Uploaded by martina robles

lesson-2-rules-of-netiquette

advertisement
Rules of Netiquette
• Online security, safety, and ethics
• Internet threats
• Protecting reputations online
• Copyright
• Contextualized online search and research skills
Objectives
• consider one's and others' safety when sharing information
using the Internet;
• consider one's and others' reputation when using the
Internet;
• determine and avoid the dangers of the Internet;
• be responsible in the use of social networking sites; and
• browse the Internet efficiently and properly through proper
referencing.
How Safe Are You?
P 5.00
P 5.00
P 5.00
P 8.00
P 40.00
P 30.00
P 25.00
P 50.00
P 35.00
P 12.00
First name
Last name
Middle name
Current and previous school(s)
Your cellphone number
The name of your mother/father
The name of your siblings
Your address
Your home phone number
Your birthday
Online Safety and Security
• The Internet, truly, is a powerful tool. It can be used to
promote your business, gain new friends, and stay in touch
with the old ones. It is also a source of entertainment through
games, online communities, and everything in between.
• But like most things in this world, there is always the "other
side of the coin." The Internet is one of the most dangerous
places, especially if you do not know what you are doing with
it.
• But there is no need to worry; it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go
about your use of the Internet.
Let us go back to the "How Safe Are You?" test. Let us
visit each item and see how risky it is to share them.
• First name
There is a risk in sharing your first name. Chances are, a
hacker may already know plenty of stuff about you even if you
only give out your first name. Likewise, you cannot just walk in
a room and start introducing yourself to everyone. You do not
know whom you can come across with.
• Last name
If sharing your first name is a small risk, having both your first
and last is more risky. You will be vulnerable to being searched
for using search engines, which include image search.
Matching a name with a face is a modus to several
cybercrimes like identity theft.
• Middle name
Sharing your middle name alone is probably not the most
risky of these shared information, but sharing your full
name would be.
• Current and previous school(s)
Most people who steal identities study their subject. They
can use this information for verification purposes.
• Your cellphone number
Your cellphone number should never be posted over the
Internet. The Internet is a public place. It is the same as
posting your number on a billboard. You would not want
random strangers to text or call you, or worse, pretend
that they are someone else.
• The name of your mother and father
Risky; yet not as risky as posting their full names, especially
your mother's maiden name. In fact, you may have already
encountered many websites that require your mother's
maiden name as an answer to a secret question whenever you
lose your password.
• The name of your siblings
Disclosing this is a huge risk. Strangers may pretend or use
their identity to dupe you.
• Your address
Hopefully, you answered "no" to this one. Giving the Internet
your number is one thing; giving them your address is a whole
other level. It would be much easier for criminals to find you.
• Your home phone number
This shared information is more risky than sharing your
personal phone number. Scams usually use this
information to deceive you, one of which is when a
stranger pretends to know your parents or pretends to be
you.
• Your birthday
Letting people know your birthday is probably a must if
you want tö get as many gifts as possible. But having it in
your profile makes you vulnerable to identity theft.
The Internet is defined as the information
superhighway.
• This means that anyone has access to this highway, can place
information, and can grab that information. Any information,
even things that you have set privately, can be accessed one
way or another.
• This is why social networking sites like Facebook continue to
improve their security features.
• The threat of cybercrime is very real.
• While you may not experience the threat now, Whatever
information we share today could affect our future.
Internet Threats
• Here are some of the threats you should be aware of when using
the Internet:
• 1. MALWARE – stands for malicious software
• A. Virus - a malicious program designed to replicate
itself and transfer from one computer to another either
through the Internet and local networks or data storage
like flash drives and CDs
• B. Worm — a malicious program that transfers from one
computer to another by any type of means. Often, it
uses a computer network to spread itself. For example,
the ILOVEYOU worm (Love Bug Worm) created by a
Filipino.
Internet Threats
• 1. MALWARE – stands for malicious software
• C. Trojan — a malicious program that is disguised as
a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to
get your information
• *Rogue security software — tricks the user into posing
that it is a security software. It asks the user to pay to
improve his/her security but in reality, they are not
protected at all.
Internet Threats
• 1. MALWARE – stands for malicious software
• Spyware — a program that runs in the background without
you knowing it (thus called "spy"). It has the ability to
monitor what you are currently doing and typing through
keylogging.
• *Keyloggers — used to record the keystroke done by the
users. This is done to steal their password or any other
sensitive information. It can record email, messages, or any
information you type using your keyboard.
• Adware — a program designed to send you
advertisements, mostly as pop- ups
Internet Threats
• 2. SPAM — unwanted email mostly from bots or
advertisers. It can be used to send malware
• 3. Phishing — Its goal is to acquire sensitive personal
information like passwords and credit card details. This is
done by sending you an email that will direct the user to
visit a website and be asked to update his/her username,
password, credit card, or personal information.
