Uploaded by Jade Warren

SLM-for-EmpTech-Wk-2 (2)

advertisement
Republic of the Philippines
Department of Education
REGION V
SCHOOLS DIVISION OF LEGAZPI CITY
Pagasa National High School
Senior High School
Pag-asa Drive, Rawis Legazpi City
Student Learning Module #2
for Applied Subject
Empowerment Technologies
Online Safety, Security, Ethics and Etiquette
1
GETTING STARTED
After knowing the various ICTs that can improve our working productivity and
efficiency, let us learn the ethical con- duct and practices when using these ICTs.
This module covers the topics on the online safety, security, ethics and etiquette.


At the end of this module, the learners should be able to:
define netiquette and know the ethical issues and threats related to the use of
computer and online resources.
apply online safety, security, ethics, and etiquette standards and practices in ICT.
Competency code: CS_ICT11/12-ICTPT-Ia-b-2
In doing this module, please follow these reminders…
1. Take the pretest before working or answering the
module.
2. Perform the activities as suggested.
3. Answer all the exercises.
4. Check your answers against the Key to Correction.
5. Take the Post Test.
2
PRETEST
Directions: Identify whether the statements are True of False.
True o r False
_________1. Netiquette is the proper manners and behavior online.
_________2. It is alright to use all caps when chatting.
_________3. All personal information is good to put on a social
networking website because it enhances your experience
on the site.
_________4. The internet is secure.
_________5. Cyberbullying is a crime
_________6. It is alright to use someone’s photo as your profile picture
on social networking sites.
_________7. Always use your real name on social network- ing sites.
_________8. Love bug is a virus.
_________9. Update your antivirus once a month.
_________10. Phishing is the term use to catch fish online.
_________11. Using your birthdate as your password is good.
_________12. Always think before you click.
_________13. It is alright to share your password with your classmate.
_________14. Always open emails from someone you don’t know.
_________15. Scanning someone’s flash drive before using is a good
practice.
3
STUDY TIME
Netiquette is short for " Internet Etiquette“. It simply means the use
of good manners in online communications such as e-mail, forums, blogs,
and other social networking sites.
Netiquette is important as most online communication are non-verbal.
You have to follow Internet etiquette because there are other people such as
your friends, relatives, elders who are using the Internet for all online
communications. Hence it is correct to be- have properly and write politely
to everyone.
10 Best Rules of Netiquette
1. The Golden Rule - Treat others as you would like to be treated.
2. No Flaming - Flame is a personal insult communicated through the
internet.
3. Don’t type in ALL CAPS - People may misinterpret it like you’re
yelling or raising your voice.
4. Don’t SPAM - Do not send any unsolicited emails.
5. Respect Privacy - Respect others' privacy by not sharing per- sonal
information, photos, or videos without their permission.
6. Obey Copyright Laws - Do not steal someone else’s idea,
property and rights.
7. Use Proper Grammar & Spelling - Don’t use shortcut words like “jejemon
words”; Errors diminishes the credibility of the mes- sage.
8. Be Honest / Be Yourself - Tell the truth, do not pretend to be
someone.
9. Follow the TOS (Terms of Service) - Rules & Policies of the sites.
10. Always Say Thank you - Always thank others who help you online.
Online Safety
- Is the knowledge of maximizing the user's personal safety and security
risks on private information and property associ- ated with using the
internet, and the self-protection from com- puter crime in general.
Internet Threats
- Are malicious programs that can target you when you're us- ing the
Internet. These threats include a range of malicious software programs that
are designed to infect victims' com- puters and facilitate cybercrime.
Common Internet Threats:
1. Malware
- stands for Malicious Software
- is a set of instructions that runs on your computer and make your
4
systems do something that an attackers wants it to do like stealing
personal information, deleting files and stealing software serial
number.
Types of Malware:
A. Virus - a type of malware that, when executed, it rep- licates itself by
modifying other computer programs and inserting its own code.
