0% found this document useful (0 votes)
33 views15 pages

Ln. 4 - Web Applications and Security

The document discusses various topics related to networking and accessibility options. It covers 11 sessions on topics like working with accessibility options, networking fundamentals, instant messaging, blogging, internet security, and workplace safety. It describes different types of impairments that impact computer usage and how accessibility features in operating systems help users with disabilities. It also defines different types of computer networks like PAN, LAN, MAN, WAN and the internet and web. It provides details on networking concepts, architectures, and advantages of networking.

Uploaded by

farticalapa600
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views15 pages

Ln. 4 - Web Applications and Security

The document discusses various topics related to networking and accessibility options. It covers 11 sessions on topics like working with accessibility options, networking fundamentals, instant messaging, blogging, internet security, and workplace safety. It describes different types of impairments that impact computer usage and how accessibility features in operating systems help users with disabilities. It also defines different types of computer networks like PAN, LAN, MAN, WAN and the internet and web. It provides details on networking concepts, architectures, and advantages of networking.

Uploaded by

farticalapa600
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Ln.

4 - WEB APPLICATIONS AND SECURITY


SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS
SESSION 2: NETWORKING FUNDAMENTALS
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK
SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG
SESSION 6: USING OFFLINE BLOG EDITORS
SESSION 7: ONLINE TRANSACTIONS
SESSION 8: INTERNET SECURITY
SESSION 9 : MAINTAIN WORKPLACE SAFETY
SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES
SESSION 11 : PROTECT HEALTH AND SAFETY AT WORK

SESSION 1: WORKING WITH ACCESSIBILITY OPTIONS


 There are numerous types of impairment that impact computer usage. These include:
✓ Cognitive impairments and learning disabilities, such as dyslexia, attention deficit
hyperactivity disorder (ADHD) or autism.
✓ Visual impairment such as low-vision, complete or partial blindness, and color blindness.
✓ Hearing impairment including deafness.
✓ Motor or dexterity impairment such as paralysis, cerebral palsy, or carpal tunnel
syndrome and repetitive strain injury.
 Computer Accessibility refers to the user friendliness of a computer system for all,
regardless of their disability.
 It enables a person with a disability or impairment to use a computer.
 Assistive Technology refers to any device that can be used to supplement or replace
computing devices and make tasks possible or easier for the disabled.
 Accessibility Options in Control Panel are used to customize the way your keyboard,
display, or mouse function.

LAUNCHING ACCESSIBILITY OPTIONS


 To launch accessibility options in Windows XP, Click Start > Control Panel > Accessibility
Options.
 The Accessibility Options window appears. It has 5 tabs- Keyboard, Sound, Display, Mouse,
General.

KEYBOARD TAB
• It has 3 options- Sticky key, Filter keys and Toggle keys.
Sticky Keys
✓ StickyKeys is an accessibility feature to help computer users with physical disabilities, but
it is also used by others as a means to reduce repetitive strain.
✓ StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or
the Windows key, and have it remain active until any other key is pressed.
✓ To enable StickyKeys, select Use StickyKeys. • Click Apply. Click OK.
✓ To disable Sticky Keys, uncheck Use Sticky Keys and then click on Apply > OK.
✓ Press Shift key 5 times to enable it and again 5 times to disable it.
✓ Usually to get capital A we need to press both Shift + A. But with Sticky key enabled, you
can press Shift and leave it and then click on A separately.

FilterKeys
✓ FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the
keyboard to ignore brief or repeated keystrokes, making typing easier for people with
hand tremors. To enable Filter Keys, check Use Filter Keys.
✓ Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
✓ Click Apply. • Click OK.
ToggleKeys
✓ It is an accessibility function which is designed for people who have vision impairment or
cognitive disabilities.
✓ When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps
Lock, Num Lock, or Scroll Lock) are pressed.
✓ A high sound is emitted when the keys are switched on and a low sound is emitted when
they are switched off.
✓ To enable ToggleKeys, Check Use ToggleKeys. Click Settings under it. Click Apply. Click
OK. To disable ToggleKeys, uncheck Use ToggleKeys and then click on Apply > OK.

SOUND TAB
The Accessibility Options Sound tab allows you to enable Windows sounds.
SoundSentry
SoundSentry is designed to help users with auditory impairments. It generates visual
warnings, such as a blinking title bar or a flashing border, whenever the computer generates a
sound. To use SoundSentry, click the Use SoundSentry check box. Then choose the kind of
visual warning you want to receive.
ShowSounds
ShowSounds instructs applications that convey information by sound, to also provide
information visually, through text captions or informative icons.

