Sei sulla pagina 1di 73

REVIEW:

 We have defined ICT or Information Communication and Technology.


 Explained the effects of ICT in the Philippines from different sectors
 Tackled about the state of ICT existing worldwide, its progress from
Web 1.0 to Web 3.0.
 Discussed Trends in ICT, current and existing trends all over the
world and its components and why are they important.

1
I CAN

 I can apply online safety, security, ethics, and


etiquette standards.
 I can practice these standard in my daily life.

2
GUESS THE WORD FROM LETTERS: {P,I,C, R,Y,A,G,F,V}

ANSWER: (7 LETTERS): P R I V A C Y
GUESS THE WORD FROM LETTERS: {A,C,G,H,D,E,Y,K,R}

ANSWER: (6 LETTERS): H A C K E R
GUESS THE WORD FROM LETTERS: {W,V,I,S,R,U,T}

ANSWER: (5 LETTERS): V I R U S
GUESS THE WORD FROM LETTERS: {E,R,I,N,C,S,I,T,U,Y}

ANSWER: (8 LETTERS): S E C U R I T Y
ONLINE SAFETY,
SECURITY, ETHICS,
AND ETIQUETTE
EMPOWERMENT TECHNOLOGIES
Are you Safe
and Secured
online?
8
How Safe and
Secured are you
online?
9
10
*Information & Images taken from various sites on the internet and is under OER Commons.
THE INTERNET

Internet is defined as the


information superhighway.
This means that anyone
has access to this highway,
can place info, and can
grab that info.
11
Think about it…

▰ How many hours do you spend on the Internet per day?


▰ Can you live without the Internet for a week?
▰ How many aspects of your life depend on the Internet?
▰ How many times have you complained about your Internet
connection speed?
Think about it…

▰ As teenagers, you are all exposed to many things powered


by the Internet.
▰ Whether it is socializing, playing games, reading sports
news, shopping, etc.
Online Safety and Security
▰ The Internet, truly, is a powerful tool.
▰ It can be used to promote your business, gain new friends,
and stay in touch with the old ones.
▰ It is also a source of entertainment.
▰ But like most things in this world, there is always “another
side of the coin.”
▰ The Internet is one of the most dangerous places,
especially if you do not know what you are doing with it.
1
INFORMATION AT RISK
These are types of information that are
at risk.
TYPES OF INFORMATION WITH RISK:

Mother’s and Sibling’s Home & Cell


Address
Father’s name Name Phone Number

Email First, Middle Current &


Birthday
Address & Last Name Previous School

Identity Theft 16
17
2
ONLINE SAFETY TIPS
Some Tips to Stay Safe Online

18
SOME TIPS TO STAY SAFE ONLINE:

1. Be mindful on what you share online.

19
SOME TIPS TO STAY SAFE ONLINE:

2. Do not just accept


terms and conditions,
read it.

20
SOME TIPS TO STAY SAFE ONLINE:

▰ 3. Check out the privacy policy page of a website to


learn how the website handles the information you
share.

21
SOME TIPS TO STAY SAFE ONLINE:

▰ 4. Know the security features of the social networking site


you use. By keeping your profile private, search engines
will now be able to scan your profile.

22
SOME TIPS TO STAY SAFE ONLINE:

5. Do not share your password with anyone.

23
24
25
26
27
28
29
SOME TIPS TO STAY SAFE ONLINE:

▰ 6. Avoid logging in the public networks/Wi-Fi.

Browsing in “incognito (or private) mode”, a feature of the


browser, will not protect you from hackers.

Security Dangers of
Is Public Wi-Fi Safe
Public Wi-Fi
30
SOME TIPS TO STAY SAFE ONLINE:

7. Do not talk to strangers whether online or face-to- face.

31
SOME TIPS TO STAY SAFE ONLINE:

8. Never post anything about a future vacation.

32
33
SOME TIPS TO STAY SAFE ONLINE:

9. Add friends you know in real life.

34
35
36
SOME TIPS TO STAY SAFE ONLINE:

10. Avoid visiting untrusted websites.

37
38
39
SOME TIPS TO STAY SAFE ONLINE:

11. If you have WiFi at home, make it private by adding a password.

40
SOME TIPS TO STAY SAFE ONLINE:

12. Install and


update an antivirus
software on your
computer.