B. Worm - a malicious program that transfers from one computer to
another by any type of means. It uses computer network to spread
itself.
C. Trojan - a malicious program that disguised as a use- ful program
but once downloaded or installed, it leaves your PC unprotected and
allows hackers to get your information.
D. Spyware - a program that runs in the background without your
knowledge. It has the ability to monitor what you are currently doing
and typing through keylogging.
E. Adware - is a type of malware software that displays unwanted ads
when a user is surfing the internet. Ex. Pop-up advertisement
2. Spam
- refers to the transmission of unsolicited messages from various origins
using electric messaging systems/ email systems.
5
3. Phishing
- Is a software or program used by hacker to obtain per- sonal
information like passwords and credit card details. Example is
Pharming which is a more complex version of phishing that exploits
the DNS system. Pharmers of- ten create web pages mimicking that of
a trustworthy business, such as an online banking log-in page. Users
will then enter their details, thinking they are logging in to their usual
service, and their details will be stolen by the pharmer. Another
example of
phishing is Wi-Fi Eavesdropping. It is another
method used by cyber crim- inals to capture personal information.This
is done by vir- tual “listening in” on information that's shared over an
unsecured (not encrypted) Wi-Fi network.
4. Rogue Security Software
- If you are ever downloading antivirus or antispyware pro- grams, make
sure you have purchased it from a legitimate source. Rogue security
software will often ask you to pay for extra protection, which is a huge
con. The security software is completely useless and criminals have
robbed you of your money.
Copyright Infringement
- Is a violation of an individual or organization's
copyright. It de- scribes the unauthorized use
of someone’s intellectual proper- ties or
copyrighted material, such as text, photos,
videos, music, software, and other original
content for commercial purposes.
- If you create something—an idea, an invention,
a form of literary work, or a research, you have
the right of how it should be used by others.
This is called intellectual property.
Plagiarism
- Is presenting someone else’s work or ideas as your own, with or without
their consent, by incorporating it into your work without full
acknowledgement.
6
Cyberbullying
- Refers to the act of cruelty committed using
the Inter- net or any form of elec- tronic
media or technology that has the effect of
strip- ping one’s dignity or caus- ing
reasonable fear or physical or emotional
harm. This usually occurs on online media
platforms such as social media and public
websites.
Ten (10) Tips to Stay Safe
1. Create Complex Passwords. Use strong & unique
password.
2. Boost Your Network Security. When at home or work, use a
password-protected router that encrypts your data. If you’re using
public wi-fi make sure you’re using Virtual Private Network (VPN).
3. Use a Firewall. Is an electronic barrier that blocks unauthorized access to your computers and devices.
4. Click Smart. “Think Before You Click.” Always be cau- tious in clicking
links, downloading and opening suspi- cious files.
5. Be a Selective Sharer. Don’t just share your personal information to
anybody online or to any websites unless you trust them.
6. Keep Your Privacy Settings On. Marketers love to know all about you,
and so do hackers.
7. Practice Safe Surfing & Shopping. When shopping online or visiting
websites for online banking or other sen- sitive transactions, always
make sure that the sites are secured and legit.
8. Keep up to date. Keep all your software updated so you have the latest
security patches specially your anti- virus.
9. Lookout for the latest scams. Online threats are evolving all the time,
so make sure you know what to look out for.
10. Keep your guard up. Always be cautious about which sites you visit,
what you do online and specially to whom you are chatting with since
we really don’t know who's in the other side.
7
PRACTICE TIME
A. Read and understand carefully the following state- ments. Identify
which rule of netiquette has been violated base on the Best 10 Rules of
Netiquette given in this module. Write your answer on the space
provided.
1. Lando posted a rant post on Facebook because he did not receive
financial assistance.
Answer:
2. John uses someone else’s photo as his profile picture on Instagram.
Answer:
3. Eric sends a chained message to his Facebook friends.
Answer:
4. Nick loves to use shortcut words when chatting.
Answer:
5. Respect others as you want to be respected online.
Answer:
6. Hackers use malwares and other programs to get personal information
of others.