DISPLAY TAB
High Contrast
High Contrast is an accessibility feature to assist people with vision impairment. You can
change the size and color of fonts and the background for ease of viewing.
Cursor Options
✓ Cursor Options is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
✓ To change the speed of the cursor blink, move the Blink Rate slider back and forth. Notice
the cursor blinking at various speeds.
✓ To change the width of the cursor, move the Width slider back and forth. Notice the with of
the cursor changing.

MOUSE TAB
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse.
This option uses the keyboard (especially numeric keypad) as a pointing device instead of a
mouse. Use number pad keys for moving mouse pointer after enabling “Use MouseKeys”. Use
number key 4 to move left, 6 to move right, 2 to move down and 8 to move up.

GENERAL TAB
This tab enables you to configure accessibility options for all users. Select the General Tab, a
window to configure additional accessibility options will be displayed
SerialKeys
SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard
or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to
provide input to the computer through Serial Ports.
For example, sipping on the tube activates one device, while puffing on the same tube
activates another.

SESSION 2 : NETWORKING FUNDAMENTALS


 A computer network is a collection of computers and other hardware components that
allow sharing of resources and information.
 You can establish a network connection using either cable or wireless media.
 Devices on a network are called nodes.
 Some of the advantages associated with networking are:
• Data Sharing
• Files Transfer : Users can send text files, spread sheets, documents, presentations, audio
files, video files, etc. to other users.
• Hardware Sharing: Hardware components such as printers, scanners, etc. can also be
shared. For example, instead of purchasing 10 printers for each user, one printer can be
purchased and shared among multiple users thus saving cost.
• Internet Access Sharing: You can purchase a single Internet connection and share it
among other computers in a network instead of purchasing multiple Internet connection
for each computer. This is very commonly found in Internet café (browsing centres),
schools, colleges, companies, etc.
• Usage of network based applications: Such as web browsers, email clients, chat
application, audio & video calling, etc. is another advantage.

 Networks are designed using the following architecture:


PEER-TO-PEER (P2P) ARCHITECTURE:
Networks in which all computers have an equal status are called peer to peer networks.
Generally in such a network each terminal has an equally competent CPU. In this architecture,
computers share directly with each other without the need of a central server.
CLIENT-SERVER ARCHITECTURE:
Networks in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks. The computer(s) which provide
services are called servers and the ones that use these services are called clients.

TYPES OF NETWORKS - PAN, LAN, MAN, WAN

PERSONAL AREA NETWORK -


✓ A network of communicating devices that covers an area of a few meters radius (upto 10m
radius)
✓ There can also be multiple devices in PAN.
✓ Eg. Bluetooth, Transferring songs from one cell phone to another, transferring files from
PC to MP3 player etc.

• LOCAL AREA NETWORK


✓ A LAN is one which connects computers and devices in a limited geographical area such
as home, school, computer lab, office building, or group of buildings.
✓ It covers an area of a few meters to a few kilometres radius (upto 10 km radius)
✓ A LAN setup using wireless media is known as WLAN (wireless LAN).
✓ Usually local area networks offer very high speeds and are used for connecting
computers and peripherals such as printers, scanners, etc.

• METROPOLITAN AREA NETWORK


✓ It is an extended form of LAN that covers a larger geographical area like a city or a town.
✓ It covers an area of a few kilometers to a few hundred kilometres radius(upto 100 km
radius)
• WIDE AREA NETWORK
✓ A wide area network (WAN) is one which covers a broad area (i.e., any network that links
across metropolitan, regional, or national boundaries).
✓ The Internet is the most popular WAN, and is used by businesses, governments, non-
profit organizations, individual consumers, artists, entertainers, and many others.
INTERNET
 The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide.
 It is a network of networks that consists of millions of private, public, academic, business,
and government networks.
 It helps in maintaining contact with friends and relatives who live across different
locations via Internet chatting systems and email software.
 Internet is also becoming a major source of entertainment for the general public.

WORLD WIDE WEB


 World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a
system of interlinked hypertext documents accessed via the Internet.
 With a web browser, one can view web pages that may contain text, images, videos, and
other multimedia, and navigate between them via hyperlinks.
 Information is stored on web servers referred to as web pages are retrieved by using a
web browser such as Firefox on the local computer.
 A Web Browser is a software used to view Web sites and acts as an interface between the
user and the World Wide Web.
 A Web server is a computer that stores web sites and their related files for viewing on the
Internet.

