Vous êtes sur la page 1sur 6

Republic of the Philippines

Department of Education
Region VI – Western Visayas
DIVISION OF ROXAS CITY
DON YNOCENCIO A. DEL ROSARIO NATIONAL HIGH SCHOOL
DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGIES
Teacher: Williamson B. Enoc
Teaching Date and Time: M, T, W and TH/7:30-8:30 AM
Grade Level: 11
Learning Area: Empowerment Technologies
Quarter: 1

I OBJECTIVES

a. Content Standard:
ICT in the context of global communication for specific professional track
b. Performance Standard:
At the end of the 2-week period student will independently compose an insightful
reflection paper on the nature of ICT in the context of their lives, society, and
professional tracks (Arts, Tech-Voc, Sports, Academic).
c. Learning Competencies:
Apply online safety, security, ethics, and etiquette standard and practice in the use of
ICTs as it would relate to their specific professional tracks.

Code: CS_ICT11/12-ICTPT-Ia-b-2

II CONTENT
Online Safety, security, ethics, and etiquette
III LEARNING RESOURCES
a. References: Book (Empowerment Technologies, Innovative Training Works, Inc.)
b. Other Instructional Resources: laptop, internet, projector and PPT.
IV PROCEDURES
Activity:
1. Divide the class into 5 groups.
2. The group must answer the questionnaire about how much information have shared.
Each member will put a check () under Shared or Not Shared.

Type of Information Shared Not Shared


1. Fist Name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Your Cellphone Number
6. The name of your parents
7. The name of your siblings
8. Your Address
9. Your Home Phone Number
10. Your Birthday

3. Each group will post their output on the board. (The output will be used in discussion)
Analysis:
1. What did you feel after sharing?
2. What are common answers you have with other group?
3. Why these are the common answers?
4. What do you think are the reason people share these information in the Facebook
Account?
5. How important are these information over the internet?
6. Do you think these information can be used by the hackers to destroy your reputation
over the internet? How?

Abstraction:

ONLINE SECURITY AND SAFETY


The Internet, truly, is a powerful tool. It can be used to promote your business, gain new friends,
and stay in touch with the old ones. It is also a source of entertainment through games, online
communities, and everything in between. But like most things in the world, there is always the
“other side of the coin.” The Internet is one of the most dangerous places, especially if you do
not know what you are doing with it. But there is no need to worry; it is never that late.
Hopefully, by the end of this lesson, you are able to consider how you go about you use of the
Internet.

Type of Information Risks


1. First Name
There is a risk in sharing your first name. Chances are, a hacker may already know plenty
of stuff about you even if you only give out your first name. Likewise, you cannot just
walk in a room and start introducing yourself to everyone. You do not know whom you
can across with.
2. Last Name
If sharing your first name is a small risk, having both your first name and last is more
risky. You will be vulnerable to being searched for using search engines which include
image search. Matching a name with a face is a modus to several cybercrimes like
identity theft.
3. Middle Name
Sharing your middle name alone is probably not the most risky of these shared
information, but sharing your full name would be.
4. Current and previous school(s)
Most people who steal identities study their subject. They can use this information for
verification purposes.
5. Your cellphone Number
Your cellphone number should never be posted over the internet. The internet is a
public place. It is the same as posting your number on a billboard. You would not want
random strangers to text or call you, or worse, pretend that they are someone else.

6. The name of your mother and father


Risky, yet not as risky as posting their full names, especially your mother’s maiden
name. In fact, you may have already encountered many websites that require your
mother’s maiden name as an answer to a secret question whenever you lose your
password.
7. The name of your siblings
Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.
8. Your address
Hopefully, you answered “no” to this one. Giving the Internet your number is one thing;
giving them your address is a whole other level. It would be much easier for criminals to
find you.
9. Your home phone number
This shared information is more risky than sharing your personal phone number. Scams
usually use this information to deceive you, one of which is when stranger pretends to
know your parents pretends to be you.
10. Your Birthday
Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identity theft.

Internet - information superhighway. Anyone has access to this highway, can place
information, and can grab that information. Any information, even things that you have
set privately, can be accessed one way or another. This is why social networking sites
like Facebook continue to improve their security features. The threat of cybercrime is
very real. While you may not experience threat now, whatever information we share
today could affect our future.

TIPS TO STAY SAFE ONLINE


The Internet is a public place and it is up to you to protect yourself. Here are some tips
to help you stay safe when using the Internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles
the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “Incognito (or private)
mode,” a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting “Rob my
house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update Antivirus software on your computer. Use only one antivirus
software to avoid conflicts.
12. If you have Wi-Fi at home, make it a private network by adding password.
13. Avoid downloading anything from untrusted websites. You are most vulnerable
in peer-to-peer downloads (torrents) as the download is most likely not
monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software

a. Virus- a malicious program designed to replicate itself and


transfer from one computer to another either through the
Internet and local networks or data storage like flash drives and
CDs.
b. Worm- a malicious program that transfers from one computer
to another by any type of means. Often, it uses a computer
network to spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by a Filipino.

c. Trojan- a malicious program that is disguised as a useful


program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.