Answer:
7. Downloading movies and sell it to others.
Answer:
8. Listening to other’s conversation.
Answer:
9. Messaging someone in all caps letter.
Answer:
10. Marco uses cracked software instead of buying the licensed one.
Answer:
8
B. Find and encircle all the words that are hidden in the grid. The
words can be found in any direction.
Hidden Words:
Netiquette
Pharming
Malware
Spyware
Cyberbullying
Phishing
Security
Password
Spamming
Privacy
9
Complete the crossword puzzle by using the hints be- low.
Across:
2. short for Malicious Software
4. short for Internet Etiquette
6. owning someone else’s work or ideas
8. type of malware that disguised as a useful program
10. type of malware that can replicate itself once executed
Down:
1. keylogging
3. term used for personal insult communicated online
5. transmission of unsolicited messages
6. harassing someone online
9. mostly combination of numbers and letters
10
KEY POINTS
Hi Guys!
Please do not forget
the following.
Netiquette
- short for Internet Etiquette and refers to the
proper manners and behavior online.
Four (4) Common Internet Threats:
1. Malware
2. Spam
3. Phishing
4. Rogue Security Software
Five (5)Types of Malware:
1. Virus
2. Worm
3. Trojan
4. Spyware
5. Adware
Important Tips:
1. Always follow netiquette rules online
2. Always keep your personal information private.
3. Always think before you click.
11
POSTTEST
Direction: Encircle the best answer for the following ques- tions or
statements.
1. What is the Golden Rule of Netiquette?
A. Treat others as you would like to be treated.
B. Use smiley in every message
C. Never flame a friend
D. Don’t use all caps
2. Spamming is very poor netiquette and it means
A. Sending in lines of nonsensical garbage in a chat
conversation.
B. Posting a message that contains graphic descriptions of something
really gross.
C. Spilling the juice of meat-byproducts into your keyboard.
D. Posting or emailing unsolicited advertising messages to a wide
audience.
3. What is the importance of Netiquette?
A. It helps you create a positive impression on those you
meet in cyberspace.
B. It explains some of the technical limitations of online communications.
C. It explains the conventions already being used by millions of
netizens.
D. All of the above.
4. Which of the following you should never give out on the Internet?
A. Your name C. Your address
B. Your age
D. All of the above
5. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your wall on
Facebook.
C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online.
6. What does Malware stands for?
A. Malfunctioned Hardware C. Malicious Welfare
B. Malicious Software
D. Delicious Software
7. A software or program used by hacker to obtain personal in-
formation.
A. Virus B. Worm
C. Trojan D. Phishing
8. What makes a good password?
A. Easy for you to remember but difficult for others to figure out.
B. It is long and usually consist of your name.
C. Use the name of your favorite super hero character.
D. Just type 1234.
9. What do you do if you feel you are being cyber-bullied?
A. Tell a trusted adult like a parent or teacher.
B. Tell no one, it's embarrassing.
C. Just delete anything referring to you on the internet.
D. Call the police.
10. What does TOS stands for?
A. Terms of Service
C. Terms of Security
B. Table of Specifications
D. None of the above
12
11. Refers to the transmission of unsolicited messages.
A. Spamming
C. Keylogging
B. Phishing
D. Malware
12. This method is used by cyber criminals to capture personal
information by virtual “listening in” on information that's shared over
an unsecured Wi-Fi network.
A. Pharming
C. Wi-Fi Eavesdropping
B. Spamming
D. Phishing
13. A more complex version of phishing that exploits the DNS system.
A. Pharming
C. Wi-Fi Eavesdropping
B. Spamming
D. Phishing
14. An act of harming or harassing a person via information
technology networks in a repeated and deliberate manner.
A. Copyright Infringement C. Cyberbullying
B. Flaming
D. Phishing
15. The unauthorized use of someone’s intellectual property.
A. Copyrighting
C. Copy-Paste
B. Copyright Infringement D. Patenting
13
14
Download