Uploaded by Jerick Manlagñit

TVL-EMPOWERMENT-TECHNOLOGIES-Q3-M3

advertisement
g
Empowerment
Technologies
QUARTER 1
MODULE
3
Online Safety, Security, Ethics,
and Etiquette: Internet Threats
TECHNICAL
VOCATIONAL
LIVELIHOOD
Empowerment Technologies – Grade 12
Quarter 1 – Module 3: Online Safety, Security, Ethics, and Etiquette: Internet Threats
First Edition, 2020
Republic Act 8293, Section 176 states that no copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand
names, trademarks, etc.) included in this module are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission to use
these materials from their respective copyright owners. The publisher and authors
do not represent nor claim ownership over them.
Published by the Department of Education - Schools Division of Pasig City
Development Team of the Self-Learning Module
Writer: Chirelyn P. Delavega
Editor: Name
Reviewers: Janeth M. Pineda (Content) and Cerina V. Galoy (Technical)
Illustrator: Name
Layout Artist: Name
Management Team:
Ma. Evalou Concepcion A. Agustin
OIC-Schools Division Superintendent
Aurelio G. Alfonso EdD
OIC-Assistant Schools Division Superintendent
Victor M. Javeña EdD
Chief, School Governance and Operations Division and
OIC-Chief, Curriculum Implementation Division
Education Program Supervisors
Librada L. Agon EdD (EPP/TLE/TVL/TVE)
Liza A. Alvarez (Science/STEM/SSP)
Bernard R. Balitao (AP/HUMSS)
Joselito E. Calios (English/SPFL/GAS)
Norlyn D. Conde EdD (MAPEH/SPA/SPS/HOPE/A&D/Sports)
Wilma Q. Del Rosario (LRMS/ADM)
Ma. Teresita E. Herrera EdD (Filipino/GAS/Piling Larang)
Perlita M. Ignacio PhD (EsP)
Dulce O. Santos PhD (Kindergarten/MTB-MLE)
Teresita P. Tagulao EdD (Mathematics/ABM)
Printed in the Philippines by Department of Education – Schools Division of
Pasig City
Empowerment
Technologies
QUARTER 1
MODULE
3
Online Safety, Security,
Ethics, and Etiquette:
Internet Threats
Introductory Message
For the Facilitator:
Welcome to the Empowerment Technologies Self-Learning Module on Online
Safety, Security, Ethics, and Etiquette: Internet Threats!
This Self-Learning Module was collaboratively designed, developed and
reviewed by educators from the Schools Division Office of Pasig City headed by its
Officer-in-Charge Schools Division Superintendent, Ma. Evalou Concepcion A.
Agustin, in partnership with the City Government of Pasig through its mayor,
Honorable Victor Ma. Regis N. Sotto. The writers utilized the standards set by the K
to 12 Curriculum using the Most Essential Learning Competencies (MELC) in
developing this instructional resource.
This learning material hopes to engage the learners in guided and independent
learning activities at their own pace and time. Further, this also aims to help learners
acquire the needed 21st century skills especially the 5 Cs, namely: Communication,
Collaboration, Creativity, Critical Thinking, and Character while taking into
consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
Notes to the Teacher
This contains helpful tips or strategies that
will help you in guiding the learners.
As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Moreover, you are expected to encourage and assist the
learners as they do the tasks included in the module.
For the Learner:
Welcome to the Empowerment Technologies Self-Learning Module on Online
Safety, Security, Ethics, and Etiquette: Internet Threats!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time. You
will be enabled to process the contents of the learning material while being an active
learner.
This module has the following parts and corresponding icons:
Expectations - This points to the set of knowledge and skills
that you will learn after completing the module.
Pretest - This measures your prior knowledge about the lesson
at hand.
Recap - This part of the module provides a review of concepts
and skills that you already know about a previous lesson.
Lesson - This section discusses the topic in the module.
Activities - This is a set of activities that you need to perform.
Wrap-Up - This section summarizes the concepts and
application of the lesson.
Valuing - This part integrates a desirable moral value in the
lesson.
Posttest - This measures how much you have learned from the
entire module.
EXPECTATIONS
At the end of the learning period, the students shall have:
1. differentiate the malwares and cybercrimes in the Internet;
2. name the types of malware using the image;
3. illustrate an editorial sketch of your chosen cybercrime that happened
during this pandemic; and
4. plan their own set of rules to avoid these Internet threats.
PRETEST
Directions: Being safe and secured online depends on how we protect
ourselves. Analyze the following statement below. On the blank circle, draw
thumbs-up if you agree, and thumbs-down if not.
RECAP
Do you a have good memory? Let’s review the past lesson by filling-in the
organizer with 5 examples each category below:
Categories
Answers
ICTs
Social Media
LESSON
Have you encountered the blue screen of death after your accessed or
downloaded a free product from a website? If yes, do not worry. You are not
the only one who suffer this damage on their ICTs. Some of us, even me,
experience this one. Through this lesson, you will learn how to protect yourself
and the other users in the digital world.
The threats in the Internet is real. After all, it become a public place especially
billions of people have an access and knowledge about Internet. One of the
threats that you must avoid is the malware. This term came from the blended
words “malicious” and “software”. Internet users usually acquired this threat
through online. Malware is an umbrella term covering five (5) different types:
1. Virus – It is malicious program that usually transfer from one device to
another with the aid of the Internet and local networks, but commonly
through data storage such
as flash drives or hard drive.
2. Worm – Unlike the virus, this malware replicates itself and can transfer by
any type of means, but more often through computer network. Remember the
ILOVEYOU worm, known as Love Bug, that infected 45 million machines
across the globe, including the Pentagon, within 24 hours last May 4, 2000?
