g Empowerment Technologies QUARTER 1 MODULE 3 Online Safety, Security, Ethics, and Etiquette: Internet Threats TECHNICAL VOCATIONAL LIVELIHOOD Empowerment Technologies – Grade 12 Quarter 1 – Module 3: Online Safety, Security, Ethics, and Etiquette: Internet Threats First Edition, 2020 Republic Act 8293, Section 176 states that no copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this module are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education - Schools Division of Pasig City Development Team of the Self-Learning Module Writer: Chirelyn P. Delavega Editor: Name Reviewers: Janeth M. Pineda (Content) and Cerina V. Galoy (Technical) Illustrator: Name Layout Artist: Name Management Team: Ma. Evalou Concepcion A. Agustin OIC-Schools Division Superintendent Aurelio G. Alfonso EdD OIC-Assistant Schools Division Superintendent Victor M. Javeña EdD Chief, School Governance and Operations Division and OIC-Chief, Curriculum Implementation Division Education Program Supervisors Librada L. Agon EdD (EPP/TLE/TVL/TVE) Liza A. Alvarez (Science/STEM/SSP) Bernard R. Balitao (AP/HUMSS) Joselito E. Calios (English/SPFL/GAS) Norlyn D. Conde EdD (MAPEH/SPA/SPS/HOPE/A&D/Sports) Wilma Q. Del Rosario (LRMS/ADM) Ma. Teresita E. Herrera EdD (Filipino/GAS/Piling Larang) Perlita M. Ignacio PhD (EsP) Dulce O. Santos PhD (Kindergarten/MTB-MLE) Teresita P. Tagulao EdD (Mathematics/ABM) Printed in the Philippines by Department of Education – Schools Division of Pasig City Empowerment Technologies QUARTER 1 MODULE 3 Online Safety, Security, Ethics, and Etiquette: Internet Threats Introductory Message For the Facilitator: Welcome to the Empowerment Technologies Self-Learning Module on Online Safety, Security, Ethics, and Etiquette: Internet Threats! This Self-Learning Module was collaboratively designed, developed and reviewed by educators from the Schools Division Office of Pasig City headed by its Officer-in-Charge Schools Division Superintendent, Ma. Evalou Concepcion A. Agustin, in partnership with the City Government of Pasig through its mayor, Honorable Victor Ma. Regis N. Sotto. The writers utilized the standards set by the K to 12 Curriculum using the Most Essential Learning Competencies (MELC) in developing this instructional resource. This learning material hopes to engage the learners in guided and independent learning activities at their own pace and time. Further, this also aims to help learners acquire the needed 21st century skills especially the 5 Cs, namely: Communication, Collaboration, Creativity, Critical Thinking, and Character while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the Teacher This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning. Moreover, you are expected to encourage and assist the learners as they do the tasks included in the module. For the Learner: Welcome to the Empowerment Technologies Self-Learning Module on Online Safety, Security, Ethics, and Etiquette: Internet Threats! This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning material while being an active learner. This module has the following parts and corresponding icons: Expectations - This points to the set of knowledge and skills that you will learn after completing the module. Pretest - This measures your prior knowledge about the lesson at hand. Recap - This part of the module provides a review of concepts and skills that you already know about a previous lesson. Lesson - This section discusses the topic in the module. Activities - This is a set of activities that you need to perform. Wrap-Up - This section summarizes the concepts and application of the lesson. Valuing - This part integrates a desirable moral value in the lesson. Posttest - This measures how much you have learned from the entire module. EXPECTATIONS At the end of the learning period, the students shall have: 1. differentiate the malwares and cybercrimes in the Internet; 2. name the types of malware using the image; 3. illustrate an editorial sketch of your chosen cybercrime that happened during this pandemic; and 4. plan their own set of rules to avoid these Internet threats. PRETEST Directions: Being safe and secured online depends on how we protect ourselves. Analyze the following statement below. On the blank circle, draw thumbs-up if you agree, and thumbs-down if not. RECAP Do you a have good memory? Let’s review the past lesson by filling-in the organizer with 5 examples each category below: Categories Answers ICTs Social Media LESSON Have you encountered the blue screen of death after your accessed or downloaded a free product from a website? If yes, do not worry. You are not the only one who suffer this damage on their ICTs. Some of us, even me, experience this one. Through this lesson, you will learn how to protect yourself and the other users in the digital world. The threats in the Internet is real. After all, it become a public place especially billions of people have an access and knowledge about Internet. One of the threats that you must avoid is the malware. This term came from the blended words “malicious” and “software”. Internet users usually acquired this threat through online. Malware is an umbrella term covering five (5) different types: 1. Virus – It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks, but commonly through data storage such as flash drives or hard drive. 2. Worm – Unlike the virus, this malware replicates itself and can transfer by any type of means, but more often through computer network. Remember the ILOVEYOU worm, known as Love Bug, that infected 45 million machines across the globe, including the Pentagon, within 24 hours last May 4, 2000? (Computer Weekly, 2020.) When the victim opens the attachment, an e-mail entitled LOVE-LETTER-FOR-YOU, the malware automatically send itself to all the victim’s Microsoft Outlook contacts. 