top of page
Search
Writer's pictureGemma Mangawang

Online Etiquette

Updated: Oct 4, 2018


 
  • Is the knowledge of maximizing the user’s personal safety and security risk to private information, and the self-protection from computer crime in general.

https://www.google.com.ph/search?rlz=1C1EKKP_enPH803PH803&biw=1093&bih=486&tbm=isch&sa=1&ei=Lh62W7DWGory8AXzsJHwBQ&q=e-safety+online&oq=e-safety+online&gs_l=img.3..0.16209.23931.0.24250.20.16.1.2.2.0.376.1732.2-1j4.5.0....0...1c.1.64.img..12.8.1748.0..35i39k1j0i67k1j0i10i24k1.0.VgVa4A5VQvY#imgdii=uWk3s4L0bLFhnM:&imgrc=nYdj0-pX7OT55M:

10 Internet Safety Tips
  1. Know the scams - Learn about the different kinds of scams and what you can do to avoid them.

  2. Think before you click - Think twice, trice and a zillion times before you click any links or buttons.

  3. Safety peruse - These sites may have an address that’s very similar to a legitimate site, but the page can have misspelling, bad grammar or low resolution images.

  4. Shop Safely - Don’t shop on a site it has the “https” and a padlock icon to the left or right of the URL.

  5. Kick-butt passwords -Use an Extremely uncrackable on like “9&4yiw2pyqx”

  6. Protect your info - Keep you guard up. Backup all of your data on your computer, smartphone and tablet, theft or crash.

  7. Watch your Wi-Fi Connectivity - Protect your network by changing your router's settings and make sure that you have the connection password protected.

  8. Install a firewall - A firewall is a gate line of defense against cyber attacks.

  9. Keep up to date - The best security updates automatically protect your computer. Use the manufacturer's latest security patches to make regular updates and make that you have the software set to do routine scans.

  10. Use your noggin- Use you COMMON SENSE while SURFING THE WEB.

10 Rules of Etiquette
  1. The GOLDEN RULE -Treat others the way you want to be treated.

  2. No Flaming - Flame is a personal insult communicated through the internet.

  3. Don't Type in ALL CAPS - Not necessary all the time. The one you are talking to might misinterpret your message.

  4. Don't SPAM - It is any unsolicited e-mail from unknown sources. Use appropriate intensifiers to help convey meaning. -Avoid "flaming" (online "screaming") or sentences typed in all caps. -Use Asterisks surroundin words to indicate italics used for emphasis (*at last*). -Use words in brackets, such as (grin), to show a state of mind -Use common acronyms (e.g., LOL for "laugh out loud")

  5. Don't talk with people you do not know - Do not arrange to meet anyone you meet online. Use appropriate language -Avoid coarse, rough, or rude language. -Observe good grammar and spelling.

  6. Obey Copyright Laws

  7. Use Proper Grammar and Spelling

  8. Be HONEST!

  9. Follow the TOS TOS- Terms of Services Rules and Policy of the Website

  10. SSS (Shop Security Service) - These are websites which is secure from online hackers.

COMPUTER ETHICS
  1. Thou shalt not use a computer to harm other people.

  2. Thou shalt not interfere with other people's computer work.

  3. Thou shalt not snoop around in other people's computer files.

  4. Thou shalt not use a computer to steal.

  5. Thou shalt not use a computer to bear false witness.

  6. Thou shalt not copy or use proprietary software for which you have not paid (without permission)

  7. Thou shalt not use other people's computer resources without authorization or proper compensation.

  8. Thou shalt not appropriate other people's intellectual output.

  9. Thou shalt not think about the social consequences of the program you are writing or the system you are designing.

  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

Internet Threats
  1. Malware stands for malicious software. 5 types of Malware: a. Virus- a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.) b. Worm- a malicious program that transfers from one computer to another by any types of means. Ex. ILOVEYOU Worm c. Trojan- a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. d. Spyware- a program that runs in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently doing and typing through keylogging. e. Adware- a program designed to send you advertisments, mostly as pop-ups.

  2. Spam - an unwanted email mostly from bots or advertisers. It can be used to send malware.

  3. Phishing - an unwanted acquisition of sensitive personal information like passwords and credit card details.

  4. Botnet- group of compromised computer connected to a network ("zombie")

  5. Denial of Service Attacks- disrupts computer access to internet services.


 

Reflection: Now I've learned more about how to become more careful with my accounts.
29 views0 comments

Recent Posts

See All

Komentarze


bottom of page