Bato Institute of Science And Technology, Inc.
Dolho, Bato, Letyte
EMPOWERMENT TECHNOLOGIES
Name: ______________________________________________
MODULE 2-3: Online Safety and Username
A username is an alias that represents your online
Security presence. It can be your real name or
combinations that totally depend on your
INTRODUCTION creativity. Some apps and websites address you by
The Internet has become a part of our daily lives. your username instead of your full name. In many
The technology has become so advanced that the cases, your username, along with your password
average person can now access vast amounts of are all that is needed to log in to your account.
information and communicate with people from all What’s the risk?
over the world using devices that can fit in his In the Internet, your username is as good as your
pocket. In what is called the Information Age, the actual name. Therefore, anyone who knows it
Internet has become not only a privilege but also a can start looking for you or sometimes even
necessity for many people. contact you.
What can I do?
INFORMATION SECURITY Like your real name, do not readily give out your
We usually need to submit some personal username, especially with people that you don’t
information in order to gain access to online sites trust. As a precaution, you can select usernames
and services. These personal details are often that do not include your real name.
required to secure our online activities and
transactions. However, in the wrong hands, our Password
personal information can be used to cause The password is one of the most important bits of
inconvenience, loss or even harm to us and other information in the Internet. Basically, it is a group of
people. Here are some of the most commonly characters that, when paired with your username
shared personal details, how they can be used in or email address, can unlock your user account.
dishonest and malicious ways and what you can For this reason, website and app owners have
do to secure them. many ways to keep your password secure.
What’s the risk?
Full Name For obvious reasons, hackers take special interest
Almost every app and website with a log-in feature in people’s passwords. People tend to use similar
require your full name. Most of the time, they just if not identical passwords for their online
ask for it to determine how to properly address you accounts so figuring out the password to one
in emails and personal messages. Some sites, like account may also compromise the others
Facebook, use it to label your account and online What can I do?
interactions. There are several steps that you can do to keep
What’s the risk? your passwords secure:
Your name is probably the most widely known 1. Do not share your password with ANYONE.
detail about you but it can still be used in the 2. Memorize your password. Do not write it
simplest forms of identity theft. Anyone can use down anywhere.
your full name to sign up and create a fake 3. Do not use obvious passwords like
account. This account can then be used in ways important dates or names of you or your
that may put you in trouble like posting malicious loved ones.
content or leaving rude comments. 4. Use combinations of uppercase letters,
What can I do? lowercase letters, numbers and special
Just like in the real world, you should always be characters. Some websites require this but
careful of whom you tell your name to. In online, it’s a good practice to do so even if it’s not.
you can refrain from using your full name Tip: To prevent yourself from forgetting your
especially in apps and sites where they are not password, use phrases that are easy for you
really required. to remember but hard for others to guess like
lines from a song or movies or phrases that where you are. Also, because it is usually
have personal meaning to you. required information in online commerce like
5. Do not use the same passwords for online shopping, your home address can be
different accounts. used in identity theft.
Tip: More specifically, do not use the same What can I do?
passwords for apps that are used for leisure Always check if a website or app requires you to
(Facebook, Instagram) and apps that are submit your address or allow them to
used for financial transactions (PayPal, eBay, automatically track you. If it is required, then
online banking) check the settings if you can hide your address
6. Change your passwords periodically and current location from other users. If it is not
7. Do not save your password when using required, then don’t submit it at all.
public computers or other people’s device
Tip: Web browsers commonly give you the Phone Numbers
option to save your password when you first Phone numbers are usually required by many online
log in to some websites. This feature may be services in order to have a direct line to their clients.
convenient when using your own computer What’s the risk?
or mobile device but it can be dangerous if Home phone and mobile numbers should not be
you accidentally save your password in shared carelessly since anyone who has your
someone else’s computer or device phone number has a direct way to harass,
especially if it is in a public place like a library threaten, or inconvenience you.
or a computer shop. What can I do?
Because of the sensitivity of this information, very
Birth Date few apps and websites insist on getting your
Birth dates are mostly required to determine if you phone number. Do not submit your phone
are old enough to access certain contents and number unless it is absolutely necessary.
features in the Internet. Sometimes, it is also used in
security checks to determine if it is indeed the Email Address
rightful owner who is accessing the account since Almost every website that has a sign-up feature
birth dates are not usually widely known. requires an email address to confirm the user’s
What’s the risk? identity.
The birth date, along with other personal details What’s the risk?
can be used to pass security checks and hack Like phone numbers, your email address is a
personal accounts. direct link to you. The practicality and versatility
What can I do? of emails make it the most used and abused
For your own protection, observe the age method of communication in the Internet. The
restrictions of online content. Websites are most common forms of Internet fraud such as
required by law to add warnings to age-sensitive spamming and phishing (to be discussed later in
content but it is still up to the users to choose this chapter) are done through emails.
whether or not to view them What can I do?
