Online Safety, Security
and Netiquette
Lesson 2 :
Objectives:
By the end of this lesson, you are expected to:
1. Identify what constitutes appropriate and inappropriate
online behavior.
2. Apply internet online safety, security ethics and
etiquette standards and practice in the use of ICTs.
3. Discern possible deceptive information and wrongly
evaluated data
Online Safety
and Security
Online safety refers to the
practices and precautions
that should be observed
when using the internet to
ensure that the users as well
as their computers and
personal information are
safe from crimes associated
with using the internet.
Tips to
Stay
Safe
Online
1. Never give any
Tips to
Stay Safe
personal information
Online out about yourself
over the internet.
2. Do not give any banking or
sensitive information unless you
are sure that it is a reputable
Tips to business having a secure
Stay Safe service. To make sure that you
Online are in a secured network, the
website address should begin
with “https://’ as opposed to
“http://”.
3. Never open messages
Tips to
or attachments from
Stay Safe
someone you do not
Online
know.
4. Regularly review your privacy
Tips to settings in your online accounts
Stay Safe to make sure you are not
Online sharing important personal
information.
Tips to 5. WHEN USING A PUBLIC
COMPUTER TERMINAL, BE SURE TO
Stay Safe DELETE YOUR BROWSING DATA
Online BEFORE LEAVING.
Tips to
6. KEEP YOUR SOFTWARE UPDATED
Stay Safe TO AVOID SECURITY HOLES.
Online
Tips to 7. Do not download or install
software or anything on your
Stay Safe computer or cell phone that is
Online unknown to you.
NETIQUETTE - is a
combination of the
words network and
etiquette. It is a set of
rules for behaving
properly, the do’s and
don’ts of online.
TEN RULES OF
NETIQUETTE
Rule No. 1
Make sure
identification is
clear in all
communication.
Rule No. 2
Review what you
wrote and try to
interpret it objectively.
Rule No. 3
If you wouldn’t
say it face to face,
don’t say it online.
Rule No. 4
Don’t assume
everyone
understands where
you’re coming from.
Rule No. 5
Don’t
spam.
Rule No. 6
Use
emoticons.
Rule No. 7
Respect
others’ privacy.
Rule No. 8
Remember,
if it’s on the
internet, it’s
everywhere.
Rule No. 9
Follow
the rules.
Rule No. 10
Forgive
and
forget.
Flame war is a series
of flame posts or
messages in a thread
that are considered
derogatory in nature
or are completely off-
topic.
Different types of
Internet Threats
Online threat
Online threat is deemed
any malicious act that
attempts to gain access to a
computer network without
authorization or permission
from the owners.
Kinds of Online Threats
The following are the top kinds of
online threats that you should be
aware of:
1. Phishing happens when an
email is sent from an internet
criminal disguised as an email
from a legitimate, trustworthy
source.
Kinds of Online
Threats
2. Pharming happens
when a hacker (or
“pharmer”) directs
an internet user to a
fake website instead
of a legitimate one.
Kinds of Online Threats
3. Internet Scam - generally
refers to someone using
internet services or software
to defraud or take advantage
of victims, typically for
financial gain.
Kinds of
Online
Threats
4. Malware or malicious
software, is any program
or file that is harmful to
a computer user.
Types of malware
A. Adware (advertising
supported software) is
unwanted software designed
to throw advertisements up
on your screen. Example,
pop-up ads and banner ads.
Types of malware
B. Spyware is malware that
secretly observes the
computer user’s activities
without permission and
reports it to the software’s
author. Example is a
keylogger
Types of malware
C. Virus and Worms are malwares
that attach to another program
and, when executed
unintentionally by the user—
replicates itself by modifying other
computer programs and infecting
them with its own bits of code.
Types of malware
D. Trojan or Trojan horse, is
one of the most dangerous
malware types. It usually
represents itself as
something useful in order
to trick you.
Types of malware
E. Ransomware is a form
of malware that locks you
out of your device and/or
encrypts your files, then
forces you to pay a
ransom to get them back.
Kinds of
Online Threats
5. Spams are unsolicited
emails, instant messages
coming from recipients
that are not granted
verifiable permission for
the message to be sent.
Kinds of
Online Threats
6. Cyberstalking refers
to the use of the
internet or other
electronic device to
harass or stalk
individuals or
organizations.
Kinds of Online
Threats
7. Spoofing happens when
someone or something
pretends to be something else
to gain our confidence, get
access to our systems, steal
data, steal money, or spread
malware.
Think
Before You
Click
Think Before You
Click
Things you might want to consider
before internet posting.
1. Once you post
something on the web,
you have no control of
who sees your posts.
Think Before You
Click
Things you might want to
consider before internet posting.
2. Your friends depend on
you to protect their
reputation online.
3. Set your post to
“private”.
Think Before You
Click
Things you might want to
consider before internet posting.
4. Avoid using names.
Names are easy for
search engines to scan.
Think Before You
Click
Things you might want to
consider before internet posting.
5. If you feel that a post can
affect you or other’s
reputation, ask the one who
posted it to pull it down or
report it as inappropriate.
Thank you!