Save
EMTECH
LESSON-2-ONLINE-SAFETY-SECURITY-ETHICS-AND-NETIQUETTE
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
eya
Visit profile
Cards (54)
Online
threats
Malware
Phishing
Spam
Adware
Ransomware
Trojan
Spyware
Crimeware
Pharming
Virus
Worm
View source
Online safety measures
Be
mindful
of what you
share
Read
terms and conditions
Check
privacy
policy
Know
security features
Do not share
passwords
Avoid
public
networks
Do not
talk
to strangers
Never post about future
vacations
Add
friends
you know
Avoid untrusted
websites
Install
antivirus
software
Make
home
Wi-Fi private
Avoid
downloading
from untrusted websites
Buy
software
, do not use
pirated
Do not click links from suspicious
emails
View source
Online Ethics
Principles governing the appropriate use of
technology
and
online
behavior
View source
Netiquette
The correct or acceptable way of communicating on the
internet
View source
Apply online safety, security, ethics and etiquette standards and practice in the use of
ICTs
View source
Types of information shared
First
name
Last
name
Middle
name
Current
and
previous
school/s
Cellphone
number
Name of
mother
&
father
Name of
siblings
Address
Home
phone number
Birthday
View source
Types of information not shared
First
name
Last
name
Middle
name
Current
and
previous
school/s
Cellphone
number
Name of
mother
&
father
Name of
siblings
Address
Home
phone number
Birthday
View source
There is a risk in sharing your
first
name
View source
Having both your
first
and
last
name is more risky
View source
Sharing your
middle
name alone is probably not the most
risky
View source
Most people who steal
identities
study their subject
View source
Your cellphone number should
never
be public
View source
Disclosing the
name
of your siblings is a huge
risk
View source
Giving your
address
would make it easier for criminals to find you
View source
This shared information is more
risky
than your personal phone number
View source
Letting people know your
birthday
makes you vulnerable to identity
theft
View source
Malware
Any program or file that is
harmful
to a computer user
View source
Virus
A malicious program designed to
replicate
itself and
transfer
from one computer to another
View source
Worm
A
malicious
program that
transfers
from one
computer
to another by
any type
of
means
View source
Trojan
A
malicious
program that is disguised as a
useful
program
View source
Spyware
A program that
runs
in the background and
monitors
user activity
View source
Adware
A program designed to send advertisements, mostly as
pop-ups
View source
Spam
Unwanted email mostly from
bots
or
advertisers
View source
Phishing
A method to acquire sensitive
personal
information by directing users to
fraudulent
websites
View source
Pharming
A more complicated way of phishing that exploits the
DNS
system
View source
Companies do a
background
check on applicants
View source
Once you post something on the
web
, you have no
control
of who sees your posts
View source
There are
limitations
to copyright laws
View source
Copyright infringement
is the use of works protected by
copyright
law without
permission
View source
Ways to avoid copyright infringement
Express
in your own words
Credit
the source
Understand copyright
limitations
Know the
law
View source
There are provisions for
“fair use”
which allow certain uses of intellectual property without
consent
View source
Ask yourself whether what you are making is something that
came
from you or someone else’s
creativity
View source
Set your post to
“private”
to protect your reputation online
View source
Avoid using
names
to protect your reputation online
View source
If a post can affect your or others' reputation, ask to pull it
down
or
report
it
View source
Rogue security software
tricks the user into thinking it is legitimate
View source
Keyloggers
are used to record
keystrokes
to steal sensitive information
View source
Crimeware
can spread by way of viruses, Trojan horse programs, worms, spyware, or adware
View source
Ransomware
threatens to publish or block access to data unless a
ransom
is paid
View source
Malware
can be spread through
questionable file
downloads, visiting
infected
websites, and
emails
with attachments or
links
View source
See all 54 cards