You can create multiple email addresses. You
Home Address and Locations can have dedicated email address for leisure
Some online services ask for users’ home address. purposes like online gaming and social media.
Some apps can automatically determine your This email can then be shared and used to sign
current location using your device’s GPS (Global up to apps and websites. On the other hand, you
Positioning System) feature. They do this in order to can create another one for formal use like job
give you location-specific contents and options. applications and schoolwork.
For example, YouTube determines the user’s
location and suggests videos that are relevant to Financial information
that area. This includes bank account names, account
What’s the risk? numbers, credit card numbers and security details
Carelessly sharing your location or home address like pin codes and answers to security questions.
can ultimately compromise your physical These details, especially the credit card number,
security because it will tell potential criminals are used in online commerce.
What’s the risk? the worst cases, a virus can overload servers
These details can be used to access your and cause entire networks to shut down.
financial accounts. Therefore, anyone who has How do they spread?
this information can spend or take the contents A computer virus can spread whenever a
of your bank account or make purchases that computer makes contact with another
will be charged to you. computer. It can spread in a network like LAN
What can I do? or the Internet or through indirect means like
Treat this information with the same care as you infecting a flash drive or a DVD. Keep in mind
do with your money because they are as that a virus relies on human action to spread.
valuable as your money. Don’t do online It is, therefore, possible to have a virus in your
financial transactions with suspicious looking computer and still be uninfected unless your
websites and merchants. Do a background open the file or program that it is attached
check to make sure that the person or website to.
that you are dealing with is legitimate. 2. Worms
A worm is considered as a type of virus. Like
ONLINE THREATS a virus, it can make copies of itself in
Online threat is deemed any malicious act that computers that it comes in contact with.
attempts to gain access to a computer network What can they do?
without authorization or permission from the Like a virus, a worm can harm your system in
owners. These are usually done by computer different ways which can range from minor
hackers who uses the World Wide Web to facilitate annoyances like hiding your icons or major
cybercrime. Web threats use multiple types of damage like destroying your files or causing
malware and fraud, all of which utilize HTTP or HTTPS your computer to shut down on its own.
protocols, but may also employ other protocols How do they spread?
and components, such as links in email or Instant The main difference between viruses and
Messaging apps, or any malware attachments on worms is that worms don’t rely on human
servers that access the Web. They benefit action to propagate. A worm will
cybercriminals by stealing information for automatically spread and copy itself.
subsequent sale and help absorb infected PCs into 3. Trojan
botnets. Web threats pose a broad range of risks, A Trojan horse or simply a Trojan is a type of
including financial damages, identity theft, loss of malware that disguises itself as a useful
confidential information/data, theft of network and/or harmless program or file. Named after
resources, damaged brand/personal reputation, the fictional wooden horse used by the
and erosion of consumer confidence in e- Greeks to defeat Troy, a Trojan’s goal is to get
commerce and online banking. The following are through your computer’s security features
the top kinds of online threats that you should be and cause harm once it’s in.
aware of: What can they do?
1. Virus Like a virus, a Trojan can damage your
A virus is a program designed to interfere with computer or system in different ways, which
your computer, device or network's normal include but are not limited to deleting,
operation. A virus attaches itself in a program copying and altering files. It can also cause
or a file and like real-life viruses, computer harm slowing down system performance.
viruses can multiply or make complete How do they spread?
copies of themselves when you copy the Unlike worms, Trojans cannot create copies
program or file that it is attached to. of themselves. Instead, they pose as harmless
What can they do? files or programs such as pictures or videos
Because a virus is a program, it can be and rely on people to send, copy, and
programmed to do different sorts of harm to download them.
your system. It can slow down your device or 4. Spam
computer or network’s speed by running A spam is an unwanted and unsolicited
unwanted processes or it can fill your message/email.
computer’s memory with unwanted files. In What can they do?
Spam emails are usually just promotions to card details for purchasing items, which will
sites and services. Though not normally then be charged to the real account holder.
harmful, large amounts or spam emails are How do they spread?
annoying and can use up your memory Phishing is done by tricking people into
space. It is not uncommon to have hundreds submitting their personal details. It can be
or even thousands of spam in your email done by sending emails and offers that
address. In the worst of cases, viruses can also imitate legitimate businesses like banks and
be attached to spam emails. credible websites.
