Em Tech Lesson 3
Em Tech Lesson 3
EMPOWERMENT TECHNOLOGIES
Lesson 2: Online Safety, Security, Ethics, and Etiquette
Note Taker
How many hours do you spend on the internet per day? _________________
Did you know? According to a January 2021 digital report by We Are Social and Hootsuite, the Philippines ranked first
in terms of daily time spent using the internet and social media worldwide.
A. INFORMATION AT RISK
C. INTERNET THREATS
Social engineering is the art of manipulating people so they give up confidential information.
In other words, they trick users into making security mistakes so they can give away sensitive
information.
a. Virus – a malicious program designed to replicate itself and transfer from one computer to another (internet, local
networks, FDs, CDs, etc.)
b. Worm – a malicious program that transfers from one computer to another by any types of means.
c. Trojan – a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has the ability to
monitor what you are currently doing and typing through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-ups.
f. Ransomware – a malicious software from crypto virology that threatens to publish the victim’s data or perpetually
block access to it unless a ransom is paid
2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing – an unwanted acquisition of sensitive personal information like passwords and credit card details.
D. COMPUTER ETHICS
1. Do not use a computer to harm other people.
2. Do not interfere with other people’s computer work.
3. Do not snoop around in other people’s computer files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false witness.
6. Do not copy or use people’s proprietary software for which you have not paid.
7. Do not use other people’s computer resources without authorization or proper compensation.
8. Appropriate other people’s intellectual output.
9. Think about the social consequences of the program you are writing or the system you are designing.
10. Always use a computer in ways to ensure consideration and respect for other humans.
E. NETIQUETTE
In this generation, people are dependent on the Internet. Like how people socialize face to
face, we should follow etiquette at all times as it mirrors our personality. Being on different
platforms, we should be aware of our actions and protect ourselves at the same time.
Remember that once something has been shared online, it cannot be deleted.
Rule 2: Adhere to the same standards of behavior online that you follow in real Life
While it can be argued that standards of behavior may be different in the virtual world, they certainly should
not be lower. You should do your best to act within the laws and ethical manners of society whenever you
inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither
should you behave this way in the virtual world.
Task 6.
Share an experience that you have always tend to do but later did you discover that it is not a standard of ONLINE SAFETY, SECURITY,
ETHICS, AND ETIQUETTE.
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
_________________________________________________________________________________________________________
References:
Shea, V. (1994). Core Rules of Netiquette. Retrieved from http:/coursedesign.colostate.edu/obj/corerulesnet.html
Empowerment Technologies Module 1
https://www.youtube.com/watch?v=gy3oESlg0pU
Reflection of Learning:
1. Naglisod ko sa _____________________________________________________________________
Prepared by: