Republic of the Philippines Department of Education REGION V SCHOOLS DIVISION OF LEGAZPI CITY Pagasa National High School Senior High School Pag-asa Drive, Rawis Legazpi City Student Learning Module #2 for Applied Subject Empowerment Technologies Online Safety, Security, Ethics and Etiquette 1 GETTING STARTED After knowing the various ICTs that can improve our working productivity and efficiency, let us learn the ethical con- duct and practices when using these ICTs. This module covers the topics on the online safety, security, ethics and etiquette. At the end of this module, the learners should be able to: define netiquette and know the ethical issues and threats related to the use of computer and online resources. apply online safety, security, ethics, and etiquette standards and practices in ICT. Competency code: CS_ICT11/12-ICTPT-Ia-b-2 In doing this module, please follow these reminders… 1. Take the pretest before working or answering the module. 2. Perform the activities as suggested. 3. Answer all the exercises. 4. Check your answers against the Key to Correction. 5. Take the Post Test. 2 PRETEST Directions: Identify whether the statements are True of False. True o r False _________1. Netiquette is the proper manners and behavior online. _________2. It is alright to use all caps when chatting. _________3. All personal information is good to put on a social networking website because it enhances your experience on the site. _________4. The internet is secure. _________5. Cyberbullying is a crime _________6. It is alright to use someone’s photo as your profile picture on social networking sites. _________7. Always use your real name on social network- ing sites. _________8. Love bug is a virus. _________9. Update your antivirus once a month. _________10. Phishing is the term use to catch fish online. _________11. Using your birthdate as your password is good. _________12. Always think before you click. _________13. It is alright to share your password with your classmate. _________14. Always open emails from someone you don’t know. _________15. Scanning someone’s flash drive before using is a good practice. 3 STUDY TIME Netiquette is short for " Internet Etiquette“. It simply means the use of good manners in online communications such as e-mail, forums, blogs, and other social networking sites. Netiquette is important as most online communication are non-verbal. You have to follow Internet etiquette because there are other people such as your friends, relatives, elders who are using the Internet for all online communications. Hence it is correct to be- have properly and write politely to everyone. 10 Best Rules of Netiquette 1. The Golden Rule - Treat others as you would like to be treated. 2. No Flaming - Flame is a personal insult communicated through the internet. 3. Don’t type in ALL CAPS - People may misinterpret it like you’re yelling or raising your voice. 4. Don’t SPAM - Do not send any unsolicited emails. 5. Respect Privacy - Respect others' privacy by not sharing per- sonal information, photos, or videos without their permission. 6. Obey Copyright Laws - Do not steal someone else’s idea, property and rights. 7. Use Proper Grammar & Spelling - Don’t use shortcut words like “jejemon words”; Errors diminishes the credibility of the mes- sage. 8. Be Honest / Be Yourself - Tell the truth, do not pretend to be someone. 9. Follow the TOS (Terms of Service) - Rules & Policies of the sites. 10. Always Say Thank you - Always thank others who help you online. Online Safety - Is the knowledge of maximizing the user's personal safety and security risks on private information and property associ- ated with using the internet, and the self-protection from com- puter crime in general. Internet Threats - Are malicious programs that can target you when you're us- ing the Internet. These threats include a range of malicious software programs that are designed to infect victims' com- puters and facilitate cybercrime. Common Internet Threats: 1. Malware - stands for Malicious Software - is a set of instructions that runs on your computer and make your 4 systems do something that an attackers wants it to do like stealing personal information, deleting files and stealing software serial number. Types of Malware: A. Virus - a type of malware that, when executed, it rep- licates itself by modifying other computer programs and inserting its own code. B. Worm - a malicious program that transfers from one computer to another by any type of means. It uses computer network to spread itself. C. Trojan - a malicious program that disguised as a use- ful program but once downloaded or installed, it leaves your PC unprotected and allows hackers to get your information. D. Spyware - a program that runs in the background without your knowledge. It has the ability to monitor what you are currently doing and typing through keylogging. E. Adware - is a type of malware software that displays unwanted ads when a user is surfing the internet. Ex. Pop-up advertisement 2. Spam - refers to the transmission of unsolicited messages from various origins using electric messaging systems/ email systems. 5 3. Phishing - Is a software or program used by hacker to obtain per- sonal information like passwords and credit card details. Example is Pharming which is a more complex version of phishing that exploits the DNS system. Pharmers of- ten create web pages mimicking that of a trustworthy business, such as an online banking log-in page. Users will then enter their details, thinking they are logging in to their usual service, and their details will be stolen by the pharmer. Another example of phishing is Wi-Fi Eavesdropping. It is another method used by cyber crim- inals to capture personal information.This is done by vir- tual “listening in” on information that's shared over an unsecured (not encrypted) Wi-Fi network. 4. Rogue Security Software - If you are ever downloading antivirus or antispyware pro- grams, make sure you have purchased it from a legitimate source. Rogue security software will often ask you to pay for extra protection, which is a huge con. The security software is completely useless and criminals have robbed you of your money. Copyright Infringement - Is a violation of an individual or organization's copyright. It de- scribes the unauthorized use of someone’s intellectual proper- ties or copyrighted material, such as text, photos, videos, music, software, and other original content for commercial purposes. - If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property. Plagiarism - Is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement. 