• *Pharming — a more complicated way of phishing where
it exploits the DNS (Domain Name Service) system.
Tips to Stay Safe Online
• Be mindful of what you share online and what site you share it to.
• Do not just accept terms and conditions; read it.
• Check out the privacy policy page of a website to learn how the website handles
the information you share.
• Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
• Do not share your password with anyone.
Tips to Stay Safe Online
• Avoid logging in to public networks/Wi-Fi. Browsing in "incognito (or private) mode," a
feature of the browser, will not protect you from hackers.
• Do not talk to strangers whether online or face-to-face.
• Never post anything about a future vacation. It is similar to posting, "Rob my house at
this date."
• Add friends you know in real life.
• Avoid visiting untrusted websites.
• Install and update an antivirus software on your computer. Use only one anti-virus
software to avoid conflicts.
Tips to Stay Safe Online
• If you have a Wi-Fi at home, make it a private network by adding a
password.
• Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is
most likely not monitored by the site owner.
• Buy the software; do not use pirated ones.
• Do not reply or click links from suspicious emails.
Protecting Information Online
• In the past, doing something embarrassing was not much of a big
deal. It happened; people would laugh at it, and they would
move on.
• Nowadays, embarrassing moments are captured using any device
you could imagine.
• What is worse is that people can easily upload it to the Internet,
where it can be stored forever.
• This could impact not only your reputation but also the people
around you.
• What is worse is that people tend to ignore this fact, and suffer
from it later in their life.
Protecting Information Online
• Once you post something over the Internet, search engines keep
them in their archives for search results.
• This makes anything you post to last forever even if you delete it
in your page.
• Something you and your friends find funny today may be
something that could harm someone's reputation later.
Did you know?
Before hiring, companies do a background check on the applicant,
and the easiest way to check your background is to visit pages that
are related to you.
Think Before You Click
• Before you post something on the web, ask these questions to
yourself: Would you want your parents or grandparents to see it?
Would you want your future boss to see it? Once you post something
On the web, you have no control of who sees your posts.
• Your friends depend on you to protect their reputation online. Talk to
your friends about this serious responsibility.
• Set your post to "private." In this way, search engines will not be able
to scan that post.
• Avoid using names. Names are easy for search engines to scan.
• If you feel that a post can affect you or other's reputation, ask the one
who posted it to pull it down or report it as inappropriate.
Copyright Infringement
• If you create something—an idea, an invention, a form of literary
work, or a research, you have the right as to how it should be used by
others. This is called intellectual property.
• As a responsible user of the Internet, you have to consider that not
everything out there is free for you to use. Just like your own,
contents that you see from websites have their respective copyrights.
Here are some tips that could help you avoid
copyright infringement:
• 1. UNDERSTAND. Copyright protects literary works, photographs,
paintings, drawings, films, music (and lyrics), choreography, and
sculptures, but it generally does NOT protect underlying ideas and
facts. This means that you can express something using your own
words, but-you should give credit to the source.
• 2. BE RESPONSIBLE. Even if a material does not say that it is
copyrighted, it is not a valid defense against copyright. Be responsible
enough to know if something has a copyright.
• 3. BE CREATIVE. Ask yourself whether what you are making is
something that came from you or something made from somebody
else's creativity. It is important to add your own creative genius in
everything that will be credited to you.
• 4. KNOW THE LAW. There are some limitations to copyright laws. For
instance in the Philippines, copyrights only last a lifetime (of the
author) plus 50 years.
• There are also provisions for "fair use" which mean that an
intellectual property may be used without a consent as long as it is
used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching, and education.
• If you have doubts that what you are doing does not fall under the
policy of fair use, seek permission first.
Online Research
• Have you ever searched the internet for certain information where
the search engine turned a different results?
Tips on Conducting Online Research
• Have a question in mind
• Focus on a question you want answered. If it is a series of question, start with one. Never
search everything in one go.
• Narrow it Down
• Search engines like Google, Bing, or Yahoo use several filters to determine the most
appropriate result for you. These search engines use your previous search history and your
geographical location, and send you the result which is the most related to you
Tips on Conducting Online Research
• Advance Search
• The best way to filter information you get from search engines is by using the advance search. This will
allow you to filter out information you do not need.
• Look for a credible source
• Some wikis, though filled with updated information, are not credible sources. This is due to the fact that
anyone can edit its content. When using wikis, check out the link of the cited text (indicated by
superscript number) to navigate to the footnote where the list of sources is located. Click the source of
the information and see if it credible.
• The more credible sources are scientific journals, established news and magazines, online
encyclopedias, and scholarly databases.
• Give Credit
• If you are going to use the information from a source for educational purposes, give credit to
the original author of the page or information. To properly cite a reference you may use the
format below:
Name of the person or organization (the author of the information). Title of the home page
in italics (title is shown in title bar but is sometimes missing or unrelated). URL. Date last seen
Download