EmpTech Lesson 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

copyright page

disclaimer with the words: "No part of this book may be copied, reproduced.

be responsible

even if a material does not say that it is copyrighted, it is not a valid defense against copyright. Be responsible enough to know if something has a copyright.

Why is internet a threat?

information superhighway. Anyone has access to this highway, can place information and can grab information. Any information, even things that you have set privately, can be accessed one way or another.

Copyrights in the Philippines

last for a lifetime (of the author) plus 50 years/

malware

malicious threats

Internet threats

malware spam phishing

Netiquette

the correct or acceptable way of communicating on the Internet. correct social conduct

Rogue security software (ex of trojan)

tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.

spam

unwanted email mostly from bots or advertisers. It can be used to send malware.

keyloggers

used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.

types of malware

virus worm trojan spyware adware

Tips to stay safe online

1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read them. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. 4. Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile. D 5. Do not share any of your password with anyone. 6. Avoid logging in to public networks/Wi-Fi. Browsing in "incognito" (or private) mode, a feature of the browser, will not protect you from hackers. 7. Do not talk to strangers whether online or face-to-face. 8.Never post anything about a future vacation. It is similar to posting, "Rob my hose at this date." 9. Add friends you know in real life and refrain from adding strangers. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your compute. USe only one anti- virus software to avoid conflicts. 12. If you have Wi-Fi at home, make it a private network by creating a password. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads (torrents) as the download is most likely not monitored by the site owner. 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious emails

think before you click, things to consider before posting

1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? Once you post something on the web, you have no control of who can see your posts. 2. Your friends depend on you to protect their reputation online. Talk to your friends about this serious responsibility. 3. Set your post to "private." In this way, search engines will not be able to scan that post. 4. Avoid using names. Names are easy for search engines to scan. 5. If you feel that a post can affect you or other's reputation, ask the one W posted it to take it down or report it as inappropriate.

Netiquette rules

1. Make Real People a Priority 2. Use respectful language 3. Share with discretion 4. Don't exclude others 5. Choose friends wisely 6. Respect people's privacy 7. Fact check before reposting 8. Don't spam 9. Responds to emails and texts promptly 10. Update online information

tips to avoid copyright

1. understand 2. be responsible 3. be creative 4. know the law

What is the internet

A powerful tool, one of the most dangerous places

Be creative

Ask yourself whether what you are making is something that came from you or something made from somebody else's creativity. It is important to add your own creative genius in everything that will be credited to you.

Information that you shouldn't be share on the internet

First name Last name Middle name Current and previous school(s) Cell phone number names of your mother and father names of your siblings address home phone number birthday

understand

Copyright protects literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and sculptures, but it generally does NOT protect underlying ideas and facts. This means that you can express something using your own words, but you should give credit to the source.

names of your siblings

Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.

address

Hopefully, you answered "no to this one. Giving the Internet your number is one thing: giving them your address is a whole other level. It would be much easier for criminals to find you.

Last name

If sharing your first name is a small risk, having both first and last is more risky. You will be vulnerable to searched for using search engines, which include image search. Matching a name with a face is a modus to several crimes like identity theft.

what is intellectual property or copyright law

If you create something-an idea, an invention, a form of literary work. or a research, you have the right as to how it should be used by others.

How can internet be used?

It can be used to promote businesses, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between.

phishing

Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.

birthday

Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.

current and previous school(s)

Most people who steal identities study their subject. They can use this information for verification purposes.

Protecting reputations online

Once you post something on the Internet, search engines keep them in their archives for search results. This makes anything you post to last forever even if you delete it in your page.

names of your mother and father

Risky yet not as risky as posting their full names, especially your mother's maiden name. In fact, you may have already encountered many websites that require your mother maiden name as an answer to a secret question whenever you lose your password.

Middle name

Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.

first name

There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise, you cannot walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.

home phone number

This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your parents or pretends to be you.

cell phone number

Your cell phone number should never be posted on the Internet. The Internet is a public place. It is the same as posting your number on a billboard. You would not wan random strangers to text or call you, or worse, pretend that they are someone else.

trojan

a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

virus

a malicious software program loaded into a user's computer without the user's knowledge and performs malicious actions and can be transferred from one computer to another through the Internet and local networks or data storage like flash drives.

Pharming

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

adware

a program designed to send you advertisements, mostly as pop- ups.

spyware

a program that runs in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently dong and typing through keylogging.

worm

a stand-alone malicious programs that can self-replicate and propagate via computer networks without human help. An example is the ILOVEYOU worm (Love Bug Worm) created by a Filipino.

fair use

an intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education


Conjuntos de estudio relacionados

5.3 The reasons why English colonists had the strongest influence on the language, political institutions, and political principles of the country that became the United States of America

View Set

Peds - Ch. 46: Alteration in Cellular Regulation, Hematologic/Neoplastic Disorder

View Set

Module 12: the meaning and calculation of unemployment

View Set

Principle of Biology II Chapter 24 and 26

View Set

AWS Cloud Practitioner Ultimate Guide

View Set