0% found this document useful (0 votes)
45 views29 pages

Lesson 2

The document discusses internet safety and netiquette rules. It provides definitions of internet safety and netiquette. It then lists and describes 10 rules of netiquette related to online communication and behavior.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
45 views29 pages

Lesson 2

The document discusses internet safety and netiquette rules. It provides definitions of internet safety and netiquette. It then lists and describes 10 rules of netiquette related to online communication and behavior.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 29

EMPOWERMENT

TECHNOLOGIES

LESSON 2
ONLINE SAFETY, SECURITY AND RULES OF
NETIQUETTE
INTERNET SAFETY
it refers to the online security
or safety of people and their
information when using
internet.

NETIQUETTE
is network etiquette, the do’s
and don’ts of online
communication.

2
TEN RULES OF NETIQUETTE
RULE NO. 1: REMEMBER THE HUMAN
• You need to remember that you are talking to a real person
when you are online.
• The internet brings people together who would otherwise
never meet.
• Remember this saying when sending an email: Would I say
this to the person’s face.

3
TEN RULES OF NETIQUETTE
RULE NO. 2: ADHERE TO THE SAME STANDARDS ONLINE THAT
YOU FOLLOW IN REAL LIFE.
• You need to behave the same way online that you do in real
life.
• You need to remember that you can get caught doing things
you should not be doing online just like you can in real life.
• You are still talking to a real person with feelings even though
you can’t see them.
4
TEN RULES OF NETIQUETTE
RULE NO. 3: KNOW WHERE YOU ARE IN CYBERSPACE.
• Always take a look around when you enter a new domain
when surfing the web.
• Get a sense of what the discussion group is about before you
join it.

5
TEN RULES OF NETIQUETTE
RULE NO. 4: RESPECT OTHER PEOPLE’S TIME AND
BANDWIDTH.
• Remember people have other things to do besides read your
email. You are not the center of their world.
• Keep your post and emails to minimum by saying what you
want to say.
• Remember everyone won’t answer your questions.

6
TEN RULES OF NETIQUETTE
RULE NO. 5: MAKE YOURSELF LOOK GOOD ONLINE.

• Be polite and pleasant to everyone.


• Always check your spelling and grammar before posting.
• Know what you are talking about and make sense saying it.

7
TEN RULES OF NETIQUETTE
RULE NO. 6: SHARE EXPERT KNOWLEDGE

• Ask questions online


• Share what you know online.
• Post the answers to your questions online because someone
may have the same question you do.

8
TEN RULES OF NETIQUETTE
RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL

• Netiquette does not forgive flaming.


• Netiquette does however forbid people who are flaming to
hurt discussion groups by putting the group down.

9
TEN RULES OF NETIQUETTE
RULE NO. 8: RESPECT OTHER PEOPLE’S PRIVACY.

• Do not read other people’s mail without their permission.


• Going through other people’s things could cost you, your job
or you could even go to jail.
• Not respecting other people’s privacy is a bad netiquette.

10
TEN RULES OF NETIQUETTE
RULE NO. 9: DON’T ABUSE YOUR POWER.

• Do not take advantage of other people just because you have


more knowledge or power than them.
• Treat others as you would want them to treat you if the roles
were reversed.

11
TEN RULES OF NETIQUETTE
RULE NO. 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKE.
• Do not point out mistakes to people online.
• Remember that you were once the new kid on the block.
• You still need to have a good manners even though you are
online and cannot see the person face to face.

12
INTERNET SECURITY
Security Requirement Triad

▰ Confidentiality
Data confidentiality Privacy
▰ Integrity
Data integrity System integrity
▰ Availability

13
AVAILABILITY THREAT ACTION ( ATTACK)

Exposure: Sensitive data are directly released to an


THREAT CONSEQUENCE
unauthorized entity.

Interception: An unauthorized entity directly


UNAUTHORIZED accesses sensitive data traveling between
DISCLOSURE authorized sources and destinations.
A circumstance or event
whereby an entity gains Inference: A threat action whereby an unauthorized
access to data for which the entity indirectly accesses sensitive data by reasoning
entity is not authorized. from characteristics or byproducts of
communications.

Intrusion: an unauthorized entity gains access to


sensitive data by circumventing a system’s security
protections. 14
AVAILABILITY
THREAT CONSEQUENCE THREAT ACTION ( ATTACK)

Incapacitation: prevents or interrupts system


DISRUPTION operation by disabling a system component.

