0% found this document useful (0 votes)
83 views45 pages

Internet Threats and Netiquette Lesson 2

The document discusses internet threats, rules of netiquette, and protecting one's online reputation. It provides tips on internet safety such as being careful what information is shared online, using strong passwords, and installing antivirus software. Common internet threats like malware, spam and phishing are explained. The importance of thinking before posting online is emphasized as anything shared could impact one's reputation permanently.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views45 pages

Internet Threats and Netiquette Lesson 2

The document discusses internet threats, rules of netiquette, and protecting one's online reputation. It provides tips on internet safety such as being careful what information is shared online, using strong passwords, and installing antivirus software. Common internet threats like malware, spam and phishing are explained. The importance of thinking before posting online is emphasized as anything shared could impact one's reputation permanently.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Internet Threats and

Netiquette
Rules of Netiquette
LESSON 2

✓ Online security, safety, and ethics


✓ Internet threats
✓ Protecting reputation online
✓ Copyright
How safe are you?
Type of Information Shared Not shared
1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
6.The name of your mother and
father
7.The name of your siblings
8.Your address
9.Your home phone number
10. Your birthday
 How many hours do you spend on the internet per
day?

 Can you live without the Internet for a week?

 How many aspects of your life depend on the


Internet?

 How many times have you complained about your


Internet connection Speed?
Online safety and Security
1. First name

 There is a risk in sharing your first name. Chances are, a


hacker may already know plenty of stuff about you
even if you only give out your first name. Likewise, you
cannot just walk in a room and start introducing yourself
to everyone. You do not know whom you can come
across with.
2. Last name

 If sharing your first name is a small risk, having both your


first and last is more risky. You will be vulnerable to being
searched for using searched for using search engines,
which include image search. Matching a name with a
face in a modus to several cybercrimes like identity theft.
3. Middle name

 Sharing your middle name alone is probably not the most


risky of these shared information, but sharing your full
name would be.
4. Current and previous school(s)

 Most people who steal identities study their subject. They


can use this information for verification purposes.
5. Your cellphone number

 Your cellphone number should never be posted over the


internet. The internet is a public place. It is the same as
posting your number on a billboard. You would not want
random strangers to text you or call you, or worse,
pretend that they are someone else.
6. The name of your mother and
father
 Risky, yet not as risky as posting their full names, especially
your mother’s maiden name. In fact, you may have
already encountered many websites that require your
mother’s maiden name as an answer to a secret question
whenever you lose your password.
7. The name of your siblings

 Disclosing this is a huge risk. Strangers may pretend or


use their identity to dupe you.
8. Your address

 Giving the Internet your number is one thing; giving


them your address is a whole other level. It would be
much easier for criminals to find you.
9. Your home phone number

 This shared information is more risky than sharing your


personal phone number. Scams usually use this
information to deceive you one of which is when a
stranger pretends to know your parents or pretends to
be you.
10. Your birthday

 Letting people know your birthday is probably a must if


you want to get as many gifts. But having it in your profile
makes you vulnerable to identity theft.
The Internet is defined as the information superhighway.

This means that anyone has access to highway, can


place information, and can grab that information. Any
information, even things that you have set privately,
can be accessed one way or another.
Tips to stay safe online
1. Be mindful of what you share online and what site
you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to
learn how the website handles the information you
share.
4. Know the security features of the social networking
site you use. By keeping your profile private, search
engines will not be able to scan your profile.
5. Do not share your password to anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito” (or private) mode,” a feature of the
browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar
to posting, “Rob my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer. Use only one anti-virus software to avoid
conflicts.
12. If you have a Wi-Fi at home, make it a private
network by adding a password.
13. Avoid downloading anything from untrusted
websites. You are most vulnerable in peer-to-peer
downloads (torrents) as the download is most likely
not monitored by the owner.
14. Buy the software do not use pirated ones.
15. Do not reply or click links from suspicious emails.
WHAT IS NETIQUETTE?

set of rules for behaving properly


online
( The Core Rules of Netiquette by Virginia Shea )

Netiquette respecting other users’ views and


displaying common courtesy when
posting your views to online
discussion groups
(http://www.bbc.co.uk/webwise/guides/about-netiquette)
THE CORE RULES OF NETIQUETTE

THE CORE RULES OF NETIQUETTE. SHEA, V. (1994).


