0% found this document useful (0 votes)
7 views4 pages

Etech Script

The document discusses the importance of online safety and the various threats individuals face in the digital environment, such as phishing, malware, and cyberbullying. It emphasizes the need for protective measures like securing personal information, using strong passwords, and being cautious with links in emails. The presentation concludes with a reminder to think before clicking and highlights the significance of maintaining a positive online reputation.

Uploaded by

cyrillejoice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Etech Script

The document discusses the importance of online safety and the various threats individuals face in the digital environment, such as phishing, malware, and cyberbullying. It emphasizes the need for protective measures like securing personal information, using strong passwords, and being cautious with links in emails. The presentation concludes with a reminder to think before clicking and highlights the significance of maintaining a positive online reputation.

Uploaded by

cyrillejoice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

shlla - Your identity is valuable.

Are you doing everything you can to protect


it?
cy-Definitely, yes! Like any other crucial ownership, your identity is a
valuable asset that must be protected
jonas- Your online reputation is important. Are you protecting it?
renalyn- of course! your online reputation is more important than ever.
Every post, comment, and photo you share can have lasting consequences.
Cy; Online security and safety are essential in today's digital environment. Our presentation
explores important practices and safety measures to protect your online experience. What is
online safety? -Online safety means taking steps to protect yourself and your information while
using the internet.
-There are crimes that can be committed online. Now, what are those? 1.stalking-This can
include sending harassing messages, monitoring online activity, or even tracking someone's
location. 2. Identity theft- 3.online harassment-.. other than that, we also have the online threats.
There are also numerous kind of online threats.
Jonas: first, PHISHING: Phishing is a type of cybercrime where attackers
use deceptive methods to obtain sensitive information from individuals.
Example:maaaring magpadala ang isang attacker ng isang email na
nagpapanggap na mula sa isang lehitimong organisasyon, tulad ng isang
bangko o isang social media platforms.
Second, PHARMING- Pharming is a type of cyber-attack that aims to
redirect users to manipulate their computer systems to collect sensitive
information.

Third,INTERNET SCAMS: Internet scams are a significant concern in the


digital age, as fraudsters leverage the anonymity and broad reach of the
internet to target numerous individuals simultaneously.
Example:maaaring magpadala ang isang scammer ng isang email na
nagpapanggap na mula sa isang lehitimong organisasyon, tulad ng isang
bangko o isang social media platforms

Renalyn: fourth, INTERNET BOTS A network of zombie computers that


have been taken over by a robot or bot that performs large-scale malicious
acts for the creator of the botnet. Captcha technology is used to avoid this
type of security threat.
Fifth,MALWARE
A generic term for spyware and adware. It is a malicious software disguised
as real software often secretly installed, intended to transfer and gather
private information, like passwords, without the user's permission.

two types of malware


first, we have Adware - Adware (short for advertising- supported software)
is a type of malware that automatically delivers advertisements.
Examples: Banner Ads & Pop-up Ads
Second,Spyware - A type of malware that functions by spying on user
activity without their knowledge. These spying capabilities can include
activity monitoring, collecting keystrokes, data harvesting (account
information, logins, financial data), and more.
Example: Keylogger

Sixth, VIRUS&WORM
Virus: Virus is a program designed to replicate by attaching itself into other
computer programs, data files, or the boot sector of the hard drive.

Worm: Worm is can be injected into a network by any types of means, like a
USB stick or an email attachment.

Trojan Horse and Iloveyou Virus is part of Virus&Worm

Trojan Horse Commonly known as a "Trojan," is a type of malware that


disguises itself as a normal file or program to trick users into downloading
and installing malware.
Iloveyou Virus. Also known as Love bug or love letter. A computer worm
attached on email that have infected 10 million of windows personal
computer that cause computer shutdown and deletion of files on the year

Shiella: seventh, COMPUTER BUG — A malfunction on a computer system


through its runtime. The term "bug" originated to the Moth found on the
Mark II by Grace Hopper that cause a system malfunction. Computer can
cause a lot of Games, Application, and Program.
Bugs can be caused by errors that occur during the software development
process, such as when the software is being designed, coded, or tested.
Examples:
Crashes—When a program stops working as expected and shuts down
Typos—A small coding error, such as a misplaced letter or number, that can
change a program's intended functions.
Error messages—Unexplained error messages that don't significantly affect
usage

