Online Safety, Security, Ethics and Netiquette
Online Safety, Security, Ethics and Netiquette
Online Safety, Security, Ethics and Netiquette
DIRECTION:
DIRECTIONS:
Read and reflect each item
carefully. Put check in the space
you have shared or not shared
these pieces of information in all
your social media accounts.
1. How many of these information have you SHARED?
2. How many of these information have you NOT SHARED?
3. Based from your answers, do you think you are safe
when using the internet? Why?
Lesson 2.1:
Online Safety, Security,
Ethics and Netiquette
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Adware (advertising supported software) is
unwanted software designed to throw
Adware advertisements up on your screen. Example, pop-
up ads and banner ads.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spyware is malware that secretly observes
the computer user’s activities without
Spyware permission and reports it to the software’s
author. Example is a keylogger.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Virus and Worms
Virus and Worms are malwares
that attach to another program
and, when executed—
unintentionally by the user—
replicates itself by modifying
other computer programs and
infecting them with its own bits of
code.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Trojan or Trojan Horse
Trojan, or Trojan horse, is one of
the most dangerous malware types.
It usually represents itself as
something useful in order to trick
you. Once it’s on your system, the
attackers behind the Trojan gain
unauthorized access to the affected
computer. From there, Trojans can
be used to steal financial information
or install threats like viruses and
ransomware.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Ransomware
Ransomware is a form of malware that locks you out of your
device and/or encrypts your files, then forces you to pay a
ransom to get them back.
Malware
Malware or malicious software, is
any program or file that is harmful
to a computer user. Here are the
most common offenders in the
rogues’ gallery of malware:
• Adware
• Spyware
• Virus and Worms
• Trojan or Trojan Horse
• Ransomware
Spams are unsolicited emails, instant messages coming
from recipients that are not granted verifiable permission
Spams for the message to be sent. Spam messages can be
damaging if you open or respond to it.
Cyberstalking
Cyberstalking refers to the
use of the internet or other
electronic device to harass
or stalk individuals or
organizations.
Cyberbullying
Cyberbullying
The Act of tormenting,
threatening, harassing or
embarrassing another person using
the internet or other technologies.
Spoofing
Spoofing happens when
someone or something
pretends to be something
else to gain our
confidence, get access to
our systems, steal data,
steal money, or spread
malware.
-Describe a criminal; who
impersonates another
individual or organization,
with the intent to gather
personal or business
information.
• Phishing
Types of Online Threats • Pharming
• Internet Scam
• Internet robots
• Malware
• Spams
• Cyberstalking
• Cyberbullying
• Spoofing
Online Ethics and
Netiquette
• Comes from the word
Network and Etiquette
• Is a set of rules and
norms for acceptable
conduct or behavior
online.
Online Ethics and Netiquette
1. Your family is going out on a 2. Do you have the same passwords for all your
vacation. What should you do? accounts?
A. Post pictures when you return home. A. Yes. That is how I remember all my passwords.
B. Post the dates you will be gone B. I have different passwords for all different
online. accounts.
C. I keep it simple. I don’t have any passwords.
C. Post updates of where you are
currently checking in hotels or places. D. I have two similar passwords that I alternately use
for all my accounts.
D. Tell no one. Vacations are for getting
away.
• Activity 3
4. Your parents bought you your first 5. Your social media friends list should only be
cellphone. How will you share your composed of ______________.
cellphone number? A. Your favorite brands.
A. Do not share your cellphone number B. Family and friends
to anyone. C. Anyone who sends you a friend request
B. Post your cellphone number in your D. Foreigners
social media account.
C. Share your cellphone number only in
person.
D. Post your cellphone number in your
group chat.
What have you Learned?
Direction: Reflect on
this and write your
answer in a ¼ sheet of
Paper