CORE RULES OF NETIQUETTE. NETIQUETTE (ONLINE
ED., PP. 32-45). SAN FRANCISCO: ALBION BOOKS.

http://www.albion.com/netiquette/introduction.html
http://learning.colostate.edu/guides/guide.cfm?guideid=4
RULE 1: REMEMBER THE HUMAN
RULE 2: ADHERE TO THE SAME STANDARDS OF
BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
RULE 3: KNOW WHERE YOU ARE
IN CYBERSPACE
RULE 4: RESPECT OTHER PEOPLE'S
TIME AND BANDWIDTH
RULE 5: MAKE YOURSELF LOOK
GOOD ONLINE
RULE 6: SHARE EXPERT KNOWLEDGE
RULE 7: HELP KEEP FLAME WARS
UNDER CONTROL
RULE 8: RESPECT OTHER
PEOPLE'S PRIVACY
RULE 9: DON'T ABUSE YOUR
POWER
RULE 10: BE FORGIVING OF OTHER
PEOPLE'S MISTAKES
Internet Threats
1. Malware – stands for malicious
software
A. Virus – a malicious program designed to replicate itself
and transfer from one computer to another either
through the Internet and local networks or data
storage like flash drives and CDs.

B. Worm – a malicious program that transfers from one


computer to another by any type of means. Often, it
uses a computer network to spread itself.
C. Trojan – a malicious program that is disguised as a
useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get
your information.

*Rogue security software – tricks the user into posing


that it is a security software. It asks the user to pay to
improve his/her security but in reality, they are not
protected at all.
D. Spyware – a program that runs in the background
without you knowing it (thus called “spy”). It has the
ability to monitor what you are currently doing and
typing through key logging.
*Keyloggers – used to record the keystroke done by
users. This is done to steal their password or any other
sensitive information. It can record email, messages, or
any information you type using your keyboard.

E. Adware – a program designed to send you


advertisements, mostly as pop-ups
2. Spam
 Unwanted email mostly from bots or advertisers. It
can be used to send malware.

3. Phishing
Its goal is to acquire sensitive personal information like
passwords and credit card details. This is done by
sending you an email that will direct the user to visit a
website and be asked to update his/her username,
password, credit card, or personal information.
*Pharming – a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
system.
Protecting Reputations Online
In the past, doing something embarrassing was not much of a big
deal. It happened; people would Laugh at it, and they would move on.
Nowadays, embarrassing moments are captured using any device you
could imagine. What is worse is that people can easily upload it to the
internet, where it can be stored forever. This could impact not only your
reputation but also the people around you. What is worse is that people
tend to ignore this fact, and suffer from it later in their life.
Once you post something over the Internet, search engines keep
them in their archives for search results. This makes anything you post to
last forever even if you delete it in your page Something you and your
friends find funny today may be something that could harm someone’s
reputation later.
Before hiring, companies do a background check on the applicant,
and the easiest way to check your background is to visit pages that are
related to you. Thus, if they find disreputable information about you, it
may harm your reputation even if this information has been discarded.
Think Before You Click

Here are things you might want to consider before posting


something over the Internet:

1. Before you post something on the web, ask these questions


to yourself: Would you want your parents or grandparents
to see it? Would you want your future boss to see it? Once
you post something on the web, you have no control of
who sees your posts.
2. Your friends depend on you to protect their
reputation online. Talk to your friends about this
serious responsibility.
3. Set your post to “private.” In this way search
engines will not be able to scan that post.
4. Avoid using names. Names are easy for search
engines to scan.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull it
down or report it as inappropriate.
Copyright Infringement
 Intellectual property
 Inother words, the copyright law includes
your rights over your work, and anyone
who uses it without your consent is
punishable by law.
Here are some tips that could help you avoid copyright
infringement :

1. Understand. Copyright protects literacy works,


photographs, paintings, drawings, films, music (and lyrics),
choreography, and sculptures, but it generally does NOT
protect underlying ideas and facts. This means that you
can express something using your own words, but you
should give credit to the source.
2. Be responsible. Even if a material does not say that it
is copyrighted, it is not a valid defense against
copyright. Be responsible enough to know if
something has a copyright.

3. Be creative. Ask yourself whether what you are


making is something that came from you or
something made from someday else’s creativity. It is
important to add your own creative genius in
everything that will be credited to you.
4. Know the law. There are some limitations to
copyright laws. For instance in the Philippines,
copyrights only last a lifetime (of the author) plus 50
years. There are also provisions for “fair use” which
mean that an intellectual property may be used
without a consent as long as it is used in
commentaries, criticisms, search engines, parodies,
news reports, research, library archiving, teaching,
and education. If you have doubts that what you
are doing does not fall under the policy of fair use,
seek permission first.

You might also like