6 Cyberbullying - Refers to the act of cruelty committed using the Inter- net or any form of elec- tronic media or technology that has the effect of strip- ping one’s dignity or caus- ing reasonable fear or physical or emotional harm. This usually occurs on online media platforms such as social media and public websites. Ten (10) Tips to Stay Safe 1. Create Complex Passwords. Use strong & unique password. 2. Boost Your Network Security. When at home or work, use a password-protected router that encrypts your data. If you’re using public wi-fi make sure you’re using Virtual Private Network (VPN). 3. Use a Firewall. Is an electronic barrier that blocks unauthorized access to your computers and devices. 4. Click Smart. “Think Before You Click.” Always be cau- tious in clicking links, downloading and opening suspi- cious files. 5. Be a Selective Sharer. Don’t just share your personal information to anybody online or to any websites unless you trust them. 6. Keep Your Privacy Settings On. Marketers love to know all about you, and so do hackers. 7. Practice Safe Surfing & Shopping. When shopping online or visiting websites for online banking or other sen- sitive transactions, always make sure that the sites are secured and legit. 8. Keep up to date. Keep all your software updated so you have the latest security patches specially your anti- virus. 9. Lookout for the latest scams. Online threats are evolving all the time, so make sure you know what to look out for. 10. Keep your guard up. Always be cautious about which sites you visit, what you do online and specially to whom you are chatting with since we really don’t know who's in the other side. 7 PRACTICE TIME A. Read and understand carefully the following state- ments. Identify which rule of netiquette has been violated base on the Best 10 Rules of Netiquette given in this module. Write your answer on the space provided. 1. Lando posted a rant post on Facebook because he did not receive financial assistance. Answer: 2. John uses someone else’s photo as his profile picture on Instagram. Answer: 3. Eric sends a chained message to his Facebook friends. Answer: 4. Nick loves to use shortcut words when chatting. Answer: 5. Respect others as you want to be respected online. Answer: 6. Hackers use malwares and other programs to get personal information of others. Answer: 7. Downloading movies and sell it to others. Answer: 8. Listening to other’s conversation. Answer: 9. Messaging someone in all caps letter. Answer: 10. Marco uses cracked software instead of buying the licensed one. Answer: 8 B. Find and encircle all the words that are hidden in the grid. The words can be found in any direction. Hidden Words: Netiquette Pharming Malware Spyware Cyberbullying Phishing Security Password Spamming Privacy 9 Complete the crossword puzzle by using the hints be- low. Across: 2. short for Malicious Software 4. short for Internet Etiquette 6. owning someone else’s work or ideas 8. type of malware that disguised as a useful program 10. type of malware that can replicate itself once executed Down: 1. keylogging 3. term used for personal insult communicated online 5. transmission of unsolicited messages 6. harassing someone online 9. mostly combination of numbers and letters 10 KEY POINTS Hi Guys! Please do not forget the following. Netiquette - short for Internet Etiquette and refers to the proper manners and behavior online. Four (4) Common Internet Threats: 1. Malware 2. Spam 3. Phishing 4. Rogue Security Software Five (5)Types of Malware: 1. Virus 2. Worm 3. Trojan 4. Spyware 5. Adware Important Tips: 1. Always follow netiquette rules online 2. Always keep your personal information private. 3. Always think before you click. 11 POSTTEST Direction: Encircle the best answer for the following ques- tions or statements. 1. What is the Golden Rule of Netiquette? A. Treat others as you would like to be treated. B. Use smiley in every message C. Never flame a friend D. Don’t use all caps 2. Spamming is very poor netiquette and it means A. Sending in lines of nonsensical garbage in a chat conversation. B. Posting a message that contains graphic descriptions of something really gross. C. Spilling the juice of meat-byproducts into your keyboard. D. Posting or emailing unsolicited advertising messages to a wide audience. 3. What is the importance of Netiquette? A. It helps you create a positive impression on those you meet in cyberspace. B. It explains some of the technical limitations of online communications. C. It explains the conventions already being used by millions of netizens. D. All of the above. 4. Which of the following you should never give out on the Internet? A. Your name C. Your address B. Your age D. All of the above 5. To avoid being cyber-bullied you should always... A. Give out personal information to anyone who asks. B. Strike first - post mean things about other people on your wall on Facebook. C. Observe proper netiquette rules. D. Ignore any requests from people to be your friend online. 6. What does Malware stands for? A. Malfunctioned Hardware C. Malicious Welfare B. Malicious Software D. Delicious Software 7. A software or program used by hacker to obtain personal in- formation. A. Virus B. Worm C. Trojan D. Phishing 8. What makes a good password? A. Easy for you to remember but difficult for others to figure out. B. It is long and usually consist of your name. C. Use the name of your favorite super hero character. D. Just type 1234. 9. What do you do if you feel you are being cyber-bullied? A. Tell a trusted adult like a parent or teacher. B. Tell no one, it's embarrassing. C. Just delete anything referring to you on the internet. D. Call the police. 10. What does TOS stands for? A. Terms of Service C. Terms of Security B. Table of Specifications D. None of the above 12 11. Refers to the transmission of unsolicited messages. A. Spamming C. Keylogging B. Phishing D. Malware 12. This method is used by cyber criminals to capture personal information by virtual “listening in” on information that's shared over an unsecured Wi-Fi network. A. Pharming C. Wi-Fi Eavesdropping B. Spamming D. Phishing 13. A more complex version of phishing that exploits the DNS system. A. Pharming C. Wi-Fi Eavesdropping B. Spamming D. Phishing 14. An act of harming or harassing a person via information technology networks in a repeated and deliberate manner. A. Copyright Infringement C. Cyberbullying B. Flaming D. Phishing 15. The unauthorized use of someone’s intellectual property. A. Copyrighting C. Copy-Paste B. Copyright Infringement D. Patenting 13 14