Lesson 2
Lesson 2
TECHNOLOGIES
LESSON 2
ONLINE SAFETY, SECURITY AND RULES OF
NETIQUETTE
INTERNET SAFETY
it refers to the online security
or safety of people and their
information when using
internet.
NETIQUETTE
is network etiquette, the do’s
and don’ts of online
communication.
2
TEN RULES OF NETIQUETTE
RULE NO. 1: REMEMBER THE HUMAN
• You need to remember that you are talking to a real person
when you are online.
• The internet brings people together who would otherwise
never meet.
• Remember this saying when sending an email: Would I say
this to the person’s face.
3
TEN RULES OF NETIQUETTE
RULE NO. 2: ADHERE TO THE SAME STANDARDS ONLINE THAT
YOU FOLLOW IN REAL LIFE.
• You need to behave the same way online that you do in real
life.
• You need to remember that you can get caught doing things
you should not be doing online just like you can in real life.
• You are still talking to a real person with feelings even though
you can’t see them.
4
TEN RULES OF NETIQUETTE
RULE NO. 3: KNOW WHERE YOU ARE IN CYBERSPACE.
• Always take a look around when you enter a new domain
when surfing the web.
• Get a sense of what the discussion group is about before you
join it.
5
TEN RULES OF NETIQUETTE
RULE NO. 4: RESPECT OTHER PEOPLE’S TIME AND
BANDWIDTH.
• Remember people have other things to do besides read your
email. You are not the center of their world.
• Keep your post and emails to minimum by saying what you
want to say.
• Remember everyone won’t answer your questions.
6
TEN RULES OF NETIQUETTE
RULE NO. 5: MAKE YOURSELF LOOK GOOD ONLINE.
7
TEN RULES OF NETIQUETTE
RULE NO. 6: SHARE EXPERT KNOWLEDGE
8
TEN RULES OF NETIQUETTE
RULE NO. 7: HELP KEEP FLAME WARS UNDER CONTROL
9
TEN RULES OF NETIQUETTE
RULE NO. 8: RESPECT OTHER PEOPLE’S PRIVACY.
10
TEN RULES OF NETIQUETTE
RULE NO. 9: DON’T ABUSE YOUR POWER.
11
TEN RULES OF NETIQUETTE
RULE NO. 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKE.
• Do not point out mistakes to people online.
• Remember that you were once the new kid on the block.
• You still need to have a good manners even though you are
online and cannot see the person face to face.
12
INTERNET SECURITY
Security Requirement Triad
▰ Confidentiality
Data confidentiality Privacy
▰ Integrity
Data integrity System integrity
▰ Availability
13
AVAILABILITY THREAT ACTION ( ATTACK)
15
AVAILABILITY
THREAT CONSEQUENCE THREAT ACTION ( ATTACK)
17
MISUSE
Causes a system component to perform a function or service that is
detrimental to system security.
Types of System Intruders
Masquerader Hackers Clandestine User
18
PARTS OF VIRUS
INFECTION MECHANISM TRIGGER PAYLOAD
19
VIRUS STAGES
DORMANT PHASE- Virus is idle. TRIGGERING PHASE - Virus is
activated to perform the function for
which it was intended.
Caused by a variety of system events.
20
Key Terms
▰ Cyber Crime-a crime committed or assisted through the use of the Internet.
▰ Privacy Policy/Terms of Services (ToS) – tells the user how the website will handle its data.
▰ Malware- stands for malicious software.
▰ Virus- a malicious program designed to transfer from one computer to another in any means
possible.
▰ Worms– a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
▰ Trojan-a malicious program designed that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hacker to get your
information.
▰ Spyware– a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
▰ Adware- a program designed to send you advertisement, mostly pop-ups.
21
Key Terms
▰ Spam– unwanted email mostly from bots or advertisers.
▰ Phishing- acquires sensitive personal information like passwords and credits card details.
▰ Pharming- a more complicated way of phishing where it exploits the DNS system.
▰ Copyright- a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
▰ Fair Use- means that an intellectual property may be used w/o consent as long as it is used in
commentaries, criticism, parodies, research and etc.
▰ Keyloggers- used to record the keystrokes done by user. This is done to steal passwords or
any other sensitive information.
▰ Rogue security softwares– is a form of malicious software and internet fraud that misleads
users into believing there is a virus on their computer, and manipulates them into paying
money for a fake malware removal tool.
22
BOOLEAN
NOT – searches for the first term and excludes sites that have the second term.
(i.e. Washington NOT school)
QUESTION
a question may be entered in the search field of search engine
ADVANCED
Features are offered on many engines by going to an “Advanced search” page
and making selections. Effective in narrowing search returns to a specific topic
or phrase.
23
FOUR SEARCH STRATEGIES
Enter terms to search
Use quotation marks to search as a phrase and keep the words linked together
Common words are ignored (That, to, which, a, the …)
+ and – can be used to include or exclude a word
BOOLEAN
AND – enter words connect with AND- it will include sites where both words
and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR greenhouse
effect) 24
QUIZ 2
1. This is the network etiquette, the do’s and don’ts of
online communication.
2. Virus places an identical copy of itself into other
programs or into certain system areas on the disk.
3. An unauthorized entity gains access to a system or
performs a malicious act by posing as an authorized
entity
4. It refers to the online security or safety of people and
their information when using internet.
5.-7. Security Requirement Triad
8-12 Write 5 Key Terms and functions that you remember.
13-15: Types of System Intruders
KEY TO CORRECTION
1. NETIQUETTE
2. PROPAGATION PHASE
3. MASQUERADE
4. INTERNET SAFETY
3.-5. Confidentiality, Integrity, Availability
6-10 Write 5 Key Terms and functions that you
remember.
13-15. Types of System Intruders
ASSIGNMENT
▰ TITLE FOR YOUR E-COMMERCE
▰ 3 GOAL
ACTIVITY GROUPINGS
▰ MAIL MERGE (WORD, PPT & PUBLISHER)
▰ CERTIFICATE, INVITATION & FLAYERS
▰ SOFTCOPY & HARDCOPY
27
ACTIVITY GROUPINGS
▰ MAIL MERGE WORD (RESUME- ADDRESS 5 COMPANY)
▰ POWERPOINT PRESENTATION (E-COMMERCE)
▰ PUBLISHER (TARPAULIN/TARP PAPEL, INVITATION & FLYER)
▰ FLYERS (CONTENT PPT E-COMMERCE)
E COMMERCE (4 MEMBERS)
28
▰ PRE-PRESENTATION: DECEMBER 5, 2022
▰ FINAL PRESENTATION E COMMERCE JANUARY 13, 2023
▰ SUBMISSION OF ACTIVITIES HARDCOPY & SOFTCOPY:
JANUARY 12, 2023
29