ETech Q1 Module-2
ETech Q1 Module-2
Empowerment
Technologies
Quarter 1 – Module 2:
Online Safety, Security, Ethics, and
Etiquette
Empowerment Technologies – Grade 11/12
Self-Learning Module (SLM)
Quarter 1 – Module 2: Online Safety, Security, Ethics, and Etiquette First
Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
11/12
Empowerment
Technologies
Quarter 1 – Module 2: Online
Safety, Security, Ethics, and Etiquette
Introductory Message
For the facilitator:
This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social,
and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the
module:
As a facilitator you are expected to orient the learners on how to use this module. You also
need to keep track of the learners' progress while allowing them to manage their own
learning. Furthermore, you are expected to encourage and assist the learners as they do the
tasks included in the module.
For the learner:
The hand is one of the most symbolized part of the human body. It is often used to depict
skill, action and purpose. Through our hands we may learn, create and accomplish. Hence,
the hand in this learning resource signifies that you as a learner is capable and empowered to
successfully achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner. This module has the
following parts and corresponding icons:
What I Need to Know This will give you an idea of the skills or
competencies you are expected to
learn in the module.
2
What I Know This part includes an activity that aims to check
what you already know about the
lesson to take. If you get all the answers correct (100%),
you may decide to skip this module.
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
3
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can do it!
This module was designed and written with you in mind. It is here to help you master the
Online Safety, Security, Ethics and Etiquette. The scope of this module permits it to be used
in many different learning situations. The language used recognizes the diverse vocabulary
level of students. The lessons are arranged to follow the standard sequence of the course. But
the order in which you read them can be changed to correspond with the textbook you are
now using.
4
What I Know
Choose the letter of the best answer. Write the chosen letter on a separate sheet of paper.
1. What type of file does key logger software typically use to store its recording? a. Data
Files
b. Virus Files
c. Text Files
d. Log Files
2. Raffy is using a technique that tries to take information from the user. He commonly
takes things like credit cards, usernames, passwords, and home address. What type of
threat is depicted in the scenario?
a. Fishing
b. Scam
c. Spam
d. Phishing
Lesson
Online Safety, Security, Ethics and
2 Etiquette
5
What’s In
From the previous lesson, we've learned that there are three versions of Web Technologies:
Web 1.0, Web 2.0, and Web 3.0. Further, we said that as the world of ICT continues to
evolve, the industry has developed several innovations that cater to the needs of the people
whether it is for business or personal use. These trends in ICT in today's generation focuses
on technological convergence, social media, mobile technologies, and assistive media.
The internet has radically changed the way people interact with the world. They have
accounts on different online platforms; some have unlimited Internet access, and some are
active users of the web. Yet along this opportunity are the new risks or threats that the
Internet may bring. Hence, online safety or Internet safety is an emergent concern for
children.
6
What’s New
Most of us use the Internet every day. Sometimes, we do not pay attention to how much
information we share online. Identify which of the following information you have shared
online and list down your answers on the separate sheet of paper.
1. 6. First Name
2. 7. Last Name
3. 8. Birthday
4. 9.
5. 10.
How many information you have shared? You probably shared the first two items. If that is
the case, try using a search engine like Google then type your first and last name. Did you
get links to your profile page? Try switching to image search. Did your pictures appear? If
you have a unique name, chances are, it did. Do not feel bad if it did not appear though; in
fact, it is probably for your best interest not to have pictures of yourself in a search engine.
So how did these things happen? How can search engines locate me? Is there any danger of
being found by search engines?
What is It
Let us go back to the previous activity. Let us visit each item and see how risky it is to share
them.
The Internet is defined as the information superhighway. This means that anyone has access
to this highway, can place information, and can grab that information. This is why social
networking sites like Facebook continue to improve their security features. The threat of
cybercrime is very real. Whatever information we share today could affect our future.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
8
3. Know the security features of the social networking site you use. By keeping your
profile private, search engines will not be able to scan your profile.
4. Do not share your password with anyone.
5. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode
will NOT protect you from hackers.
6. Do not talk to strangers whether online or face-to-face/
7. Never post anything about a future vacation. It is similar to posting, “Rob my house
at this date.”
8. Add friends you know in real life.
9. Avoid visiting untrusted websites.
10. Install and update an antivirus software on your computer. Use only one anti- virus
software to avoid conflicts.
11. If you have Wi-Fi at home, make it private network by adding a password.
12. Avoid downloading anything from untrusted websites.
13. But the software, do not use pirated ones.
14. Do not reply or click links from suspicious emails.
15. Make Online Purchases from Secure Sites
Most people would dispute that there is no such thing as private over the Internet and they
may be right. Some hackers can find a backdoor even if your profile is already set to private.
You have no control whoever is looking at your friend's screen whenever they open your
profile or chat with you.