*Rouge security software- tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in
reality, they are not protected at all.

d. Spyware- a program that runs in the background without you


knowing it (thus called “spy”). It has the ability to monitor what
you are currently doing and typing through keylogging.
*Keyloggers - used to record the keystroke done by the users. This is
done to steal their password or any other sensitive information. It can
record email, messages, or any information you type using your
keyboard.
e. Adware- a program designed to send you advertisements,
mostly as pop-ups

2. Spam- unwanted email mostly from bots or advertisers. It can be used


to send malware.

3. Phishing- Its goal is to acquire sensitive personal information like


passwords and credit card details. This is done by sending you an email
that will direct the user to visit a website and be asked to update his/her
username, password, credit card, or personal information.

*Pharming- a more complicated way of phishing where it exploits the


DNS (Domain Name Service) system.

PROTECTING REPUTATIONS ONLINE


In the past, doing something embarrassing was not much of a big deal. It
happened; people would laugh at it and they would move on. Nowadays,
embarrassing moments are captured using any device you could imagine. What
is more is that people can easily upload it to the Internet, where it can be stored
forever. This could impact not only your reputation but also the people around
you. What is worse is that people tend to ignore this fact, and suffer from it
later from their life.
Once you post something over the Interne, search engines keeps them in their
archives for search results. This makes anything you post to last forever even if
you delete it in you page. Something you and your friends find funny today may
be something that could harm someone’s reputation later.
Before hiring, companies do a background check on the applicant, and the
easiest way to check your background is to visit pages that are related to you.
Thus, if they find disreputable information about you, it may harm your
reputation even if this information has been discarded.

THINK BEFORE YOU CLICK


Here are things you might want to consider before posting something over the
Internet.
1. Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your future
boss to see it? Once you post something on the web, you have no control of
who sees your posts.
2. Your friends depend on you to protect their reputation online. Talk to your
friends about this serious responsibility.
3. Set your post to “private”. In this way, search engines will not be able to scan
that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one who
posted it to pull it down or report it as inappropriate.

COPYRIGHT INFRINGEMENT
If you create something—an idea, an invention, a form of literary work, or a research, you have
the right as to how it should be used by others. This is called INTELLECTUAL PROPERTY. In other
words, the copyright law includes your rights over your work, and anyone who uses it without
your consent is punishable by law. Try grabbing any book then browse its few pages and you will
find a page with a disclaimer with the words: “No part of this book may be copied,
reproduced…” That is a copyright page.

As a responsible user of the Internet, you have to consider that not everything out there is free
for you to use. Just like your own, contents that you see from websites have their respective
copyrights. There are several instances where employees or business owners face copyright
infringement and are sentenced to a huge fine due to reckless copying of materials.

Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings,
drawings, films, music (and lyrics), choreography, and sculptures, but it generally does
NOT protect underlying ideas and facts. This means that you can express something
using your own words, but you should give credit to the source.

2. Be responsible. Even if a material does not say that it is copyrighted, it is not a


valid defense against copyright. Be responsible enough to know if something has
copyright.

3. Be creative. Ask yourself whether what you are making is something that came
from you or something made from somebody else’s creativity. It is important to add
your own creative genius in everything that will be credited to you.

4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for “fair” use which mean that an intellectual property may be used without a
consent as long as it used in commentaries, criticism, search engines, parodies, news
reports, research, library archiving, teaching, and education. If you have doubts that
what you are doing does not fall under the policy of fair use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is
and some copyright holders ignore them but they can opt to use their rights.
Application:
Take the Challenge!
Together with your group from the cybernews reporting, create campaign
materials promoting “Thinks before you click”. It could be in a form of small posters
posted along the hallway or bulletin boards as approved by the school. This campaign is
an awareness program for the younger batches of the school.

Assessment/Evaluation:
Matching Type: Match Column A with Column B. Write the letter of the correct answer on the
space before each number.
A B
____1. Virus A. – designed to send you advertisements
____2. Rogue B. – sends an official-looking email and is designed to steal sensitive
personal information
____3. Keylogger C. – a provision that allows you to use copyrighted work without consent with
certain limitations
____4. Adware D. – a browser feature that is synonymous to “private” browsing
____5. Spam E. – replicates and can transfer from one computer to another
____6. Phishing F. – exploits the DNS System
____7. Fair use G. – states that anyone who uses your work without your consents is punishable
by law
____8. Spyware H. – runs in the background and monitors what you are doing
____9. Private I. – unwanted email mostly from bots
____10. Malware J. – disguised as a useful program but is not
____11. Incognito K. – the information superhighway
____12. Internet L. – tricks the user into posing that it is security software
____13. Trojan M. – a malicious software
____14. Copyright N. – an option to hide a post so that search engines could not scan it
____15. Pharming O. – used to record the keystrokes done by the user

Agreement:
All group will have their campaign in lower years (Junior High School) after their class or during vacant
period. They have collect the signature of the students’ right after the campaign to be checked next
meeting. Each will have to take photos also during the campaign as a proof that they have conducted a
campaign.

V REMARKS

VI REFLECTION

Prepared by: Noted by:

WILLIAMSON B. ENOC, T-II TESSIE D. ORTEGA


Don Ynocencio A. Del Rosario NHS Principal I
Division of Roxas City Don Ynocencio A. Del Rosario NHS
Division of Roxas City

Vous aimerez peut-être aussi