ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
How would you describe
the features of the app
and platform that help
protect its users from
Internet dangers and
threats?
2
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
What are the
possible ways
that you can
think of to
protect
yourself from
different online
threats?
3
Learning
Objectives
At the end of the
lesson, you should
be able to do the
following:
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT 4
● Define the cyber world and its
features.
● Identify and examine different
online threats and dangers.
● Practice various ways to be safe
in the cyber world.
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Are you familiar with these images? What do these images
mean?
5
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
What is a password?
● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
6
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
1. Study the passwords in the succeeding slides.
2. Classify each password as either a weak password or a
strong password.
3. Write your answer in the table.
Classifying the Password
7
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
1.Among all the words included in the activity,
which password(s) was the hardest to
classify? Which was the easiest?
Classifying the Password
10
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
1.What suggestions can you give to protect
online accounts aside from creating a
strong password?
Classifying the Password
11
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
1.x
2.What would be the effect of not having
strong security and password for your
online accounts?
Classifying the Password
12
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
The Cyber World,
also known as
Cyberspace, is
virtual in nature
and unbounded
unlike our physical
environment.
14
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Hacking
● stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
21
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Identity Theft
● the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
22
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Internet
Predators
● individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
23
23
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Cyberbullying
● an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers
24
24
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Malicious Software
● also known as malware,
is created to invade and
destroy computer
systems
25
27
About the dangers and threats you
may encounter in cyberspace, can
you think of any ways to avoid
these threats?
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Stay Safe Online
How can you safeguard your virtual identity?
28
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
29
1. Think before you click.
2. Do not share personal
information.
3. Beware of phishing and
scam.
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
30
4. Keep your device secure.
5. Never share passwords.
6. Never agree to meet
anyone you just met
online.
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Tips to Stay Safe online
31
7. Tell your guardian if
something goes wrong
online.
8. Cover your webcam when
not in used.
9. Use a strong password.
10.Make sure to logout your
account in public devices.
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Practice 1
Listed on the next slide are
different dangers and threats
on the Internet. Classify the
following items as: unsuitable
content, crime-related, privacy-
related, or malicious software-
related.
32
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT 34
Unsuitable
Content
Crime-Related
Privacy-
Related
Malicious
Software-
Related
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Practice 2
Study the situations on
the next slide. Choose
two (2) situations and
describe what you would
do in each in order to be
safe.
35
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
● A stranger added you on Facebook. He claimed that you are schoolmates. Upon checking his
profile, you saw that you knew that person and that he was a year older than you. He then asked
to meet you and added that you should wear a pretty short dress when the two of you meet.
● Your bank emailed you to reset your password as soon as possible because there was a breach
in their system. The email seemed legit but the link was shortened and the email address was
not the name of your bank.
● You got blocked from your bank account. As you talked to the customer support to unblock your
account, the person on the other line asked for your name, account number, and pin to be able
to unblock you on their system.
● One of your classmates was spreading rumors that you had a bad attitude and that you called
her a liar in front of her friends. She even edited your awkward photo to become funny and
shared it on Facebook. People started calling you funny names in school and online since she
posted the photo.
● An advertisement just popped up on your browser saying that you won a flat screen TV, and you
just need to confirm your identity on the link provided to claim the prize.
36
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
1. What is the cyber
world?
2. What are the main
features of the cyber
world and how can we
use these features?
38
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Answer the following
completely in your own
words:
Give three (3) dangers on
the Internet and explain
how each one can harm
you.
39
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
ENGAGE EXPLORE EXPLAIN EXTEND
EVALUAT
Answer the following
comprehensively:
How useful is the Internet
in your daily life? Does it
always benefit you?
40
Wrap Up
The cyber world allows us to navigate through
a virtual world, interact with other people
through the use of the internet, and retrieve
data from the vast information available
online.
The Internet is very powerful but along with
these advancements, we can encounter risks
such as exposure to unsuitable content,
crime-related dangers, privacy-related
dangers, and malicious software. 41
Wrap Up
Being a generation of technology-dependent
human beings, we need to be more careful on
the internet to avoid risks. We protect
ourselves by simply creating strong passwords,
and by avoiding sharing personal information
with others, especially with strangers.
42
Bibliography
43
“About the Cyber World.” ICT Connection.
https://ictconnection.moe.edu.sg/cyber-wellness/cyber-wellness-101/about-
the-cyber-world (accessed February 21, 2020).
Ericksen, Kristina. “Your Digital Footprint: What Is It and How Can You Manage It?”
Your Digital Footprint: What Is It and How Can You Manage It? | Rasmussen
College, 16 May 2018. https://www.rasmussen.edu/student-
experience/college-life/what-is-digital-footprint/
“Guidelines for Strong Passwords.” Information Technology Services Guidelines
for Strong Passwords Comments.
https://its.lafayette.edu/policies/strongpasswords/ (accessed February 21,
2020).
“How to Stay Safe Online.” Bullying UK.
https://www.bullying.co.uk/cyberbullying/how-to-stay-safe-online/
(accessed February 22, 2020).
Bibliography
44
Kent, Germany. “You Are What You Tweet Quotes by Germany Kent.” Goodreads.
Goodreads. Accessed February 22, 2020.
https://www.goodreads.com/work/quotes/45331179-you-are-what-you-
tweet-harness-the-power-of-twitter-to-create-a-happier
Kim, Seungho, Seo, Seung-a, and Lee, Insook . “Essential Characteristics of
Cyberspace and Analysis of Cyber Educational Institutions”. Accessed
February 21, 2020.
https://pdfs.semanticscholar.org/df41/ccc22e02a53f05613bbcb1ab5ecda71
ef076.pdf
Sowells, Julia. “8 Different Types of Malware.” United States Cybersecurity
Magazine, 3 Aug. 2018. https://www.uscybersecurity.net/malware/
“Staying Safe Online.” Childline. Accessed February 22, 2020.
https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-
mobile-safety/staying-safe-online/
Volkmann, Matthew J. “Internet Dangers.” UIowa Wiki. Accessed February 21,
2020. https://wiki.uiowa.edu/display/edtech/Internet+Dangers
Bibliography
45
“What Is Malware? - Definition and Examples.” Cisco. Cisco, January 8, 2020.
https://www.cisco.com/c/en/us/products/security/advanced-malware-
protection/what-is-malware.html#~related-topics
Notas del editor
note to teacher:
Sample answers:
1. The cyber world, also known as cyberspace, is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other.
2. The main features of the Cyber World are virtual world, interaction, and information source. We can use the virtual world as a “second life space” where we can make a digital representation of ourselves. The interaction feature on the other hand lets us have social interactions such as chatting, sharing ideas on an online community, teaming up with players on an online-game, or finding people with similar interests. Lastly, the cyber world contains a lot of information that is readily available for us making it a major information source.
Students answer may vary.
Answers may vary but you may expect them to apply examples from the discussed lesson.