Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Quisay
I n s t r u c t o r, E M P O W E R M E N T
Te c h n o l o g i e s
1. Consider one’s and others’ safety
when sharing information using the
internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determine how to avoid
the dangers of the internet
4. Be responsible in the use of
social networking sites
Answer Y E S if you AGREE with the statement
and N O if you DISAGREE.
Contextualized
Online
Security, safety
Rules of online search
Netiquette and research
and ethics
skills
Netiquette
1. First Name There is a risk in sharing your first name, chances are , a
hacker may already know plenty of stuff about you even
if you only give out your first name.
2. Last Name If sharing your first name is a small risk, having both your
first and last is more risky. Matching a name with a face
is a modus to several cybercrimes' like identity theft
3. Middle Name Sharing your middle name is probably not themost risky
of these shared information, but sharing your full name
would be.
5. Your cell phone You cell phone number should never be posted overthe
number internet.
Internet
Threats
Malware – stands
for malicious
software.
- is a set of
instructions that run What is it goodfor?
on your computer and a. Steal personal
make your system do information
something that an b. Delete files
attacker wants to do. c. Click fraud
d. Steal software serial
numbers
e. Use your computer
as relay
Different Kinds of Malware
Keyloggers
Rogue
security
software
Virus
Worm
Trojan
A malicious program
A malicious program Spread to that transfers from one
that is disguised as a other
computer to anotherby
useful program but computers
any type of means. It
once downloaded or uses computer network
installed, leaves your to spreaditself.
PCunprotected and Ex. ILOVEYOU worm
allows hackers to get
your information. Love Bug Worm created
by Filipino
Spyware