GETTING ACCESS TO THE INTERNET


To use the Internet, you need an Internet connection. Internet connections are provided by
Internet Service Providers such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS,
Vodafone, Tata Docomo, etc.

INTERNET SERVICE PROVIDER


 An Internet service provider (ISP) is an organization which provides you with access to the
Internet via a dial-up (using modem) or direct (hard wired) or wireless connection.
 Choosing connectivity depends on the availability of a particular technology, speed and
connection type in your area.
 Choosing the right kind of Internet service depends on users’ needs and availability.
 High-speed internet service is called broadband.

MODEM
Á modem is a device that converts digital computer signals into a form (analog signals) that
can travel over phone lines. It also re-converts the analog signals back into digital signals. The
word modem is derived from its function MOdulator/DEModulator.

Types of Common Internet Connectivity


There are different types of Internet Connectivity available today; it can be widely categorized
into wired and wireless access.

Some of the commonly used Internet connectivity are:


Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public
switched telephone network (PSTN) to establish a connection to an ISP via telephone lines
using a device called MODEM. Users dial a particular number provided by the ISP and gain
access to the Internet. Dial-up connections are extremely slow and, in most cases, it is
replaced by a high speed connection such as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over
wires of a local telephone network. DSL service is delivered along with wired telephone
service on the same telephone line. For using a DSL connection, you need a DSL modem and a
subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access that
uses the cable television infrastructure. Cable internet connection is faster than a dial-up but
sometimes slower than DSL. Internet connection is obtained using a cable modem. This
connection will be shared on lines used for cable TV.
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile
telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is
3G mobile telephony communications protocol that allows higher data transfer speeds and
capacity. If support for 3G is available on your mobile phone, you can subscribe to the 3G
connectivity with your ISP in order to get high speed Internet connection on your phone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity across cities
and countries through a variety of devices. WiMAX is a long range system, covering many
kilometres and is typically used where DSL or Cable Internet Access cannot be used; this
could be difficulty in laying out cables for home or offices located in remote locations but need
access to the Internet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or
mobile phones to exchange data wirelessly over a network, including high-speed Internet
connections. WiFi devices such as personal computer, smartphones, video game console, etc.
can connect to a network resource such as Internet through a device called the Wireless
Access Point (WAP). Wi-Fi is used where cables cannot be run (such as old buildings, outdoor
areas) to provide network and Internet access.

DATA TRANSFER ON THE INTERNET


What happens to a piece of data, say a Web page, when it is transferred over the Internet?
➢ A packet is a basic unit of communication over a digital network.
➢ A packet is also called a datagram, a segment, a block, a cell or a frame.
➢ Each packet is sent from computer to computer until it finds its destination.
➢ Each computer on the way decides where next to send the packet.
➢ All packets may not take the same route.
➢ At the destination, the packets are examined.
➢ If any packets are missing or damaged, a message is sent asking for them to be re-sent.
➢ This continues until all packets have been received intact.
➢ The packets are now reassembled into their original form.
➢ All this done in seconds!
To access Wi-Fi, you need an access point with an active Internet connection. Setting up a Wi-Fi
network requires technical expertise; however, you can access the Wi-Fi network by
connecting to an access point that is already setup for use.
SESSION 3: INTRODUCTION TO INSTANT MESSAGING
Introduction-
✓ Instant messaging (IM) is a form of communication over the Internet that offers an
instantaneous transmission of text-based messages from sender to receiver.
✓ Most instant messaging software include the option for performing file transfers, audio chat,
video calling and conferencing, sharing desktops, etc. apart from standard text chat.
✓ Unlike email, IM happens in real-time and response from participants can be spontaneous.
✓ Some instant messaging software allows users to view messages received when they are
not logged on. These are called “Offline Messages”.
✓ For utilizing audio and video chat or conferencing, you need to have microphones and
headsets or speakers and web cameras so that users can talk or see each other.

Key Features of an instant messaging are as follows: Text Messages can be sent to one or
more person (Similar to SMS), Group Chats, Audio calling , Video calling and conferencing,
File transfers, Message history, Sticker packs, Easy screen sharing

Instant Messaging Account


Participants messaging to each other need to be signed in to the same instant messaging
software. To use instant messaging software, a user must have a valid instant messaging
account.

Instant Messaging Services


There are two kinds of instant messaging software – application based and Web based.
 Application based IM software is downloaded and installed on user’s computer. Eg:-
Google Talk , Yahoo! Messenger , Skype , Windows Live Messenger , Rediff Bol, etc.
 Web based IM software is accessed using browsers such as Internet Explorer, Google
Chrome, etc. Eg : - Meebo , Yahoo! Messenger , MSN Web Messenger , IMO, etc.

