Vous êtes sur la page 1sur 5

Republic of the Philippines

Department of Education
Region VI Western Visayas
DIVISION OF ROXAS CITY
DON YNOCENCIO A. DEL ROSARIO NATIONAL HIGH SCHOOL
DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGIES
Teacher: Williamson B. Enoc
Teaching Date and Time: M, T, W and TH/7:30-8:30 AM
Grade Level: 11
Learning Area: Empowerment Technologies
Quarter: 1

I OBJECTIVES

a. Content Standard:
ICT in the context of global communication for specific professional track
b. Performance Standard:
At the end of the 2-week period student will independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech-Voc, Sports, Academic).
c. Learning Competencies:
Apply online safety, security, ethics, and etiquette standard and practice in the use of ICTs as it
would relate to their specific professional tracks.

Code: CS_ICT11/12-ICTPT-Ia-b-2

II CONTENT
Online Safety, security, ethics, and etiquette
III LEARNING RESOURCES
a. References: Book (Empowerment Technologies, Innovative Training Works, Inc.)
b. Other Instructional Resources: laptop, internet, projector and PPT.
IV PROCEDURES

Activity:
1. Divide the class into 5 groups.
2. The group must answer the questionnaire about how much information have shared. Each
member will put a check () under Shared or Not Shared.
Type of Information Shared Not Shared
1. Fist Name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Your Cellphone Number
6. The name of your parents
7. The name of your siblings
8. Your Address
9. Your Home Phone Number
10. Your Birthday

3. Each group will post their output on the board. (The output will be used in discussion)

Analysis:
1. What did you feel after sharing?
2. What are common answers you have with other group?
3. Why these are the common answers?
4. What do you think are the reason people share these information in the Facebook
Account?
5. How important are these information over the internet?
6. Do you think these information can be used by the hackers to destroy your reputation
over the internet? How?
Abstraction:

ONLINE SECURITY AND SAFETY


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new
friends, and stay in touch with the old ones. It is also a source of entertainment through games,
online communities, and everything in between. But like most things in the world, there is always
the other side of the coin. The Internet is one of the most dangerous places, especially if you do
not know what you are doing with it. But there is no need to worry; it is never that late. Hopefully,
by the end of this lesson, you are able to consider how you go about you use of the Internet.

Type of Information Risks


There is a risk in sharing your first name. Chances are, a hacker
may already know plenty of stuff about you even if you only give
1. First Name out your first name. Likewise, you cannot just walk in a room
and start introducing yourself to everyone. You do not know
whom you can across with.
If sharing your first name is a small risk, having both your first
name and last is more risky. You will be vulnerable to being
2. Last Name searched for using search engines which include image search.
Matching a name with a face is a modus to several cybercrimes
like identity theft.
Sharing your middle name alone is probably not the most risky
3. Middle Name of these shared information, but sharing your full name would
be.
4. Current and Most people who steal identities study their subject. They can
previous school(s) use this information for verification purposes.
Your cellphone number should never be posted over the
internet. The internet is a public place. It is the same as posting
5. Your cellphone your number on a billboard. You would not want random
Number strangers to text or call you, or worse, pretend that they are
someone else.

Risky, yet not as risky as posting their full names, especially your
mothers maiden name. In fact, you may have already
6. The name of your
encountered many websites that require your mothers maiden
mother and father
name as an answer to a secret question whenever you lose your
password.
7. The name of your Disclosing this is a huge risk. Strangers may pretend or use their
siblings identity to dupe you.
Hopefully, you answered no to this one. Giving the Internet
8. Your address your number is one thing; giving them your address is a whole
other level. It would be much easier for criminals to find you.
This shared information is more risky than sharing your
9. Your home phone personal phone number. Scams usually use this information to
number deceive you, one of which is when stranger pretends to know
your parents pretends to be you.
Letting people know your birthday is probably a must if you
10. Your Birthday want to get as many gifts as possible. But having it in your
profile makes you vulnerable to identity theft.

Internet - information superhighway. Anyone has access to this highway, can place
information, and can grab that information. Any information, even things that you have set
privately, can be accessed one way or another. This is why social networking sites like Facebook
continue to improve their security features. The threat of cybercrime is very real. While you may
not experience threat now, whatever information we share today could affect our future.

TIPS TO STAY SAFE ONLINE


The Internet is a public place and it is up to you to protect yourself. Here are some tips
to help you stay safe when using the Internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in Incognito (or private) mode, a
feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting Rob my house at
this date.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update Antivirus software on your computer. Use only one antivirus
software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by adding password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-
to-peer downloads (torrents) as the download is most likely not monitored by the site
owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software

a. Virus- a malicious program designed to replicate itself and transfer from one
computer to another either through the Internet and local networks or data storage
like flash drives and CDs.

b. Worm- a malicious program that transfers from one computer to another by any type
of means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.

c. Trojan- a malicious program that is disguised as a useful program but once


downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.

