29
Lesson 2: Rules of Netiquette

Netiquette on using internet

Embed Size (px)

Citation preview

Page 1: Netiquette  on using internet

Lesson 2: Rules of Netiquette

Page 2: Netiquette  on using internet

OBJETIVESAt the end of this lesson, the students should be able to:

1. Consider one’s and others’ safety when sharing information using the internet;

2. Consider one’s and others’ reputation when using the internet;

3. Determine and AVOID the dangers of the internet; 4. Be responsible in the use of social networking sites; & 5. Browse the internet efficiently & properly through proper

referencing.

Page 3: Netiquette  on using internet

Online Safety and Security

Page 4: Netiquette  on using internet

InternetInternet is defined as information superhighway.Anyone who has access to this highway, can place information and can grab that information.

Page 5: Netiquette  on using internet

Internet Threats

Page 6: Netiquette  on using internet

Malwaremalicious software

It can take the form of executable code, scripts, active content, and other software.

computer viruses wormsTrojan horsesspyware adware, and

SpamPhishingother malicious programs.

Page 7: Netiquette  on using internet

Computer Virus A computer virus is a malware that; when executed,

replicates by reproducing itself or infecting other programs by modifying them.

 The term computer virus was a misnomer until it was coined by Fred Cohen in 1985.

Page 8: Netiquette  on using internet

WormA computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

Page 9: Netiquette  on using internet

Trojan a malicious program that is disguised as useful program but once installed, leave your PC unprotected and allows hackers to get your information.

Page 10: Netiquette  on using internet

Adware a program designed to send advertisement, mostly as pop-ups.

Page 11: Netiquette  on using internet

Spywarea program that runs in the

background without you knowing it. It has ability to monitor what are you currently doing and typing through keylogging. keyloggers – used to record the keystroke done by the users

Page 12: Netiquette  on using internet

Spamunwanted emails mostly from bots or advertisers. It can be used to send malware.

Page 13: Netiquette  on using internet

Phishingits goal is to acquire sensitive information like password and credit card details.

Page 14: Netiquette  on using internet

Tips to stay safe online

Page 15: Netiquette  on using internet

1. Be mindful of what you shares online and what site you share it to.

Page 16: Netiquette  on using internet

2. don’t just accept terms and conditions; READ IT.

Page 17: Netiquette  on using internet

3. Check out the privacy policy page of a website.

Page 18: Netiquette  on using internet

4. Know the security features of social networking site you use.

Page 19: Netiquette  on using internet

5. Do not share your password with anyone

Page 20: Netiquette  on using internet

6. Avoid logging in to public networks/Wi-Fi.

Page 21: Netiquette  on using internet

7. Do not talk to strangers whether online or face-to-face.

Page 22: Netiquette  on using internet

8. Never post anything about a future vacation.

“Rob my house at this date”

Page 23: Netiquette  on using internet

9. Add friends you know in real life.

Page 24: Netiquette  on using internet

10. Avoid visiting untrusted website

Page 25: Netiquette  on using internet

11. Install and update antivirus software on your computer.

Page 26: Netiquette  on using internet

12. If you have a Wi-Fi at home, make a private network by adding a password.

Page 27: Netiquette  on using internet

13. Avoid downloading anything from untrusted websites.

Page 28: Netiquette  on using internet

14. Buy the software; do not use pirated ones.

Page 29: Netiquette  on using internet

15. Do not reply or click links from suspicious emails.