SlideShare una empresa de Scribd logo
1 de 21
ONLINE SAFETY, SECURITY, AND
ETHICS
ONLINE SAFETY AND SECURITY
The internet is a powerful tool for
learning and communicating
with people. However, there are
many dangers that you must
watch out for.
DANGERS ON THE INTERNET
Email Spam
Also known as junk email, it is
usually unsolicited commercial email
sent from one source with identical
message sent to multiple recipients.
Dangerous spams carry virus like
Trojan horse and other malicious
software (malware).
Spammer is the term used to refer to a person who creates
electronic spam.
Spamming is projected to continue because it is a cheap means of
advertising. In addition, many countries do not Have laws to punish
spammers.
Email Spoofing
This refers to the deceitful email
practice in which the sender address
is changed, so that it would appear
to have come from a different
source usually someone you know.
Usually, the reply to address is the source of the email,
and when you unknowingly reply to it you would be
replying to the one who spoofed you.
Email Spoofing is usually used by spammers to hide the
origin of the spam.
Phishing
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and credit
card details by making it appear as if
it comes from a trustworthy source.
Phishing is usually done by email or
other similar means using a popular
entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure
you to their website.
Internet users would think that they are
accessing a genuine website and through
this way, a phisher would be able to
gather sensitive information from the
internet account user.
Pharming
This is a dangerous hacker attack on
a website which directs all traffic to
that website to another fictitious
website. The main object of
pharming is to obtain username and
passwords, as well as credit card and
financial information, and use these
to steal their money electronically or
use the credit card of the victims.
Pharming is a major concern of
many online banking and
electronic commerce
transactions, which would
compromise many of their client
accounts as well as the business.
Antivirus and
anti-spyware
software cannot
prevent and
protect one from
pharming.
Spyware
This is a computer program
that is installed covertly on a
personal computer to collect
information or even take
control over the computer
without the knowledge of the
user.
A spyware program
would be able to
monitor and collect
information about the
user.
Computer Worm
This is a dangerous computer
program that replicates itself through
a network. Some worms delete files,
others disrupt the network and still,
others send junk mail from infected
computer.
Computer worm usually
spreads by exploiting
weaknesses in operating
system, and manufacturers of
this software regularly send
free updates to clients to
prevent the spread of the
worms.
Users should not run
attachments or open emails
from unknown or suspicious
sources, delete them
immediately.
Trojan Horse
This is a form of a malicious software
(malware) fronting to perform a good task,
but covertly performs undesirable function
with the intention of entering the computer
without the user’s consent.
Once the malware is installed in the
computer, the Trojan horse can disable the
computer’s defenses opening it to
unauthorized entry.
It can erase data, can allow access of the
victim’s computer, can corrupt files, and can
be used in Phishing for bank accounts.
Computer Virus
This is a program that duplicates itself
and then infects the computer. It
spreads like a real biological virus,
wherein it attaches itself to host a
program and infect other computers if
it is received by a computer through
the internet.
The virus can also be transferred by
the use of removable storage media
such as diskette, CD, flash drives,
memory cards, and others.
Damage by the computer virus may
be mild to severe.
Hacker
This is a person who is able to enter
and control other people’s computer
without authorization.
A hacker is able to enter another’s
computer, usually vandalizes the
victim’s website, steals personal
information, obtains intellectual
property, and performs credit card
fraud.
Firewalls are able to prevent entry by
hackers.
What are the Dangers on the Internet?
Email Spam
Email Spoofing
Phishing
Pharming
Spyware
Computer worm
Trojan Horse
Computer Virus
Hacker
Get ¼ sheet of paper
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the user’s consent.
5. This is a person who is able to enter and
control other people’s computer without
authorization.
Answer
1. Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to multiple
recipients.
-----Email Spam
2. This is a program that duplicates itself and
then infects the computer. It spreads like a real
biological virus, wherein it attaches itself to
host a program and infect other computers if it
is received by a computer through the internet.
------Computer virus
3. This is a deceitful practice of trying to get
confidential information such as passwords
and usernames, and credit card details by
making it appear as if it comes from a
trustworthy source.
----Phishing
4. This is a form of a malicious software
(malware) fronting to perform a good task, but
covertly performs undesirable function with
the intention of entering the computer without
the user’s consent.
--- Trojan Horse
5. This is a person who is able to enter and
control other people’s computer without
authorization.
--- Hacker
Research about the
Commandments for
Computer Ethics
Home Activity

