EMPOWERMENT TECHNOLOGIES 2nd Semester (S.Y.
2023-2024)
Lesson 2: RULES OF NETIQUETTE Tips to Stay Safe Online
o Be mindful of what you share and what site you share it to.
Online Safety and Security o Do not just accept terms and conditions; read it.
Information Risks o Check out the privacy policy page of a website.
1. First Name • Hacker may already know plenty of stuff o Know the security features of the social networking site you use.
about you even if you only give your first o Do not share password with anyone.
name o Avoid logging in to public networks/Wi-Fi.
2. Last Name • Vulnerable to being searched for using o Do not talk to strangers whether online or face to face.
search engines, which include image o Never post anything about future vacation.
search/matching a name with a face is o Add friends you know in real life.
modus to several cybercrimes like o Avoid visiting untrusted website.
identity theft o Install and update an antivirus software on your computer.
3. Middle Name • Sharing your middle name alone is o If you have a Wi-Fi at home, make it a private network by adding
probably not the riskiest, but sharing your password.
full name would be o Avoid downloading anything from untrusted websites.
4. Current and Previous • Most people who steal identities study o Buy the software; do not use pirated ones.
School (s) their subject, they can use this o Do not reply or click links from suspicious email.
information for verification processes
Internet Threats
5. Cellphone Number • Should never be posted on the Internet, as
1. Malware – stands for malicious software
it is a public place
a. Virus – a malicious software program loaded into a user’s computer
• You would not want random strangers to
without the user’s knowledge and performs malicious actions and
text or call you, or worse pretend they are
can be transferred from one computer to another through the
someone else
Internet and local networks or data storage like flash drives
6. Names of your Mother • Risky, yet not as risk as posting their full b. Worm – a stand-alone malicious program designed to replicate itself
and Father names, especially your mother’s maiden and transfer from one file to another and also transfer to other
name computer network without the human help.
7. Names of your siblings • Disclosing this is a huge risk c. Trojan – a malicious program designed that is disguised as a useful
• Strangers may pretend or use your program but once downloaded or installed, leaves your PC
identity to dupe you unprotected and allows hacker to get your information.
8. Address • Giving your address would make you i. Rogue security software – is a form of malicious software
easier for criminals to find and internet fraud that misleads users into believing there
9. Home Phone Number • This shared information is riskier than is a virus on their computer, and manipulates them into
sharing personal phone number paying money for a fake malware removal tool.
10. Birthday • It makes you vulnerable to identity theft d. Spyware – a program that runs in the background without you
knowing it (thus called “spy”). It has the ability to monitor what you
The Internet is defined as the information superhighway. This means that anyone are currently doing and typing through key logging.
has access to this highway, can place information and can grab information. Any i. Keyloggers – used to record the keystrokes done by user.
information, even things that you set privately, can be accessed one way or This is done to steal passwords or any other sensitive
another. The threat of cybercrime is very real. While you may not experience the information.
threat now, whatever information we share today could affect us in the future. e. Adware – a program designed to send you advertisement, mostly
pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to
send malware.
EMPOWERMENT TECHNOLOGIES 2nd Semester (S.Y. 2023-2024)
3. Phishing – its goal is to acquire sensitive personal information like 3. Be creative. Ask yourself whether what you are making is something that
passwords and credit card details. This is done by sending you an email that came from you or something made from somebody else’s creativity. It is
will direct the user to visit a website and be asked to update his/her important to add your own creative genius in everything that will be
username, password, credit card, or personal information. credited to you.
a. Pharming – a more complicated way of phishing where it exploits 4. Know the law. There are some limitations to copyright laws. For
DNS (Domain Name Service) system. instance, in the Philippines, copyrights only last a lifetime (of the author)
plus 50 years. There are also provisions, for “fair use”, which means that
Protecting Reputations Online an intellectual property may be used without a consent as long as it is
You must “THINK BEFORE YOU CLICK” used in commentaries, criticisms, search engines, parodies, news
reports, research, library archiving, teaching and education. If you have
T – is it True? doubts that what you are doing does not fall under the policy of fair use,
H – is it Helpful? seek permission first.
I – is it Inspiring?
N – is it Necessary? Online Research
K – it is Kind? Tips in conducting online research:
1. Before you post something on the web, as these questions to yourself: 1. Have a question in mind. Focus on a question you want to be answered.
• Would you want your parents or grandparents to see it? If it is a series of questions, start with only one. Never search everything
• Would you want your future boss to see it? on one go.
Once you post something on the web, you have no control of who 2. Narrow it down. Search engines use several filters to determine the most
sees your post. appropriate results. Search engines use your previous search history and
2. Your friends depend on you to protect their reputation online. Talk to your geographical location, and send you the result which is the most
your friends about this serious responsibility. related to you.
3. Set your post to “private”. In this way, search engines will not be able to 3. Using Advance Search. The best way to filter information you get from
scan that post. search engines.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one Keywords and Symbols for Advance Search:
who posted it to pull it down or report it as inappropriate. + - allows you to include terms that are usually ignored
“ ” – finds the exact words in a phrase
Copyright Infringement ( ) – finds or excludes web pages that contain a group of words
Intellectual Property AND or & - finds web pages that contain all the terms or phrases
- if you create something – an idea, an invention, a form of literary work, NOT or – - excludes web pages that contain a term or phrase
or a research, you have the rights as to how it should be used by others OR or | - finds web pages that contain either of the term or phrases
- in other words, the copyright law includes your rights over your work site:website.com – provide results from a specific website
and anyone who uses it without your consent is punishable by law * (asterisk) – if you do not know the exact terms
related:website.com – provides related websites
Tips to Avoid Copyright Infringement
1. Understand. Copyright protect literary works, photographs, paintings, 4. Look for credible sources of information. Click the source of the
drawings, films, music (and lyrics), choreography, and sculptures, but it information and see if it is credible.
generally does NOT protect underlying ideas and facts. This means that 5. Give credit. If you are going to use pieces of information from a source
you can express something using your own words, but you should give for educational purposes, give credit to the original author of the page or
credit to the source. information.
2. Be responsible. Even if a material does not say that it is copyrighted, it is
not a valid defense against copyright. Be responsible enough to know if
something has a copyright.