Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
Security and
Netiquette
Lesson 2
INTERNET Click icon to add picture
2
The internet is the guiding technology of
the Information Technology Age just as the
electrical engine was of the Industrial Age. In
these times, more and more people are already
engaged in the use of technology. These
people who are raised in a digital, media-
saturated world are called digital natives. No
doubt, the Internet has been very useful to us Click icon to add picture
but with the rise of instant messaging, chat
rooms, emails and social networking sites, it
can also bring trouble - from cyberbullying to
more serious Internet dangers, including
exposure to sexual predators. Thus, internet
safety is always our primary concern.
3
“ Online safety refers to the practices and precautions
that should be observed when using the internet to
ensure that the users as well as their computers and
personal information are safe from crimes associated
with using the internet. Here are the personal
information that must be kept confidential. There are
numerous delinquencies that can be committed on the
internet such as stalking, identity theft, privacy
violations, and harassment.
Never give any personal information out about yourself over the
internet.
Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service.
To make sure that you are in a secured network, the website address should begin with “https://’ as opposed to “http://”.
Never access your accounts by following an email link, instead type your URL by yourself.
”
respond to the thread with their own flame message.
It is deemed any malicious happens when an email is happens when a hacker (or generally refers to someone
act that attempts to gain sent from an internet “pharmer”) directs an using internet services or
access to a computer criminal disguised as an internet user to a fake software to defraud or take
network without email from a legitimate, website instead of a advantage of victims,
authorization or permission trustworthy source. legitimate one. typically for financial gain.
from the owners
also known as spiders, are unsolicited emails, refers to the use of the refers to the act of
crawlers, and web bots. It is instant messages coming internet or other electronic
a software application that from recipients that are not tormenting, harassing, or
device to harass or stalk
is programmed to do certain granted verifiable individuals or organizations. embarrassing another
tasks. permission for the message person using the internet.
to be sent.
Internet robots Spams Cyberstalking Cyberbullying
Adware (advertising supported software) is unwanted software designed
to throw advertisements up on your screen. Example, pop-up ads and
banner ads.
malware or Virus and Worms are malwares that attach to another program and, when
executed—unintentionally by the user—replicates itself by modifying other
malicious computer programs and infecting them with its own bits of code.
software Trojan, or Trojan Horse, is one of the most dangerous malware types.
It usually represents itself as something useful in order to trick you.
Ransom Ware is a form of malware that locks you out of your device
and/or encrypts your files, then forces you to pay a ransom to get
them back.
Spoofing
happens when someone or
something pretends to be something Click icon to add picture
else to gain our confidence, get
access to our systems, steal data,
steal money, or spread malware.