Más contenido relacionado

La actualidad más candente

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

La actualidad más candente (20)

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Destacado

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLea Rodriguez
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 

Destacado (6)

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 

Similar a Online safety, security, and ethics

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the InternetTseAnRS
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 

Similar a Online safety, security, and ethics (20)

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 

Último

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Último (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Online safety, security, and ethics

  • 2. ONLINE SAFETY AND SECURITY The internet is a powerful tool for learning and communicating with people. However, there are many dangers that you must watch out for.
  • 3. DANGERS ON THE INTERNET Email Spam Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. Dangerous spams carry virus like Trojan horse and other malicious software (malware). Spammer is the term used to refer to a person who creates electronic spam. Spamming is projected to continue because it is a cheap means of advertising. In addition, many countries do not Have laws to punish spammers.
  • 4. Email Spoofing This refers to the deceitful email practice in which the sender address is changed, so that it would appear to have come from a different source usually someone you know. Usually, the reply to address is the source of the email, and when you unknowingly reply to it you would be replying to the one who spoofed you. Email Spoofing is usually used by spammers to hide the origin of the spam.
  • 5. Phishing This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions to lure you to their website. Internet users would think that they are accessing a genuine website and through this way, a phisher would be able to gather sensitive information from the internet account user.
  • 6. Pharming This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. The main object of pharming is to obtain username and passwords, as well as credit card and financial information, and use these to steal their money electronically or use the credit card of the victims. Pharming is a major concern of many online banking and electronic commerce transactions, which would compromise many of their client accounts as well as the business. Antivirus and anti-spyware software cannot prevent and protect one from pharming.
  • 7. Spyware This is a computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. A spyware program would be able to monitor and collect information about the user.
  • 8. Computer Worm This is a dangerous computer program that replicates itself through a network. Some worms delete files, others disrupt the network and still, others send junk mail from infected computer. Computer worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software regularly send free updates to clients to prevent the spread of the worms. Users should not run attachments or open emails from unknown or suspicious sources, delete them immediately.
  • 9. Trojan Horse This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. Once the malware is installed in the computer, the Trojan horse can disable the computer’s defenses opening it to unauthorized entry. It can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing for bank accounts.
  • 10. Computer Virus This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. The virus can also be transferred by the use of removable storage media such as diskette, CD, flash drives, memory cards, and others. Damage by the computer virus may be mild to severe.
  • 11. Hacker This is a person who is able to enter and control other people’s computer without authorization. A hacker is able to enter another’s computer, usually vandalizes the victim’s website, steals personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers.
  • 12. What are the Dangers on the Internet? Email Spam Email Spoofing Phishing Pharming Spyware Computer worm Trojan Horse Computer Virus Hacker
  • 13. Get ¼ sheet of paper 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet.
  • 14. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent.
  • 15. 5. This is a person who is able to enter and control other people’s computer without authorization.
  • 16. Answer 1. Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients. -----Email Spam
  • 17. 2. This is a program that duplicates itself and then infects the computer. It spreads like a real biological virus, wherein it attaches itself to host a program and infect other computers if it is received by a computer through the internet. ------Computer virus
  • 18. 3. This is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source. ----Phishing
  • 19. 4. This is a form of a malicious software (malware) fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user’s consent. --- Trojan Horse
  • 20. 5. This is a person who is able to enter and control other people’s computer without authorization. --- Hacker
  • 21. Research about the Commandments for Computer Ethics Home Activity