Creating An Instant Messaging Account


Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc.
It can also be used for making video calls and to view updates from GMAIL mailbox.
It is free and is available as application based (users need to download and install Google
Talk application to their desktops, mobiles or laptops) and web based (users can use
Before you start using Google Talk, a Gmail account is required.

LAUNCHING GOOGLE TALK


 To launch Google Talk, Click Start > Programs >Google Talk>Google Talk.
 You can also double-click on the Google Talk icon on the desktop if available.
 You need to have a list of contacts that are available for chat. If you don’t have any contacts,
you can add their Gmail account to your contact list by sending an invite.
 To use Google Talk, you need to sign in with your account details.

SESSION 4: CHATTING WITH A CONTACT – GOOGLE TALK


 Whenever your friend in the contact list is online you can see them along with a green dot.
 You can start sending text chat message instantly by double-clicking on a contact.
 A window will pop up where you can type the text in the text box and press enter; the other
person will see the text message and respond to your message.

There are some general rules and etiquettes to be followed while chatting.
✓ Messages should be short and to the point.
✓ Always introduce yourself by name if your screen name doesn’t reflect it.
✓ Always ask if the other person has time to chat first.
✓ In a business environment, know exactly what you want to discuss.
✓ Typing your messages in uppercase is extremely rude - it’s considered shouting and very
aggressive.
✓ Give people time to respond.
✓ Wherever possible, give the person you are communicating with your undivided attention.
✓ It’s important to properly end an IM conversation - you may think the chat is over, but the
other person may not.

CHATTING ON GMAIL
 You can also use the chatting services after signing into their Gmail Account.
 Once you sign into your Gmail account, a contact window will be displayed either on the
left side or the right side within the browser.
 If you would like to chat with a contact, double click on the contact’s name.
 Now you can start typing the message you want to send and the other contact should be
able to respond to your chat message.
Chatting on Yahoo
 Before you start using Yahoo! Messenger, a Yahoo Mail account is required.
 You should have a list of contacts that are available for chat. If you don’t have any
contacts, you can add their Yahoo Mail account to your contact list by sending an invite.
 Note: If you would like to import your contacts from other sources such as Microsoft
Outlook, Gmail, Hotmail, etc., you can use the import option.
 Having used Yahoo! Messenger, now go ahead and chat with your classmates using a
Yahoo mail account through a web browser.

SESSION 5: CREATING AND PUBLISHING WEB PAGES – BLOG


Blogs-
❖ Short form of ‘weblog’
❖ Blogs are similar to an online personal diary.
❖ It is a regularly updated website that is created for the purpose of discussion.
❖ A blog is a discussion style site used by users for creating personal web pages.
❖ A blogger is a person who owns or runs a blog or a person who maintains the blog.
❖ Blogs are used to convey messages about events, announcements, news, reviews, etc.
❖ Blogs are usually managed using a web browser and this requires active internet
connection.
❖ Offline blog software can also be used to create content first and later publish the content
when an active internet connection is available.
❖ There are hundreds of websites that offer blog service for free. Some of the popular blogs
include:
 www.WordPress.com
 www.blogger.com
 www.blog.com
 www.weebly.com
 www.blogsome.com

CREATING A BLOG ACCOUNT - In WORDPRESS


➢ WordPress is free web service that you can use to create a beautiful website or blog.
WordPress has support for “themes” for customizing the design of a blog.
➢ Themes can make the blog or the webpage look attractive.
➢ Before you start using a blog, a blog account is required.
➢ Steps to create a blog-
• On the address bar of a browser, type https://signup.WordPress.com/signup/.
• You should now get to a page with the fields Blog address, Username, Password, Email
Address and Language.
• Blog Address: You must provide a unique address to your WordPress Blog. This is the
address which others will use to view your blog.
• Username: You should choose a username for managing this blog.
• Password: Securing your WordPress blog account with a strong password is important.
A combination of uppercase and lowercase letters with some digits along with symbols
would be a strong enough password. You need to enter the password twice.
• Email Address: You must provide your Email Address here. An activation link will be
send to you from WordPress after you click “Create Blog”.
• Language: You can choose your own language for blogging from the list given.
• Click Create Blog.

