[Audio] DIGITAL/CYBER LITERACY. Digital/cyber literacy.
[Audio] Objectives Demonstration on the positive use of ICT to facilitate the teaching and learning process.
[Audio] " Technology has been part of everyone's life, be it at home, in school, or anywhere with every facet of our undertaking"..
[Audio] According to Wikipedia, Digital Literacy is the set of competencies required for full participation in society that includes knowledge, skills and behaviors involving the effective use of digital devices for purposes of communication, expression, collaboration and advocacy. - Digital Literacy is an individual's ability to access both information and methods of communication through technological tools, such as smartphones, tablets, laptops and desktop PCs..
[Audio] Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Here are some tips on how to protect yourself against cyber threats: Monitor behavior on social networks. Keep devices safe. Understand how best to use passwords. Handle unsafe content. Consider safety for the future..
[Audio] Citizenship – is an old value that is now applied to a new medium, the Internet. Cyber Citizenship – refers to being responsible when using the internet. Doing online when no one is looking speaks a lot about one's character and morals. The power of this digital world is associated with responsibilities and consequences..
[Audio] Ways on How to be a Good Cyber Citizen; Be careful and critical for whatever you post online that could be visible to the public even if on a "private" page through tagging by a friend. If you have a problem with someone, go to that person or an adult to help work it out, instead of posting your expression online. Use the Internet to help you with your schoolwork, but give credit to the sources you use and critically analyze everything you search online. Use the Internet purposefully to learn more about anything you are interested in, to help you research relevant and needed data or information and to stay connected with friends throughout the world. Make sure you verify an information before you share it or use it in a project and check on accuracy and truth in the information you search on the web..
[Audio] 6. Give out certain information only. 7. Don't answer questions that make you uncomfortable. 8. Always make sure you have told a reliable adult if you decide to meet someone you knew though the internet. 9. Always be aware of copyright laws and give credit to whom an article or a part of it is due. 10. Use only the computers that you are allowed to use. Avoid hacking..
[Audio] Importance of Cyber Citizenship It keeps the Internet free from hurtful statements. It creates a culture of more reliable information. It gives provisions for people to be given credit for what they have created. More criminals or bullies can be caught when kids are honest and talk to adults. It keeps information private..
[Audio] INTERNET SAFETY Internet Safety, Online Safety or Cyber Safety means trying to be safe on the internet. It is maximizing the user's personal safety and security risks to private information and property associated with using the internet, including self-protection from computer crime. As the number of Internet users continues to grow worldwide, issues and concerns also continuously exist. INFORMATION SECURITY Sensitive information, such as personal information, identity and passwords are often associated with personal property and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequences, such as identity and property theft..
[Audio] Common causes of Information Security breaches include: Phishing – It is a common type of scam, of which the scammers disguise as a trustworthy source in an attempt to obtain private information, such as passwords, credit card, information, etc. through the use of fake websites that look identical and legitimate. Internet Scams – These are schemes that deceive the users in various ways in an attempt to take advantage of them. Malware – It is a malicious software (particularly spyware) disguised to collect and transmit private information, such as password without the user's consent or knowledge, of which it is impossible to determine whether a file is infected..
[Audio] Personal Safety and Threats The growth of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication. While it allows communication with others, it is also being grabbed by malicious users for bad intent. Common Threats to Personal Safety: Cyberstalking – It is the use of the internet or other electronic means to stalk or harass an individual, group or organization through false accusations, identity theft, threats, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass. Cyberbullying – It is the use of electronic means, such as instant messaging, social media, e-mail, and other forms of online communication with the intent to abuse, intimidate, or overpower an individual or group..
[Audio] 3. Online Predation – It is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums. The behavior characteristics are categorized into three groups: Manipulative – typically a child molester B) Opportunist – typically a rapist C) Coercive – being a mixture of both rapists and child molester. 4. Obscene/offensive content – Various websites on the internet contain material that may deem offensive, distasteful or explicit, which may often not be of the user's liking. Such content may manifest in many ways, such as pop-up ads and unsuspecting links. 5. Sextortion – It is the use of webcams for flirting and cybersex. Often, this involves a cybercriminal posing as someone else, such as an attractive person initiating communication of a sexual nature with the victim..
[Audio] Computer Threats and Fixing Solutions A threat, in the context of computer security. Refers to anything that has the potential to cause serious harm to a computer system. It is something that may or may not happen, but has the potential to cause serious damage and can lead to attacks on computer systems and networks. Once a computer virus gets into a network, it can spread from computer to computer in multiple ways. Given the numerous ways a computer virus can spread, the following are ways on how to ensure that computer networks can be protected: Install anti-virus software. Ensure that the anti-virus software is up-to-date. Employ a firewall to protect networks..
[Audio] 4. Filter all email traffic. 5. Educate all users to be careful of suspicious e-mails. 6. Scan Internet downloads. 7. Do not run programs of unknown origin. 8. Implement a vulnerability management system. 9. Make regular backups of critical data. 10. Develop an Information Security Policy. 11. Monitor logs and systems. 12. Develop an Incident Response Plan. 13. Restrict end-user access to the systems..
[Audio] Cyberbullying Cyberbullying, cyberharassment or online bullying is a form of bullying or harassment using electronic means usually among minors in a school setting and has become increasingly common, especially among teenagers. It is an aggressive, intentional act or behavior that is carried out by a group or an individual using electronic forms of contact, repeatedly against a victim who cannot easily defend him or herself. Cyberbullies may disclose victims personal data on websites or forum-called doxing, or may use impersonation, and create fake accounts, comments or sites for the purpose of publishing material in their names. This can leave the cyberbully anonymous and difficult to be caught or apprehended for his/her behavior..
[Audio] 2 Types of Cyberbullying Internet trolling – is a common form of bullying over the Internet in an online community to elicit a reaction, disruption or intentionally provoke and offend others. Cyberstalking – is another form of bullying or harassment that uses electronic communication to stalk a victim and pose a credible threat to harass him/her..
[Audio] CYBERCRIME Avast defines cybercrime as any criminal activity carried out using computers or the Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and social engineering to break the law. On the other hand, cybercrime is defined by Techopedia as a crime with the computer as the object of the crime (i.e. hacking, spamming), or is used as a tool to commit an offense (i.e. child pornography, hate crimes). Cybercriminals may use computer technology to access personal and confidential information or use the internet for exploitative or malicious purpose. There is a wide variety of cybercrimes, which can broadly be placed into two categories; one-off crimes, such as installing a virus that steals your personal data; and ongoing crimes, such as cyberbullying, extortion, distributing child pornography or organizing terrorist attacks..