0% found this document useful (0 votes)
18 views30 pages

N Etiquette

Uploaded by

Joshua Magcalas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views30 pages

N Etiquette

Uploaded by

Joshua Magcalas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

NETIQUETTE

• Network Etiquette
• Etiquette of cyberspace and
“etiquette” means the forms of
required by good breeding or
prescribed by authority to be required
in social or official life.
• Netiquette is a set of rules for
behaving properly online.
• Netiquette, or network etiquette, is
concerned with the "proper" way to
communicate in an online
environment.
NETIQUETTE
REMEMBER THE GOLDEN RULE
• Even though you may be interacting with a
computer screen, you are communicating with a real
person who will react to your message.
• Make a good impression - treat others with the same
respect that you would like to receive and avoid
confrontational or offensive language.
• To help convey meaning when creating messages, it
is sometimes acceptable to include appropriate
emoticon symbols, such as a smiley face :)
However, for professional communications these
would be inappropriate.
NETIQUETTE
AVOID SLANG, ACRONYM, AND TEXT TALK

• Communicating effectively in college and business


environments requires the use of correct
terminology, spelling, and grammar that can easily
be understood.

• For example, use “your” instead of “ur”.


NETIQUETTE
AVOID “SCREAMING” IN TYPED MESSAGES

• Typing an entire message using all capital letters is


known as “screaming”.

• It is better to draw emphasis to selected words or


phrases by: using italic or bold text; using a different
color for text or background color; or denoting
emphasis using special characters.

• (Example: **Important**).
NETIQUETTE
PROOFREAD YOUR MESSAGES BEFORE
SENDING THEM

• Proofreading your messages before you send them is


a best practice for effective and efficient
communication. Strive to make your
communications concise and free of any:
• Spelling and grammar errors.
• Confusing terms or phrases that could be
misunderstood.
• Errors of omission, such as missing content or
recipients.
• Errors in accuracy of information.
NETIQUETTE
EXERCISE GOOD JUDGEMENT WHEN
SHARING INFORMATION WITH OTHERS
ONLINE

• E-mail and chat messages that you send or


receive are considered private and should
not be forwarded or copied to others
without gaining the consent of all involved
participants.
NETIQUETTE
EXERCISE GOOD JUDGEMENT WHEN
SHARING INFORMATION WITH OTHERS
ONLINE

• To protect your privacy and safety, do not share


online any sensitive personal information such
as:
• Your home address or phone number.
• Personal conversations.
• Social plans, such as vacations.
• Financial information - Usernames,
passwords, or hints.
• Anything personal that you would not
want shared by others over the Internet
NETIQUETTE
EXERCISE GOOD JUDGEMENT WHEN
SHARING INFORMATION WITH OTHERS
ONLINE

• If the material you share with others online


came from another source, make every effort to
gain permission from the original author or
copyright holder. Copying someone else's work
and passing it off as your own is plagiarism. It
damages your reputation and could subject you
to serious academic and legal consequences.
NETIQUETTE
RESPECT DIVERSITY IN VIEWPOINTS

• When presenting an opinion or criticism, it is


helpful to use phrases that identify to whose
point of view you are referring. If the opinion
is yours, you can begin with the phrase “In my
experience” or “In my opinion”. If it is a
viewpoint of someone else, make sure you
identify that in your message

• Example: “According to Eric Ericson,” or “The


president believes”.
NETIQUETTE
Top Commandments of Computer Ethics

• Rule 1: Remember the Human.


• Rule 2: Adhere to the same standards of behavior
online that you follow in real life.
• Rule 3: Know where you are in cyberspace.
• Rule 4: Respect other people's time and bandwidth.
• Rule 5: Make yourself look good online.
• Rule 6: Share expert knowledge.
• Rule 7: Help keep flame wars under control.
• Rule 8: Respect other people's privacy.
• Rule 9: Don't abuse your power.
• Rule 10: Be forgiving of other people's mistakes.
CYBERCRIMES
Common Forms of Cybercrimes

