0% found this document useful (0 votes)
36 views15 pages

Rules of Netiquette

The document provides tips for internet safety and outlines common internet threats. It discusses rules of netiquette, such as treating others well and avoiding spamming. It also explains different types of malware like viruses, worms, and trojans that can steal user information. Additional threats mentioned are spam, phishing, and pharming scams that try to acquire personal details. The document advises verifying website authenticity to help avoid security risks online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views15 pages

Rules of Netiquette

The document provides tips for internet safety and outlines common internet threats. It discusses rules of netiquette, such as treating others well and avoiding spamming. It also explains different types of malware like viruses, worms, and trojans that can steal user information. Additional threats mentioned are spam, phishing, and pharming scams that try to acquire personal details. The document advises verifying website authenticity to help avoid security risks online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Rules of Netiquette

Empowerment Technologies
10 Best Rules of Netiquette

1. The Golden Rule (treat others as you would like to be treated)


2. No Flaming (Flame is a personal insult communicated through the internet)
3. Don’t type in all CAPS (people may misinterpret)
4. Don’t SPAM (it is any unsolicited e-mail from unknown sources)
5. Don’t talk with people you do not know (do not arrange to meet anyone you
meet online)
6. Obey Copyright Laws (Don’t steal someone else’s idea, property and rights)
7. Use proper Grammar and Spelling (errors diminishes the credibility of the
message)
8. Be Honest/Be Yourself (tell the truth, do not pretend to be someone else)
9. Follow the TOS (TOS – Term of Service) (Rules and Policy of the sites)
10.SHOP SECURE SITES (these are sites with transport layer security) (TLS or
SLS Socket Layer Security)
The Internet is defined as the information superhighway. This means that
anyone has access to this highway, can place information, and can grab that
information. Any information, even things that have set privately, can be
accessed one way or another. This is why social networking sites like Facebook
continue to improve their security features. The threat of cybercrime is very real.
While you may not experience the threat now, whatever information we share
today could affect our future.
Tips to Stay Safe Online

The Internet is a public place and it is up to you to protect yourself. Here are
some tips to help you stay safe when using the Internet.
1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website
handles the information you share.
4. Know the security features of the social networking site you use. By keeping
your profile private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private)
mode,” a feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar to posting, “Rob my
house at this date.”
Tips to Stay Safe Online

9. Add friends you know in real life.


10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer. Use only one
anti-virus software to avoid conflict.
12. If you have a Wi-Fi at home, make it a private network by adding a
password.
13. Avoid downloading anything from untrusted websites. You are most
vulnerable in peer-to-peer downloads (torrents) as the download is most likely
not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.
Internet Threats

Here are some of the threats you should be aware of when using the Internet:

1) Malware - stands for malicious software. It is a set of instruction that run on


your computer and make your system do something than an attacker wants to.
What is it good for?
• Steal personal information
• Delete files
• Click fraud
• Steal software serial numbers
• Use your computer as relay
KINDS OF MALWARE

a) Virus. A malicious program designed to replicate itself and transfer from one
computer to another either through the Internet and local networks or data
storage like flash drives and CDs.

b) Worm. A malicious program that transfers from one computer to another by


any type of means. Often, it uses a computer network to spread itself. For
example, the ILOVEYOU worm (Love Bug Worm) created by a Filipino.

c) Trojan. A malicious program that is disguised as a useful program but once


downloaded or installed, leaves your PC unprotected and allow hackers to get
your information.
*Rogue security software – tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in reality, they
are not protected at all.
VIRUS vs WORM vs TROJAN

FEATURES VIRUS WORM TROJAN


A worm is a
malware program
like a virus that A Trojan is a type
Viruses are
doesn't interact of malware that
computer
with other system steals sensitive
programs that
applications but data from a user's
DEFINITION connect to other
instead multiplies system and
software or
and executes delivers it to a
programs to harm
itself to slow different location
the system
down and harm on the network.
the system's
performance.
VIRUS vs WORM vs TROJAN

FEATURES VIRUS WORM TROJAN

It also replicates It doesn't


REPLICATION It replicates itself.
itself. replicate itself.

It replicates itself
without human
It is downloaded
action and
EXECUTION It relies on the as software and
utilizes a network
transfer. executed.
to embed itself in
other systems.
VIRUS vs WORM vs TROJAN

FEATURES VIRUS WORM TROJAN

Trojan runs as a
Viruses spread Worms take
program and is
INFECTION through advantage of
interpreted as
executable files. system flaws.
utility software.

In addition, the
Worms spread at spread rate of
RATE OF Viruses spread at a quicker rate Trojan is slower
SPREADING a moderate rate. than viruses and than that of
trojan. viruses and
worms.
VIRUS vs WORM vs TROJAN

FEATURES VIRUS WORM TROJAN


It may be utilized
It is primarily These are utilized
to steal user data
utilized to modify to excessive using
PURPOSE to obtain access
or erase system system resources
to the user's
data. and slow it down.
computer system.
KINDS OF MALWARE

d) Spyware. A program that runs in the background without you knowing it


(thus called “spy”). It has the ability to monitor what you are currently doing
and typing through keylogging.
*Keyloggers – used to record keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record email,
messages, or any information you type using your keyboard.

e) Adware. A program designed to send you advertisements, mostly as pop-ups.


Internet Threats

2) Spam - unwanted email mostly from bots or advertisers. It can be used to send
malware.

3) Phishing – its goal is to acquire sensitive personal information like passwords


and credit card details. This is done by sending you an email that will direct the
user to visit a website and be asked to update his/her username, password, credit
card, or personal information.
*Pharming – a more complicated way of phishing where it exploits the DNS
(Domain Name Service) system

How to avoid these threats? A very effective way of avoiding these threats is
verifying the authenticity and credibility of the WEB source.

You might also like