How do they spread? 9. Pharming
People who spread spam or Spammers Pharming happens when a hacker (or
collect emails using several methods. The “pharmer”) directs an internet user to a fake
easiest way is to simply guess email addresses website instead of a legitimate one. These
though this process can be automated using “spoofed” sites can capture a victim’s
programs. They can use programs that confidential information, including
search web pages for email addresses or by usernames, passwords, and credit card data,
hacking mailing lists. It is also known that or install malware on their computer.
some dishonest website owners sell list of their Pharmers usually focus on websites in the
subscribers’ emails to spammers. financial sector, including banks, online
5. Adware payment platforms, or other e-commerce
An adware is a type of malware that destinations.
launches unwanted advertisements in your 10. Internet Scam
Internet browser or desktop. Example, pop- Generally refers to someone using internet
up ads and banner ads. services or software to defraud or take
What can they do? advantage of victims, typically for financial
Other than being majorly bothersome, gain. Cybercriminals may contact potential
adware programs can cause your system to victims through personal or work email
slow down because they initialize accounts, social networking sites, dating
automatically and remain running in the apps, or other methods in attempts to obtain
background. financial or other valuable personal
How do they spread? information. Online scams may come in
Adware is usually included in the installers of various forms such as lottery scam, charity
other programs or browser add-ons. Installing fraud scams, job offer scams, and online
these programs and add-ons will also cause dating scams to name a few.
the adware to be installed. 11. Internet robots
6. Spyware Internet robots are also known as spiders,
It is malware that secretly observes the crawlers, and web bots. It is a software
computer user’s activities without permission application that is programmed to do certain
and reports it to the software’s author. tasks. Bots are automated, which means they
Example is a key logger. run according to their instructions without a
7. Ransomware human user. Some bots are useful, such as
It is a form of malware that locks you out of search engine bots that index content for
your device and/or encrypts your files, then search or customer service bots that help
forces you to pay a ransom to get them users. Other bots are "bad" and are
back. programmed to break into user accounts,
8. Phishing scan the web for contact information for
Derived from the word “fishing”, phishing is sending spam, or perform other malicious
the fraudulent practice of stealing important activities. If it's connected to the Internet, a
information from users such as passwords, pin bot will have an associated IP address.
codes and credit card numbers.
What can they do? Cyberstalking refers to the use of the internet or
Information stolen via phishing can be used other electronic device to harass or stalk individuals
in identity theft and stealing money. For or organizations.
example, someone can use stolen credit
Cyberbullying refers to the act of tormenting, program will be installed. There is usually an option
harassing, or embarrassing another person using to leave out the freebies and install only the main
the internet program.
7. Do not download pirated contents
Spoofing happens when someone or something Because pirated files and software are
pretends to be something else to gain our unregulated, they tend to be a breeding ground
confidence, get access to our systems, steal data, for malware. Also, piracy is against the law. (To be
steal money, or spread malware. discussed in the next chapter)
8. Install an ad-blocker
HOW TO AVOID MALWARE Ad-blockers are browser add-ons that prevent ads
The risk of falling victim to malware will always be from being displayed in your browser. Most ad-
present as long as mankind uses interconnected blockers are free
digital devices. However, there are precautions
that can be taken to minimize this risk. TEST YOUR UNDERSTANDING
1. Install an anti-virus program 1. From all you have learned in module 2 -3,
An anti-virus program can detect and delete virus create a REFLECTION PAPER answering the
in your computer. It can also block malware before following:
they infect your system. Many trusted anti-virus Why is it necessary to “think before
companies give out free versions of their products. you click?”
Try them and find one that suits your needs. How to prevent from online threats?
2. Do not submit your email address to suspicious
looking websites
You don’t have to sign up every time you are asked Note: Avoid copying your answer using google
to. To avoid getting spam, weigh the benefits of search. I will not accept your answer if found out
signing up against the risk of compromising your plagiarized. Go to your google classroom account
email address. and submit your output there.
3. Don’t fall for obvious tricks
Fake prizes are probably the bread and butter of Reference
online scams. When you receive an email or see a Quiambao, Angelito. (2018, Jul. 23). Online safety,
pop-up that says you’ve won something, you can security, ethics, and etiquette. Retrieved from
almost always be sure that it’s not true. As a rule, do https://www.slideshare.net/AngelitoQuiambao/on
not believe anyone who tells you that you won a line-safety-security-ethics-amp-etiquette.
prize for a contest that you didn’t join. Retrieved on May 22, 2020.
4. Don’t open spam emails Belcic, Ivan. (2019, Nov. 7). What is pharming and
Spam emails are normally obvious. Delete these how to protect against attacks. Retrieved from
emails immediately and block the sender. https://www.avg.com/en/signal/what-is-
5. Do not click suspicious looking links pharming. Retrieved on May 22, 2020.
If you see a link that promises a prize or offers
something that is too good to be true, like a free
iPad or ways to get free Internet access, it may Prepared by:
direct you to a website that has malware. As a rule,
do not trust any ad or message that says you’ve Mary Jane Pagay - Cierva
won something in a contest that you did not join. Instructor
6. Read before you install.
Sometimes even legitimate and useful programs
come with unwanted “freebies”. These so called
freebies are often small programs that may alter
your computer’s settings or automatically subscribe
you to unwanted services and newsletters. Read
through the installation steps to see if another