8th, CYBERSTALKING — The use of the internet or other electronic device to


harass or talk individual, group or organization. It may include false
accusations, defamation, slander and libel. It may also include monitoring,
identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail.
Examples:
Tracking— Monitoring a victim's online activity or
physical location
Threats— Making death threats or other threats of violence
Blackmail— Using personal information or photos to blackmail a victim
9th,CYBERBULLYING — Is the use of technology to harass, threaten,
embarrass, or target another person. Cyberbullying is bullying that takes
place over digital devices like cell phones, computers, and tablets. This
includes sending, posting, or sharing negative, harmful, false, or mean
content about someone else.
Examples:
—Posting rumors on social media.
—Sharing embarrassing pictures or videos online.
—Sharing someone else's private information online (doxing)
—Making threats against someone online.

Cyrille;Tenth, Spam - refers to unwanted electronic messages, often sent in


bulk. Spam can be in the form of emails, text messages, or social media
messages. Spammers often use deceptive or misleading tactics to get
recipients to click on links or open attachments that may contain viruses,
malware, or phishing attempts. To avoid spam, use a spam filter, be
cautious when opening emails or messages from unknown senders, and
don't click on links or attachments in unwanted emails.
Eleventh, Spoofing is a type of online deception where someone pretends
to be someone else online in order to gain access to sensitive information or
perform malicious activities.
There are several types of spoofing, including:
• Email spoofing: Sending emails that appear to be from a legitimate
source, such as a bank or government agency, to trick recipients into
revealing personal information.
• Website spoofing: Creating a fake website that looks similar to a
legitimate website to trick users into entering their login credentials or
other sensitive information.
Cyrille; Here are some online safety measures you can take to protect
yourself and your information
Jonas; Protect Personal Info
Never share sensitive data online unless the website is secure and
reputable
Renalyn; Secure Your Accounts
Regularly review privacy settings and use strong, unique passwords
Shlla; Be Wary of Links
Never click links in suspicious emails and avoid accessing accounts
through email links
Cyrille; just a reminder, think before you click!

I’m Cyrille joyce cortez,I’m Renalyn tamayo,I’m Shlla agbuya,And I’m Jonas
nabong
All; WE ARE THE GROUP 2 REPORTERS, THANK YOU FOR LISTENING!

QUIZ #2:
IDENTIFICATION
1. The act of tormenting, threatening, harassing or embarrassing another person
using the internet or other technologies -CYBERBULLYING
2. is can be injected into a network by any types of means, like a USB stick or an
email attachment -Worm
3. A generic term for spyware and adware. It is a malicious software disguised as
real software often secretly installed, intended to transfer and gather private
information, like passwords, without the user's permission. -MALWARE
4. An email sent from an Internet criminal disguised as an email from a legitimate,
trustworthy source. -PHISHING
5. An act performed by a knowledgeable computer user sometimes referred to as
hacker that illegally browses or steal someone's information. -ONLINE THREATS

T or F
1. Spyware is a type of malware that functions by spying on user activity
without their knowledge - TRUE
2. The term "BUG" originated to the moth found on the mark || by Grace Hopper
that cause a system malfunction – TRUE
3. Pharming is a malicious website that resembles a legitimate website, used to
gather usernames passwords - TRUE
4. Internet scam is a type of scam that misleads that user in many ways
attempting to take lead of them -TRUE
5. Internet bots is a network of zombie computers that have been taken over by
a robot- TRUE
6. Adware is short for advertising- supported software – TRUE
7. Iloveyou Virus is also known as Love bug or love letter – TRUE
8. Online safety is an act performed by a hacker that illegally browses or steal
someone’s information. - FALSE
9. Spam is embarrassing another person using the internet or other
technologies. – FALSE
10.Virus is the use of the internet or other electronic device to harass or stalk
individual, group or organization. -FALSE

You might also like