Corruption: Undesirably alters system operation by


A circumstances or even that adversely modifying system functions or data.
interrupts or prevents the
correct operation of system
services and functions.

15
AVAILABILITY
THREAT CONSEQUENCE THREAT ACTION ( ATTACK)

Obstruction: A threat action that interrupts delivery


DECEPTION of system services by hindering system operation.

A circumstance or event that Masquerade: An unauthorized entity gains access to


may result in an authorized a system or performs a malicious act by posing as an
entity receiving false data and authorized entity.
believing it to be true.
Falsification: False data deceive an authorized entity.

Repudiation: entity deceives another by falsely


denying responsibility for an act.
16
AVAILABILITY
THREAT CONSEQUENCE THREAT ACTION ( ATTACK)

Misappropriation: An entity assumes


USURPATION unauthorized logical or physical control of a
system resource.
A circumstances or event that
results in control of system
services or functions by an
unauthorized entity.

17
MISUSE
Causes a system component to perform a function or service that is
detrimental to system security.
Types of System Intruders
Masquerader Hackers Clandestine User

18
PARTS OF VIRUS
INFECTION MECHANISM TRIGGER PAYLOAD

19
VIRUS STAGES
DORMANT PHASE- Virus is idle. TRIGGERING PHASE - Virus is
activated to perform the function for
which it was intended.
Caused by a variety of system events.

EXECUTION PHASE - Function is


PROPAGATION PHASE- Virus places performed
an identical copy of itself into other
programs or into certain system
areas on the disk.

20
Key Terms
▰ Cyber Crime-a crime committed or assisted through the use of the Internet.
▰ Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
▰ Malware- stands for malicious software.
▰ Virus- a malicious program designed to transfer from one computer to another in any means
possible.
▰ Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
▰ Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
▰ Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
▰ Adware- a program designed to send you advertisement, mostly pop-ups.
21
Key Terms
▰ Spam– unwanted email mostly from bots or advertisers.
▰ Phishing- acquires sensitive personal information like passwords and credits card details.
▰ Pharming- a more complicated way of phishing where it exploits the DNS system.
▰ Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
▰ Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
▰ Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or
any other sensitive information.
▰ Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.

22
BOOLEAN
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
QUESTION
a question may be entered in the search field of search engine
ADVANCED
Features are offered on many engines by going to an “Advanced search” page
and making selections. Effective in narrowing search returns to a specific topic
or phrase.

23
FOUR SEARCH STRATEGIES
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word

BOOLEAN
AND – enter words connect with AND- it will include sites where both words
and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse
effect) 24
QUIZ 2
1. This is the network etiquette, the do’s and don’ts of
online communication.
2. Virus places an identical copy of itself into other
programs or into certain system areas on the disk.
3. An unauthorized entity gains access to a system or
performs a malicious act by posing as an authorized
entity
4. It refers to the online security or safety of people and
their information when using internet.
5.-7. Security Requirement Triad
8-12 Write 5 Key Terms and functions that you remember.
13-15: Types of System Intruders
KEY TO CORRECTION
1. NETIQUETTE
2. PROPAGATION PHASE
3. MASQUERADE
4. INTERNET SAFETY
3.-5. Confidentiality, Integrity, Availability
6-10 Write 5 Key Terms and functions that you
remember.
13-15. Types of System Intruders
ASSIGNMENT
▰ TITLE FOR YOUR E-COMMERCE
▰ 3 GOAL

ACTIVITY GROUPINGS
▰ MAIL MERGE (WORD, PPT & PUBLISHER)
▰ CERTIFICATE, INVITATION & FLAYERS
▰ SOFTCOPY & HARDCOPY
27
ACTIVITY GROUPINGS
▰ MAIL MERGE WORD (RESUME- ADDRESS 5 COMPANY)
▰ POWERPOINT PRESENTATION (E-COMMERCE)
▰ PUBLISHER (TARPAULIN/TARP PAPEL, INVITATION & FLYER)
▰ FLYERS (CONTENT PPT E-COMMERCE)

E COMMERCE (4 MEMBERS)

28
▰ PRE-PRESENTATION: DECEMBER 5, 2022
▰ FINAL PRESENTATION E COMMERCE JANUARY 13, 2023
▰ SUBMISSION OF ACTIVITIES HARDCOPY & SOFTCOPY:
JANUARY 12, 2023

29

You might also like