(Computer Weekly, 2020.) When the victim opens the attachment, an e-mail
entitled LOVE-LETTER-FOR-YOU, the malware automatically send itself to all
the victim’s Microsoft Outlook contacts.
3. Trojan – Tracing its name origin, it can be link to the mythology story about
how Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like
the Odysseus’ strategy, this malicious program disguised as a useful program,
however left your devices unprotected and became vulnerable to other
malwares once you accessed or downloaded it.
4. Spyware – a malicious program that monitors the device, and the actions
of the user without its knowledge. Another example, the keylogger steals
sensitive information using the recorded user’s keystrokes.
5. Adware – this program automatically sends pop-ups advertisements.
Usually spam or unwanted emails contains bots and advertisements, however
cyber criminals can use this to transfer malwares; or worst, do cybercrimes
like phishing. Mr. Victor Lorenzo, National Bureau of Investigation (NBI)
Cybercrime Division Chief, said that cybercrime incidents rose up to 100%
during the Covid-19 pandemic, and phishing ranked one (GMA News Online
2020). Does it sound fishy? Like in fishing, criminal steals sensitive personal
information like account passwords and banking details by sending out an
alarming e-mail as a bait. Usually, they ask you to click a link, or input your
username, password, or any personal info.
Phishing is an example of cybercrime, an illegal act done using Internet, and
there’s more:
1. Hacking – it is unauthorized accessing of data from a computer network.
Mostly, hackers attack commercial and government sites to cause an alarm
or to threat someone.
2. Sport Betting – it is an illegal act of gambling on any sports event that
happened over the Internet.
3. Non-Delivery of Merchandise – a deceiving act which the culprit posted a
product or service on the Internet. Once the victim placed its payment, the
culprit does not give the item or service.
4. Electronic Harassment – an anonymous criminal who harass, abuse,
threat, or annoy other people. One example of this is cyberbullying or the
repeated harassment that usually happens among the youth, and from the
past years, becomes the main cause of suicide cases.
5. Child Pornography – Based on Republic Act no 9775 or known as AntiChild Pornography Act of 2009, it is an act of real or simulated explicit sexual
activities that involves any child aged 18 and below and it is penalized
depending on the offender. If it is the parent or relative of the child, they’ll
receive the maximum penalty.
6. Prostitution – it is an illegal act engage in any sexual activities.
7. Criminal Copyright Infringement – it is an unauthorized use or stealing
of intellectual property, such as movies and music, for profitable benefit.
Sometimes, students violate it through plagiarism.
Whether in the reality, or in the digital world, persons with bad intentions are
everywhere, and they are just waiting for an opening to do it. As a responsible
digital citizen (commonly called netizen (Internet citizen), we must be aware
about these Internet threats, how to avoid it, and practice our digital
citizenship.
ACTIVITIES
I. TECH. ASSISTANCE: Can you help her? Name at least five malwares you
see in the picture.
Write your answers
here:
1. __________________
2. __________________
3. __________________
4. __________________
5. __________________
II. OUTSIDE WORLD: At this stay at home season, ICTs keep us entertained
and informed. From the past months up until now, illustrate an editorial
cartoon featuring your one chosen cybercrime that happened during this
pandemic lockdown.
WRAP-UP
From the lesson, malwares have six (6) types. Can you list it? Please, write it
down in an alphabetical order.
1. _______________
2. _______________
3. _______________
4. _______________
5. _______________
6. _______________
These malwares can be an avenue for cybercrimes. Can you enumerate the 7
cybercrimes mentioned from this module?
1. _______________
2. _______________
3. _______________
4. _______________
5. _______________
6. _______________
7. _______________
In wherever world you are, real or digital, threats are just in the corner waiting
to harm someone. Always remember, security and safety always start from
us.
VALUING
Sounds cliché, but honesty is the best policy. Share the “bad things” or any
unwarranted acts (like piracy) you have done using ICT. Ask yourself why you
did that/them. Read your answer in front of the mirror while your alone.
Assess yourself and what you feel.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
POSTTEST
Directions: Rules like “No Food nor Drinks Allowed” and “Log out your
account” are commonly posted on computer laboratory and shop. As a
responsible netizen, plan a set of rules (10) that you need to follow when your
online or in the digital world. Post it in any place where you can see this often.
KEY TO CORRECTION
To check your progress, here are the answers for the following activities:
References
•
Yuvienco, Joel. Empowerment Technologies (Student Reader). 1st ed.
Pasig City: Department of Education, 2016.
•
Innovative Training Works, Inc. Empowerment Technologies. 1st ed.
Manila: Rex Bookstore (2016).
•
White, Geoff. “Revealed: The man behind the first major computer
virus pandemic.” Computer Weekly, April 21, 2020.
https://www.computerweekly.com/news/252481937/Revealed-The-manbehind-the-first-major-computer-virus-pandemic (Accessed June 11, 2020).
•
Hamilton, Edith. Mythology Timeless Tales of Gods and Heroes. New
York: Grand Central Publishing, 1942
•
GMA News Online. 2020. “Cybercrime incidents up 100% amid ECQNBI”.
Accessed June14, 2020.
https://www.gmanetwork.com/news/scitech/technology/735231/cybercri
me-incidents-up-100-amid-ecq-nbi/story/
•
Philippine Congress. Republic Act. no. 9775 – Anti-Child Pornography
Act of 2009. 14th Congress, 3rd sess., Manila: Official Gazette. Accessed
June 15, 2020 https://www.officialgazette.gov.ph/2009/11/17/republicact-no-9775-s-2009
Download