojan, or Trojan horse, is a type of malware that conceals its true content to fool a user into thinking it's a harmless file. Like the wooden horse used to sack Troy, the "payload" carried by a Trojan is unknown to the user, but it can act as a delivery vehicle for a variety of threats.
SPYWARE Spyware is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
ADWARE Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.
SPAMMING Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, or simply sending the same message over and over to the same user.
PHISHING the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.