Sei sulla pagina 1di 34

By: Kristine May G.

Quisay
I n s t r u c t o r, E M P O W E R M E N T
Te c h n o l o g i e s
1. Consider one’s and others’ safety
when sharing information using the
internet.
2. Consider one’s and others’ reputation
when using the internet.
3. Know and determine how to avoid
the dangers of the internet
4. Be responsible in the use of
social networking sites
Answer Y E S if you AGREE with the statement
and N O if you DISAGREE.

1. My computer has an antivirus so it is okay to


open most e-mail attachments like e-cards and
video files.

2. Your friend told you that his college application


was rejected due to the fact that you posted a video
of him doing crazy stuff at a party. You posted the
video several years ago but later took it down to
protect your friend’s reputation. Can your friend be
right that the college found the video?
3.You and your best friend play a lot of
video games. One time, she asks you for
your password so she can help you level
up and get in-game money. She promises
to keep your password a secret. Is it okay
to give away your password?

4. You received an email stating that your


mother’s bank account is going to be
forfeited if you do not respond to the email.
Is it safe to reply?
5.You forgot that your essay for English
class is due tomorrow. While doing your
research, you found a website offering
free essays. Is it okay to use the essay
from this free essay website?

6. Letting people know your birthday is


probably a must if you want to get as
many gifts as possible. But having it in
your profile makes you vulnerable to
identify the theft.
Protecting
reputations
online
Internet
Copyright
Threats

Contextualized
Online
Security, safety
Rules of online search
Netiquette and research
and ethics
skills
Netiquette

Remember that your online representation


reflects YOU and the SOCIETY that you are
part of
1. You should apply the values and conduct learned since
childhood in the online extension of our society

2. Practice cultural relativism in using the web

3. Honor someone’s intellectual property

4. Be careful in choosing words to communicate


5. Keep in mind that there are laws existing in our society and on
the Web

6. If you wouldn't say it to someone's face, don't say it online

7. If you wouldn't show it in public, don't share it online

8. Don't repost without checking the facts


Online Safety and Security

What is INTERNET SAFETY?

-It refers to the


online security or
safety of peopleand
their information
when using the
internet.
TYPE OF INFORMATION RISKS

1. First Name There is a risk in sharing your first name, chances are , a
hacker may already know plenty of stuff about you even
if you only give out your first name.

2. Last Name If sharing your first name is a small risk, having both your
first and last is more risky. Matching a name with a face
is a modus to several cybercrimes' like identity theft

3. Middle Name Sharing your middle name is probably not themost risky
of these shared information, but sharing your full name
would be.

4. Current and Most people who steal identities study theirsubject.


previous school/s They can use this information for verificationpurposes.

5. Your cell phone You cell phone number should never be posted overthe
number internet.
Internet
Threats
Malware – stands
for malicious
software.
- is a set of
instructions that run What is it goodfor?
on your computer and a. Steal personal
make your system do information
something that an b. Delete files
attacker wants to do. c. Click fraud
d. Steal software serial
numbers
e. Use your computer
as relay
Different Kinds of Malware

Keyloggers

Virus Worm Trojan Spyware Adware

Rogue
security
software
Virus

- A computer virus is a piece of malicious


computer code that attaches itself to a
software program, email or computer file
without your permission.
Rogue security software- tricks
the user into posting that is a
security software. It asks the user to
pay to improve his/her security but
in reality that are not protected at
all.

Worm
Trojan
A malicious program
A malicious program Spread to that transfers from one
that is disguised as a other
computer to anotherby
useful program but computers
any type of means. It
once downloaded or uses computer network
installed, leaves your to spreaditself.
PCunprotected and Ex. ILOVEYOU worm
allows hackers to get
your information. Love Bug Worm created
by Filipino
Spyware

- A program that runs in the background


without you knowing it. It has the ability to
monitor what you are currently doing and typing
through keylogging.

KEYLOGGERS - used to record the


keystroke done by the user.
A program designed to
send your
advertisement, mostly
as pop-ups
SPAM
• unwanted e-mail mostly from bots
and advertisers

• Refers to the transmission of


unsolicited messages from various
origins using electric messaging
systems
EXAMPLE
PHISHING
its goal is to acquire sensitive personal
information like passwords and credit card
details
How to avoid these
threats?
A very effective way of avoiding
these threats is verifying the
authenticity and credibility of the
WEB source.
Data Privacy Act
protects personal data and information from
being shared without consent.
Think before You Click !
Ask yourself? Would you want your parentsor
grandparents to seeit?

Talk to your friends about this seriousresponsibility.

Set your post to “private”

Avoid using names. Names are easy for search engines to


scan

If you feel that a post can affect you or other’s reputation,


ask the one who posted it to pull it down or report it as
inappropriate

Potrebbero piacerti anche