Presentation is loading. Please wait.

Presentation is loading. Please wait.

Online Safety, Security,Ethics, and Etiquette.

Similar presentations


Presentation on theme: "Online Safety, Security,Ethics, and Etiquette."— Presentation transcript:

1 Online Safety, Security,Ethics, and Etiquette

2

3

4 Online Safety, Security,Ethics, and Etiquette: INTERNET THREATS

5 At the end of the lesson you are expected to :  Name and Identify the different internet threats (malware) that are common in internet flat forms.  Considering one's safety when sharing information in the internet.  Be responsible in the use of social networking sites.  Create a Digital and Non-digital poster which promotes awareness on online safety,security,ethics,and etiquette standards

6

7 This picture shows the speed at which The Internet is changing the world. The sites we visit are so overwhelmingly popular to both adults and children.

8 The online world is increasingly integrated into our daily lives. The internet like the physical world,maybe safe or unsafe depending on our habits.

9 Sometimes, we do not pay much attention about the information that we share.

10 SAFETY FIRST!

11 Being safe and secured online depends on how we protect ourselves. Analyze the following statements Guess the correct answer by giving a thumbs-up if You agree and thumbs –down if not.

12 Without worries, download anything from untrusted websites.

13 It is fine to log-in to a public networks/Wi-Fi

14 Install and update an antivirus software on your computer.

15 Reply or click links from suspicious e-mail

16 Be mindful of what you share in the internet and what site you share it to.

17 Visit website that are in your most interest without checking its privacy polices.

18 Buy the software; do not use pirated ones

19 Do not talk to strangers whether online or face-to-face

20 Let’s Check your groups scores!

21 TIKTOK Vibe FACEBOOK VIBE

22 The internet is define as the information superhighway. This means that anyone has access to this highway, can place information and can grab that Information.

23 The more information you share online the higher the risks such as:

24 Identity theft phishing Malware infections

25

26 The threats in the internet is real. After all, it become a public place especially billions of people have an excess of knowledge about internet

27 malicious software

28 It is a malicious program that usually transfer from one device to another with the aid of the local networks, but commonly through data storage such as flash drives and hard drive.

29 This Malware replicates itself and can transfer by any type of means,but more often through computer network.

30 This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download.

31 A malicious program that monitors the device, and the actions of the users without its knowledge.

32 Keyloggers -Used to record the keystroke done by the users. This is done to steal their password or any information.

33 A program designed to send you advertisements mostly popups

34  VIRUS  WORM  TROJAN  SPYWARE  ADWARE

35

36

37 What are the different internet threats?

38  Identity Theft  Phishing  Malware Infections

39 What are the 5 types of malwares?

40  Virus  Worm  Trojan  Spyware  Adware

41 This Malware replicates itself and can transfer by any type of means, but more often through computer network.

42

43 Can you give one example of malware and its harmful effects on your computer.

44 1.Why do we have to be aware on the different MALWARES or threats in the internet?

45 Is uploading and downloading of software in the internet are safe? Why?

46 As a student, fun of online games, what will be your steps before uploading a game app to avoid malwares in your computer/cellphone?

47 TEST I : TECH. ASSISTANCE Can you help her? Name at least five malwares you see in the picture

48  VIRUS  WORM  TROJAN  SPYWARE  ADWARE

49 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. ______ 1. Read the terms and conditions before accepting it. ______ 2. Only download music or video from a trusted website. ______ 3. You can use a pirated software for personal use only. ______ 4. There is a danger for posting future vacation. ______ 5. Avoid logging in to free WIFI.

50 TEST II. TRUE OR FALSE Direction: Write True if you agree or False if you do not agree with the statements below. TRUE1. Read the terms and conditions before accepting it. TRUE 2. Only download music or video from a trusted website. FALSE 3. You can use a pirated software for personal use only. TRUE 4. There is a danger for posting future vacation. TRUE 5. Avoid logging in to free WIFI.

51 I

52 1.VIRUS 2. TROJAN 3.ADWARE 4.SPYWARE 5.WORM

53

54 OUTSIDE WORLD POSTER MAKING “Think before you click”. At this stay at home season, ICTs keep us entertained and informed. DIRECTION : Create a digital poster promoting “Think before you click”. Post it in your social media site as an awareness program for your friends and family. Pass/share to your subject teacher for checking.  If internet connection is not available or have no FB account a.Create your poster on a bond paper b.Make use of materials present in your place/community to design and upgrade your work (design with dry leaves,shells,beads,seeds ) c.Submit it to your teacher.