41
ANTIVIRUS EXAMPLE:

ESET NOD32 KASPERSKY AVAST

F-SECURE NORTON SMADAV

42
SOME TIPS TO STAY SAFE ONLINE:

13. Avoid downloading anything from untrusted websites.

43
SOME TIPS TO STAY SAFE ONLINE:

14. Buy the software, do not use pirated ones.

44
SOME TIPS TO STAY SAFE ONLINE:

15. Do not reply or click links from suspicious emails.

45
3
INTERNET THREATS
Some internet threats to avoid or Viruses

overlook.
46
INTERNET THREATS:

1.Malware – stands for malicious software.

a. Virus – a malicious program


designed to replicate itself and transfer
from one computer to another (internet,
local networks, FDs, CDs, etc.)

47
INTERNET THREATS:

b. Worm – a malicious
program that transfers
from one computer to
another by any types of
means. Ex. ILOVEYOU
Worm

48
ILOVEYOU WORM

ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was


a computer worm that attacked tens of millions of Windowspersonal
computers on and after 5 May 2000[1] local time in the Philippines when it
started spreading as an email message with the subject line "ILOVEYOU"
and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file
extension ('vbs', a type of interpreted file) was most often hidden by
default on Windows computers of the time (as it is an extension for a file
type that is known by Windows), leading unwitting users to think it was a
normal text file. Opening the attachment activated the Visual Basic script.
49
ILOVEYOU WORM

The malware originated in the Pandacan neighborhood


of Manila in the Philippines on May 5, 2000, thereafter
following daybreak westward across the world as
employees began their workday that Friday morning,
moving first to Hong Kong, then to Europe, and finally
the United States.
50
INTERNET THREATS:

c. Trojan – a malicious program


that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.

51
INTERNET THREATS:

d. Spyware – a program that runs


in the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.

52
INTERNET THREATS:

e. Adware – a program designed to send you advertisements,


mostly as pop-ups.

53
54
55
56
INTERNET THREATS:

f. Ransomware – or ransom
software is a type of
malicious software from
cryptovirology that threatens
to publish the victim's data or
perpetually block access to it
unless a ransom is paid.

Ransomware 57
58
59
INTERNET THREATS:

2. Spam – an unwanted
email mostly from bots or
advertisers. It can be used to
send malware.

60
61
62
INTERNET THREATS:

3. Phishing – an unwanted acquisition of


sensitive personal information like
passwords and credit card details.

63
Netiquette

▰ Etiquette on the Internet


▰ Rules about the proper and polite
way to communicate with other
people when you are using the
Internet
65
THINK BEFORE
YOU CLICK.

66
Think Before You Click

1. Before you post something on the web, ask


these questions to yourself: Would you want your
parents or grandparents to see it? Would you
want your future boss to see it? Once you post
something on the web, you have no control of
who sees your posts.
Think Before You Click

2. Your friends depend on you to protect their


reputation online. Talk to your friends about this
serious responsibility.
Think Before You Click

3. Set your post to “private.” In this way,


search engines will not be able to scan
that post.
Think Before You Click

4. Avoid using names. Names are easy


for search engines to scan.
Think Before You Click

5. If you feel that a post can affect you


or other’s reputation, ask the one who
posted it to pull it down or report it as
inappropriate.
VALUES INTEGRATION

 Everyone’s own information is important, we must keep


this on to ourselves and if ever shared by others, we must
learn to keep it.
 Respect begets respect is also applied in technology
settings, not just real life setting.

72
ACTIVITY

 Share an experience that you have always tend to


do but later did you discover that it is not a
standard of ONLINE SAFETY, SECURITY, ETHICS,
AND ETIQUETTE.

73

Potrebbero piacerti anche