N Etiquette
N Etiquette
• Network Etiquette
• Etiquette of cyberspace and
“etiquette” means the forms of
required by good breeding or
prescribed by authority to be required
in social or official life.
• Netiquette is a set of rules for
behaving properly online.
• Netiquette, or network etiquette, is
concerned with the "proper" way to
communicate in an online
environment.
NETIQUETTE
REMEMBER THE GOLDEN RULE
• Even though you may be interacting with a
computer screen, you are communicating with a real
person who will react to your message.
• Make a good impression - treat others with the same
respect that you would like to receive and avoid
confrontational or offensive language.
• To help convey meaning when creating messages, it
is sometimes acceptable to include appropriate
emoticon symbols, such as a smiley face :)
However, for professional communications these
would be inappropriate.
NETIQUETTE
AVOID SLANG, ACRONYM, AND TEXT TALK
• (Example: **Important**).
NETIQUETTE
PROOFREAD YOUR MESSAGES BEFORE
SENDING THEM
1. Copyright
2. Plagiarism
3. Computer Addiction
1. Hacking
• Unauthorized access of or interference with
computer systems, servers, or other
information and communication systems.
• Unauthorized access to corrupt, alters, steal, or
destroy electronic data using computers or
other information and communication systems
without the computer or system owner’s
knowledge and consent.
• The introduction of computer viruses resulting
in the corruption, alteration, theft, or loss of
such data.
CYBERCRIMES
Criminal Activities
1. Hacking
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware
• If the act is committed against critical
infrastructure of the Philippines the,
penalty is between 12-20 years reclusion
temporal.
CYBERCRIMES
Criminal Activities
1. Hacking
• Six years up to twelve years of imprisonment
also known as prison mayor.
CYBERCRIMES
Criminal Activities
3. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the
right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling
digital music, video, computer software,
etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or
prison mayor.
CYBERCRIMES
Criminal Activities
4. Cyberbullying
• The use of electronic communication to
bully a person, typically by sending a
message of an intimidating or threatening
nature.
• The Anti-Bullying Act of 2013 (RA
10627)
CYBERCRIMES
Criminal Activities
5. Cybersex
• Willful engagement, maintenance, control,
or operation, directly or indirectly of any
lascivious exhibition of sexual organs or
sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it
involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison
mayor.
CYBERCRIMES
Criminal Activities
6. Child Pornography
• Is a form of child sexual exploitation.
• Unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or
the Anti-Child Pornography Act of 2009,
committed through a computer system.
• Penalty of 12-20 years of imprisonment or
reclusion temporal.
CYBERCRIMES
Criminal Activities
7. Cyber Defamation
• Is an unprivileged false statement of fact
which tends to harm the reputation of a
person or company.
• Penalty of 6-12 years of imprisonment or
prison mayor.
INTERNET THREATS
Malware
• Virus
• A malicious program designed to
replicate itself and transfer from one
computer to another either through
the Internet and local networks or data
storage like flash drives and CDs.
MALWARE
Types of Malware
• Worm
• A malicious program that transfers
from one computer to another by any
type of means. Often, it uses a
computer network to spread itself.
MALWARE
Types of Malware
• Trojan
• A malicious program that is disguised
as a useful program, but once
downloaded or installed, leaves your
PC unprotected and allows hackers to
get your information.
• Rogue Security Software – tricks the
user into posing that it is security
software. It asks the user to pay to
improve his/her security but in reality,
they are not protected at all.
MALWARE
Types of Malware
• Spyware
• A program that runs in the background
without you knowing it (thus called
“spy”). It has the ability to monitor what
you are currently doing and typing
through key logging.