Internet Threats
Here are some of the threats you should be aware of when using the Internet:
a. Virus - a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
2. Spam - an unwanted email mostly from bots or advertisers. It can be used to send
malware.
3. Phishing - its goal is to acquire sensitive personal information like passwords and
credit card details. This is done by sending you an e-mail that will direct the user to
visit a fake website and be asked to update his/her username, password, credit card
or personal information.
Protecting Reputations Online
Here are the things you might want to consider before posting something over the internet:
1. Before your post something on the web, ask these questions to yourself: Would you
want your parents or grandparents to see it? Would you want your future boss to see
it?
2. If you feel that a post can affect you or other’s reputation, ask the one who posted it to
pull it down or report it as inappropriate.
Copyright Infringement
It is the use of works protected by copyright law without permission for a usage where such
permission4 is required.
Here are some tips that could help you avoid copyright infringement:
10
What’s More
CASE STUDY: WHAT THE? —Online scams and identity Theft Transcript
One day I downloaded this particular program, and after that my computer
seemed to be a lot slower. It was taking forever for pages to load and even normal things
like writing an email or writing a Word document would take a long time. I didn’t think
too much of it ‘cos my computer was getting pretty old and I had heaps of stuff on it. But
then my home page got changed to some free download site and when I checked my
internet settings I found that they’d all been changed. But things kept on getting worse.
Whenever I went online to the internet I got bombarded with pop-ups and, like, my
computer would just crash and I would have to manually reset it.
Then things got really serious. I couldn’t log-in to my email account and I
discovered that someone was using my internet banking. I had anti-virus software
installed onto my computer but it just wasn’t picking up anything.
What I didn’t realize at the time was that when I’d downloaded this free program a
couple of months ago, a smaller program downloaded and installed itself onto my
computer. But, I had no idea.
This spyware program monitored all my internet activity and the keylogger
recorded all the keystrokes I made on the computer such as my log-in, my passwords and
all the emails I sent to my mates. It then sent all this information to the software
developer. I ended up taking my machine to a computer specialist who was able to find
and remove all the spyware. I had to contact my bank and my ISP to change my
account details.
You know, even free stuff comes at a cost nowadays and I know it sounds corny, but if it’s
too good to be true then it probably is. Before I download anything now I make sure there’s no
adware or spyware associated with it and I read the user agreement statement. There are websites
online that, sort of, help you out with this and can offer great reviews and advice on the program
11
and company that you’re downloading from. If it’s free, there’s usually a catch. I guess I learnt the
hard way.” - Brian
Brian complains that his virus protection doesn’t work. What do you think has gone wrong?
Because he downloaded a particular program and he discovered that someone was using his
internet banking
Activity 2
Choose at least three of the mentioned online safety tips and explain.
12
What I Can Do
Share an experience that you have always tend to do but later did you discover that it is not a
standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
I experienced phishing. I was scrolling through internet and saw a link about
What happened to my favorite actor . To my curiosity, I clicked the link and
found out that it was fake, so before seeing the full story and realizing that my
files or information might be at risk in that link pressed back.
Assessment
Identification: Identify the Internet threat described in each number.
1. Jonathan is having a problem because his files were corrupted. He discovered that
most of his folders were replicated. Trojan
2. Ken was asked to pay a certain amount of money for him to retrieve his files. Ken
might be a victim of . Phishing
3. Mari found a good application and she installed it on her computer. But after the
installation some of her files were deleted. Trojan
4. Jack is receiving several irrelevant messages every day and his e-mail account has
become almost unusable. Spam
5. The network servers of KNCHS stopped to respond and it was found out that much
of the systems' memory was consumed by the malicious software. What kind of
malware is this? Virus
6. Jewel is using a technique that tries to take information from the user. She
commonly takes things like credit cards, usernames, passwords, and home
13
addresses using a fake website. What type of threat is depicted in the scenario?
Phishing
7. This program can record all you enter on your keyboard. Spyware
9. A kind of internet threat where the attacker uses a fake website to get your
sensitive information. Ransomware
10. A program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing. Spyware
Additional Activities
Solve the crossword below. Write you’re answer on the separate sheet of paper.
1. Copyright infringement
2. Spyware
3. Trojan
4. Virus
5. Spam
6. Phishing
7. Worm
8. Malware
9. Ransomware
10. Adware
14
15
References
16
DISCLAIMER
This Self-learning Module (SLM) was developed by DepEd
SOCCSKSARGEN with the primary objective of preparing for and
addressing the new normal. Contents of this module were based on
DepEd’s Most Essential Learning Competencies (MELC). This is a
supplementary material to be used by all learners of Region XII in all
public schools beginning SY 2020- 2021. The process of LR
development was observed in the production of this module. This is
version 1.0. We highly encourage feedback, comments, and
recommendations.