Vous êtes sur la page 1sur 22

What are the differences between

talking to your friends or family over


the Internet and talking to them in
person?
Rules of
Netiquette
Protecting
reputations
online
Internet
Copyright
Threats

Contextualized
Online
Security, safety
Rules of online search
Netiquette and research
and ethics
skills
10 best rules of netiquette

The Golden Rule No FLAMING


Don’t type in ALL CAPS Don’t SPAM (it is any
( Treat others as you (Flame is a personal ( people may unsolicited e-mail from
would like to be insult communicated misinterpret) unknown sources)
treated) through the internet

Don’t talk with people Use proper Grammar BE HONEST / Be


Obey Copyright Laws
you do not know ( do and Spelling yourself
not arrange to meet (Don’t steal someone
else’s idea, property (errors diminishes the (tell the truth, do not
anyone you meet credibility of the pretend to be someone
online) and rights)
message else)

Follow the TOS SHOP SECURE SITES


(TOS- Term of Service) (These are sites with
transport layer security
(Rules and policy of (TLS or SLS Socket
the sites Layer Security
Online Safety and Security

What is internet
Safety?
-It refers to the
online security or
safety of peopleand
their information
when using the
internet.
HTTPS- "Hyper-Text Transfer Protocol
Secure"
TYPE OF RISKS
INFORMATION
1. First Name There is a risk in sharing your first name, Chances
are , a hacker may already know plenty of stuff
about you even if you only give out your first
name.
2. Last Name If sharing your first name is a small risk, having
both your first and last is more risky. Matching a
name with a face is a modus to several
cybercrimes' like identity theft.
3. Middle Name Sharing your middle name is probably not the most
risky of these shared information, but sharing your
full name would be.
4. Current and Most people who steal identities study theirsubject.
previous school/s They can use this information for verificationpurposes.
5. Your You cell phone number should never be posted
cellphone over the internet.
number
Internet Threats

1. Malware – Stands What it is goodfor?


for malicious a. Steal personal
software. information
- is a set of b. Delete files
instructions that run c. Click fraud
on you computer and d. Steal software serial
make your system do numbers
something that an e. Use your computer
attacker wants it to do. as relay
Different Kinds of Malware

Keyloggers

Virus Worm Trojan Spyware Adware

Rogue
security
software
Virus

- A computer virus is a piece of malicious


computer code that attaches itself to a
software program, email or computer file
without your permission.
- It can transfers through the internet and
local networks or data storage like flash
drives and CD’s
Rogue security software- tricks the user
into posting that is a security software. It
asks the user to pay to improve his/her
security but in reality that are not protected
at all.

Trojan Worm
A malicious program A malicious program
that is disguised as a Spread to that transfers from one
other
useful program but computer to anotherby
computers
once downloaded or any type of means. It
installed, leaves your uses computer network
PCunprotected and to spreaditself.
allows hackers to get Ex. ILOVEYOU worm
your information. Love Bug Worm created
by Filipino
Spyware

- A program that runs in the background


without you knowing it. It has the ability to
monitor what you are currently doing and typing
through keylogging.
Keyloggers- used to record the keystroke
done by the user. This is done to steal their
password or any other sensitive information. It
can record email, messages or any information
you type using your keyboard.
Adware
A program designed to send
your advertisement, mostly
as pop-ups
SPAM-Refers to the
transmission of unsolicited
messages from various origins
using electric messaging
systems
EXAMPLE
* Pharming – the fraudulent practice of
directing Internet users to a bogus website that
mimics the appearance of a legitimate one, in
order to obtain personal information such as
passwords, account numbers, etc.
Phishing – is a software or a
program used by an attacker to
obtain personal information.
- It targets the
passwords to hack and take
control of a user account..
Think before You Click !
1. Ask yourself? Would you want your parentsor
grandparents to seeit?

Talk to your friends about this seriousresponsibility.

Set your post to “private”

Avoid using names. Names are easy for search engines to


scan

If you feel that a post can affect you or other’s reputation,


ask the one who posted it to pull it down or report it as
inappropriate
How to avoid these threats?

Vous aimerez peut-être aussi