1. Copyright

• The exclusive legal right, given to an


originator or an assignee to print, publish,
perform, film, or record literary, artistic, or
musical material, and to authorize others
to do the same.
• Copyright infringement is the violation,
piracy or theft of a copyright holder's
exclusive rights through the unauthorized
use of a copyrighted material or work.
CYBERCRIMES
Common Forms of Cybercrimes

2. Plagiarism

• An act or instance of using or closely


imitating the language and thoughts of
another author without authorization.
CYBERCRIMES
Common Forms of Cybercrimes

3. Computer Addiction

• Offline: generally used when speaking about


excessive gaming behavior, which can be
practiced both offline and online.
• Online: Also known as “Internet Addiction”,
gets more attention in general from scientific
research than offline computer addiction,
mainly because most cases of computer
addiction are related to the excessive use of the
Internet. *Virtual Self -The persona you create
about yourself virtually.
CYBERCRIMES
Criminal Activities

1. Hacking
• Unauthorized access of or interference with
computer systems, servers, or other
information and communication systems.
• Unauthorized access to corrupt, alters, steal, or
destroy electronic data using computers or
other information and communication systems
without the computer or system owner’s
knowledge and consent.
• The introduction of computer viruses resulting
in the corruption, alteration, theft, or loss of
such data.
CYBERCRIMES
Criminal Activities

1. Hacking
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware
• If the act is committed against critical
infrastructure of the Philippines the,
penalty is between 12-20 years reclusion
temporal.
CYBERCRIMES
Criminal Activities

1. Hacking
• Six years up to twelve years of imprisonment
also known as prison mayor.
CYBERCRIMES
Criminal Activities

2. Computer-related forgery, fraud and/or


identity theft
• An attempt to obtain sensitive information
such as usernames, passwords, and credit
card details and (indirectly money), often
for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison
mayor.
CYBERCRIMES
Criminal Activities

3. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the
right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling
digital music, video, computer software,
etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or
prison mayor.
CYBERCRIMES
Criminal Activities

4. Cyberbullying
• The use of electronic communication to
bully a person, typically by sending a
message of an intimidating or threatening
nature.
• The Anti-Bullying Act of 2013 (RA
10627)
CYBERCRIMES
Criminal Activities

5. Cybersex
• Willful engagement, maintenance, control,
or operation, directly or indirectly of any
lascivious exhibition of sexual organs or
sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it
involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison
mayor.
CYBERCRIMES
Criminal Activities

6. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or
the Anti-Child Pornography Act of 2009,
committed through a computer system.
• Penalty of 12-20 years of imprisonment or
reclusion temporal.
CYBERCRIMES
Criminal Activities

7. Cyber Defamation
• Is an unprivileged false statement of fact
which tends to harm the reputation of a
person or company.
• Penalty of 6-12 years of imprisonment or
prison mayor.
INTERNET THREATS
Malware

• Stands for malicious software.


MALWARE
Types of Malware

• Virus
• A malicious program designed to
replicate itself and transfer from one
computer to another either through
the Internet and local networks or data
storage like flash drives and CDs.
MALWARE
Types of Malware

• Worm
• A malicious program that transfers
from one computer to another by any
type of means. Often, it uses a
computer network to spread itself.
MALWARE
Types of Malware

• Trojan
• A malicious program that is disguised
as a useful program, but once
downloaded or installed, leaves your
PC unprotected and allows hackers to
get your information.
• Rogue Security Software – tricks the
user into posing that it is security
software. It asks the user to pay to
improve his/her security but in reality,
they are not protected at all.
MALWARE
Types of Malware

• Spyware
• A program that runs in the background
without you knowing it (thus called
“spy”). It has the ability to monitor what
you are currently doing and typing
through key logging.

• Keyloggers – used to record the keystroke


done by the users. This is done to steal
their password or any other sensitive
information. It can record email,
messages, any information you type using
your keyboard.
MALWARE
Spam

• Unwanted email mostly from bots or


advertisers. It can be used to send malware.
MALWARE
Phishing

• It goal is to acquire sensitive personal


information like passwords and credit card
details. This is done by sending you an email
that will direct the user to visit a website and
be asked to update his/her username,
password, credit card, or personal information.

• Pharming – a more complicated way of


phishing where it exploits the DNS (Domain
Name Service) system.

You might also like