55 As a responsible digital citizen, we must be aware about these internet threats, how to avoid it, and practice our digital citizenship. To make a difference in the world of ICT. THANK YOU! AND GOOD MORNING!

56 Is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.

57 Unwanted email mostly from bots or advertisers. It can be used to send malware

58 However cyber criminals can use this to transfer malware or worst do cybercrimes

59 Mr. Victor Lorenzo, National Bureau of Investigation (NBI) cybercrime chief said that cybercrime incident rose up to 100% during the Covid-19 Pandemic, and phishing ranked one ( GMA News Online2020)

60

61 It is unauthorized accessing of data from a computer network. Mostly, hackers attack commercial and government sites to cause an alarm or to threat someone.

62 It is an illegal act of gambling on any sports event that happened over the internet.

63 A deceiving act which the culprit posted a product or service on the internet. Once the victim place its payment,the culprit does not give the items or services.

64 An anonymous criminal who harass, abuse, threat,or annoy other people. One example of this is Cyberbullying

65 Based on Republic Act no. 9775 or known as the Anti Child Pornography Act of 2009, it is an act of real or simulated explicit sexual activities that involves any child aged 18 and below and it is penalized depending on the offender.

66 It is an illegal act engage in any sexual activities.

67 It is an unauthorized use or stealing of intellectual property,such as movies and music,for profitable benefit.

68 “ ” Intellectual Property

69 “ ” Copyright A part of the law wherein your rights over your works and anyone who uses it without your consent is punishable by law.

70 Whether in the reality, or in the digital world, persons with bad intentions are everywhere, and they are just waiting for an opening to do it. As a responsible digital citizen (commonly called netizen (internet citizen) We must be aware of these internet threats, how to avoid it and practice our digital citizenship.

71 Be mindful of what you share and what site you share it to. Check out the privacy policy page of a website you use. Do not share password with anyone. Avoid logging in to public networks/Wi-Fi.

72 Do not talk to strangers whether online or face-to-face. Never post anything about feature vacations. Avoid visiting untrusted websites. Avoid downloading anything from untrusted websites.

73 Add friends you know in real life. Do not reply or click links from suspicious emails.

74

75

76 WORKSHEETS: Activity 1: Teach assistance Can you help her? Name at least five malwares you see in the picture

77 WORKSHEETS: Activity No. 1

78 Tips that could help you avoid Copyright Infringement UNDERSTAND. Copyright protects literary works,photographs, paintings,drawings, films,music,choreography, sculpture etc. but generally does NOT protect underlying ideas and facts. This means that you can express something using your own works but you should give credits to the source.

79 Tips that could help you avoid Copyright Infringement Be Responsible. Even if materials does not say that is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if someone has a copyright.

80 Tips that could help you avoid Copyright Infringement Be Creative. Ask yourself weather what you are making is something that came from you or something that came from somebody else’s creativity. It is important to add your own creative genius in everything that will be credited to you.

81 Tips that could help you avoid Copyright Infringement Know the Law. There are some limitations to copyright laws. For instance in the Philippines,copyrights only last a lifetime (0f the author) plus 50. years.

82 Tips that could help you avoid Copyright Infringement There is also provisions for “Fair Use” which mean that an intellectual property may be used without conset as long as it used in commentaries,criticism, search engines,parodies, news reports,research,library archiving,teaching and education.

83 Think Before you click…  Before you post something on the web, ask these questions to yourself. a.Would you want your parents and other members of you family to see it? b.Would you want your future boss to see it?

84 Think Before you click…  Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility.

85 Think Before you click…  Set your post to private. In this way, search engines will not be able to scan that post.

86 Think Before you click…  Avoid using names. Names are easy to search engines to scan.

87 Think Before you click…  If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as inappropriate.

88 Think Before you click…  Set your post to private. In this way, search engines will not be able to scan that post.

89 1.Do you agree or disagree with the provisions of the copyright law? Defend your answer. 2. How would you feel if someone posted something embarrassing about you? What would you do?

90 References: Empowerment Technologies, “Rules of Netiquette”. RexBookstore, Inc,p17-33,2016 https://www.youtube.com/watch?hUxMpDcXhw0


Download ppt "Online Safety, Security,Ethics, and Etiquette."

Similar presentations


Ads by Google