*Rouge security software- tricks the user into posing that it is a security software. It
asks the user to pay to improve his/her security but in reality, they are not protected
at all.

d. Spyware- a program that runs in the background without you knowing it (thus called
spy). It has the ability to monitor what you are currently doing and typing through
keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record email, messages, or
any information you type using your keyboard.
e. Adware- a program designed to send you advertisements, mostly as pop-ups

2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.

3. Phishing- Its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, password, credit card, or personal
information.

*Pharming- a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.

PROTECTING REPUTATIONS ONLINE


In the past, doing something embarrassing was not much of a big deal. It happened;
people would laugh at it and they would move on. Nowadays, embarrassing moments are
captured using any device you could imagine. What is more is that people can easily upload it
to the Internet, where it can be stored forever. This could impact not only your reputation but
also the people around you. What is worse is that people tend to ignore this fact, and suffer
from it later from their life.
Once you post something over the Interne, search engines keeps them in their archives
for search results. This makes anything you post to last forever even if you delete it in you page.
Something you and your friends find funny today may be something that could harm someones
reputation later.
Before hiring, companies do a background check on the applicant, and the easiest way
to check your background is to visit pages that are related to you. Thus, if they find disreputable
information about you, it may harm your reputation even if this information has been
discarded.

THINK BEFORE YOU CLICK


Here are things you might want to consider before posting something over the Internet.
1. Before you post something on the web, ask these questions to yourself: Would you want
your parents or grandparents to see it? Would you want your future boss to see it? Once
you post something on the web, you have no control of who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your friends about
this serious responsibility.
3. Set your post to private. In this way, search engines will not be able to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or others reputation, ask the one who posted it to pull
it down or report it as inappropriate.

COPYRIGHT INFRINGEMENT
If you create somethingan idea, an invention, a form of literary work, or a research,
you have the right as to how it should be used by others. This is called INTELLECTUAL PROPERTY.
In other words, the copyright law includes your rights over your work, and anyone who uses it
without your consent is punishable by law. Try grabbing any book then browse its few pages
and you will find a page with a disclaimer with the words: No part of this book may be copied,
reproduced That is a copyright page.
As a responsible user of the Internet, you have to consider that not everything out there
is free for you to use. Just like your own, contents that you see from websites have their
respective copyrights. There are several instances where employees or business owners face
copyright infringement and are sentenced to a huge fine due to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures, but it generally does NOT protect
underlying ideas and facts. This means that you can express something using your own
words, but you should give credit to the source.

2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright. Be responsible enough to know if something has copyright.

3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebody elses creativity. It is important to add your
own creative genius in everything that will be credited to you.

4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for fair use which mean that an intellectual property may be used without
a consent as long as it used in commentaries, criticism, search engines, parodies, news
reports, research, library archiving, teaching, and education. If you have doubts that
what you are doing does not fall under the policy of fair use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is
and some copyright holders ignore them but they can opt to use their rights.

Application:
Take the Challenge!
Together with your group from the cybernews reporting, create campaign materials
promoting Thinks before you click. It could be in a form of small posters posted along
the hallway or bulletin boards as approved by the school. This campaign is an awareness
program for the younger batches of the school.
Assessment/Evaluation:
Matching Type: Match Column A with Column B. Write the letter of the correct
answer on the space before each number.
A B
____1. Virus A. designed to send you advertisements
____2. Rogue B. sends an official-looking email and is designed to steal sensitive
personal information
____3. Keylogger C. a provision that allows you to use copyrighted work without
consent with certain limitations
____4. Adware D. a browser feature that is synonymous to private browsing
____5. Spam E. replicates and can transfer from one computer to another
____6. Phishing F. exploits the DNS System
____7. Fair use G. states that anyone who uses your work without your consents is
punishable by law
____8. Spyware H. runs in the background and monitors what you are doing
____9. Private I. unwanted email mostly from bots
____10. Malware J. disguised as a useful program but is not
____11. Incognito K. the information superhighway
____12. Internet L. tricks the user into posing that it is security software
____13. Trojan M. a malicious software
____14. Copyright N. an option to hide a post so that search engines could not scan it
____15. Pharming O. used to record the keystrokes done by the user

Agreement:
All group will have their campaign in lower years (Junior High School) after their class or during
vacant period. They have collect the signature of the students right after the campaign to be
checked next meeting. Each will have to take photos also during the campaign as a proof that they
have conducted a campaign.

V REMARKS

VI REFLECTION

Prepared by:

WILLIAMSON B. ENOC, T-II


Don Ynocencio A. Del Rosario NHS
Division of Roxas City

Noted by:

TESSIE D. ORTEGA
Principal I
Don Ynocencio A. Del Rosario NHS
Division of Roxas City

Vous aimerez peut-être aussi