3. Trojan – Tracing its name origin, it can be link to the mythology story about how Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like the Odysseus’ strategy, this malicious program disguised as a useful program, however left your devices unprotected and became vulnerable to other malwares once you accessed or downloaded it. 4. Spyware – a malicious program that monitors the device, and the actions of the user without its knowledge. Another example, the keylogger steals sensitive information using the recorded user’s keystrokes. 5. Adware – this program automatically sends pop-ups advertisements. Usually spam or unwanted emails contains bots and advertisements, however cyber criminals can use this to transfer malwares; or worst, do cybercrimes like phishing. Mr. Victor Lorenzo, National Bureau of Investigation (NBI) Cybercrime Division Chief, said that cybercrime incidents rose up to 100% during the Covid-19 pandemic, and phishing ranked one (GMA News Online 2020). Does it sound fishy? Like in fishing, criminal steals sensitive personal information like account passwords and banking details by sending out an alarming e-mail as a bait. Usually, they ask you to click a link, or input your username, password, or any personal info. Phishing is an example of cybercrime, an illegal act done using Internet, and there’s more: 1. Hacking – it is unauthorized accessing of data from a computer network. Mostly, hackers attack commercial and government sites to cause an alarm or to threat someone. 2. Sport Betting – it is an illegal act of gambling on any sports event that happened over the Internet. 3. Non-Delivery of Merchandise – a deceiving act which the culprit posted a product or service on the Internet. Once the victim placed its payment, the culprit does not give the item or service. 4. Electronic Harassment – an anonymous criminal who harass, abuse, threat, or annoy other people. One example of this is cyberbullying or the repeated harassment that usually happens among the youth, and from the past years, becomes the main cause of suicide cases. 5. Child Pornography – Based on Republic Act no 9775 or known as AntiChild Pornography Act of 2009, it is an act of real or simulated explicit sexual activities that involves any child aged 18 and below and it is penalized depending on the offender. If it is the parent or relative of the child, they’ll receive the maximum penalty. 6. Prostitution – it is an illegal act engage in any sexual activities. 7. Criminal Copyright Infringement – it is an unauthorized use or stealing of intellectual property, such as movies and music, for profitable benefit. Sometimes, students violate it through plagiarism. Whether in the reality, or in the digital world, persons with bad intentions are everywhere, and they are just waiting for an opening to do it. As a responsible digital citizen (commonly called netizen (Internet citizen), we must be aware about these Internet threats, how to avoid it, and practice our digital citizenship. ACTIVITIES I. TECH. ASSISTANCE: Can you help her? Name at least five malwares you see in the picture. Write your answers here: 1. __________________ 2. __________________ 3. __________________ 4. __________________ 5. __________________ II. OUTSIDE WORLD: At this stay at home season, ICTs keep us entertained and informed. From the past months up until now, illustrate an editorial cartoon featuring your one chosen cybercrime that happened during this pandemic lockdown. WRAP-UP From the lesson, malwares have six (6) types. Can you list it? Please, write it down in an alphabetical order. 1. _______________ 2. _______________ 3. _______________ 4. _______________ 5. _______________ 6. _______________ These malwares can be an avenue for cybercrimes. Can you enumerate the 7 cybercrimes mentioned from this module? 1. _______________ 2. _______________ 3. _______________ 4. _______________ 5. _______________ 6. _______________ 7. _______________ In wherever world you are, real or digital, threats are just in the corner waiting to harm someone. Always remember, security and safety always start from us. VALUING Sounds cliché, but honesty is the best policy. Share the “bad things” or any unwarranted acts (like piracy) you have done using ICT. Ask yourself why you did that/them. Read your answer in front of the mirror while your alone. Assess yourself and what you feel. ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ ___________________________________________________________________ POSTTEST Directions: Rules like “No Food nor Drinks Allowed” and “Log out your account” are commonly posted on computer laboratory and shop. As a responsible netizen, plan a set of rules (10) that you need to follow when your online or in the digital world. Post it in any place where you can see this often. KEY TO CORRECTION To check your progress, here are the answers for the following activities: References • Yuvienco, Joel. Empowerment Technologies (Student Reader). 1st ed. Pasig City: Department of Education, 2016. • Innovative Training Works, Inc. Empowerment Technologies. 1st ed. Manila: Rex Bookstore (2016). • White, Geoff. “Revealed: The man behind the first major computer virus pandemic.” Computer Weekly, April 21, 2020. https://www.computerweekly.com/news/252481937/Revealed-The-manbehind-the-first-major-computer-virus-pandemic (Accessed June 11, 2020). • Hamilton, Edith. Mythology Timeless Tales of Gods and Heroes. New York: Grand Central Publishing, 1942 • GMA News Online. 2020. “Cybercrime incidents up 100% amid ECQNBI”. Accessed June14, 2020. https://www.gmanetwork.com/news/scitech/technology/735231/cybercri me-incidents-up-100-amid-ecq-nbi/story/ • Philippine Congress. Republic Act. no. 9775 – Anti-Child Pornography Act of 2009. 14th Congress, 3rd sess., Manila: Official Gazette. Accessed June 15, 2020 https://www.officialgazette.gov.ph/2009/11/17/republicact-no-9775-s-2009