✓ Once you have created a blog, you need to submit content that you want others to view.
This process ids called posting content.
• To create a post, click New Post.
• Title- You must provide a title for your post; choose a tile that this post will focus on. For
example, “School Annual Day Function 2012”.
• Using the rich text box, you can type content that you want others to read.
• Click Publish Post to publish your content.
• To view the post, you can type the blog address in the address bar of the web browser,
you should see your blog along with the post.
• Photos, Videos etc can be added.
• You can comment on posts published by others.
• In the Enter your comment here… text box, type your comments about the post.
• Provide your email and name
• Once you have typed content in comment area, review carefully and Click Post Comment.
• Now you will see the blog along with your comment.

SESSION 6: USING OFFLINE BLOG EDITORS


OFFLINE BLOG EDITORS
• Free offline blog editors are available that can be downloaded and installed on a system.
• Example-
• Qumana (Windows and Mac)
• Windows Live Writer (Windows)
• MarsEdit (Mac)
• Blogdesk (Windows)
• Blogo (Mac)
• Ecto (Mac)
• BlogJet (Windows)
• Bits (Mac)
• If you do not have an active internet connection, you can create blogs using a blog
application and publish the blog whenever internet connectivity is available.
• There are several free offline blog editors available that can be downloaded and installed
on the local computer such as - Qumana , Windows Live Writer , Blogdesk , BlogJet

Qumana
▪ Qumana is a free blog application that is simple and easy to use.
▪ It can be downloaded from www.qumana.com.
▪ Once installed, you can use the program to manage blogs.
▪ Users don’t need to have HTML code knowledge in order to render the posts in correct
format.
▪ The posts can be composed and edited without connecting to the internet.

Launching Qumana
• To launch Qumana, Click Start > Programs > Qumana > Qumana.
• You need an existing blog account to use with Qumana.
• Enter your WordPress blog address and Click Next. A login window appears.
• Give the WordPress blog address in the Web address field. Enter the Username and
password of the WordPress account.
• Click Next > Finish.
• If posts are already available in your blog, Qumana will download and display the existing
blogs as well.
• To create a post, Click New Post.
• Note: Enter the title for the post in the Title field and the post content in the area given
below the page title.
• Click Publish Post.
• The post will get automatically updated to your WordPress blog.
• To insert a picture, click on the image icon on the right hand side of the application.
• To view the published content, open the web browser and type your blog address.

SESSION 7: ONLINE TRANSACTIONS


 Online transactions deals with transfer of money over the internet.
 It is a payment method in which the transfer of fund or money happens online over
electronic fund transfer.
 It occur when a process of buying and selling takes place through the internet.
 3 steps involved in the online transaction are Registration, Placing an order, and, Payment.
 To perform an online transaction, all you need is a web browser and an active internet
connection.
 In some cases where purchasing is involved, you will need a valid credit card, debit card
or online banking support referred to as Net Banking Subscription.
 Some websites even allow COD (Cash on delivery) where the users can pay once they
receive the product or service.
 Online shopping could be useful in situations when:
A customer does not have sufficient time to visit stores.
Visiting a store is more expensive than purchasing a product online.
A product or service that is not available in the local market is available online.

Some of the popular online transaction websites are:


• IRCTC, an online portal for booking flight and train tickets.
• Flipkart, an online shopping portal for buying consumer products.
• EBay, an online portal for buying and selling goods.
• Redbus, an online portal for booking bus tickets.

OLTP-
• OLTP stands for Online transaction process.
• It is a type of data processing that consists of executing a number of transactions occurring
concurrently—online banking, shopping, order entry, or sending text messages, for
example.
• OLTP captures, stores, and processes data from transactions.
• It is secure and password protected.
• Many protocols & security measures have been adopted to ensure the safe and secure OLTP.

Online Transaction Using Flipkart


 Flipkart is an online store where you can purchase a variety of electronic goods, books,
accessories, digital cameras, mobile phones and peripherals such as printers, etc.
 Flipkart allows a variety of methods for online payment.
 You can use credit card, debit card, Net Banking, Cash on Delivery or e-gift voucher to
complete the payment; you need to enter appropriate details as required in the mentioned
fields and Click Pay to initiate the payment.
 To work with Flipkart, you need to use a web browser and an active internet connection.
o Open any Browser such as Firefox, Chrome or Internet Explorer
o Type www.flipkart.com in the address bar and Press Enter.
o To perform transactions using Flipkart, you need to sign up for a Flipkart account.
 Flipkart has a variety of products organized as categories.
 You can either look for respective product in appropriate category or you can use the
search feature to locate a particular item.
 Products added to your shopping cart will be available for review prior to payments.
 Depending on the method select, additional windows may be displayed and procedures
will vary to complete the online transaction.

Online Transaction for Booking Rail Tickets


• Indian Railway Catering and Tourism Corporation (IRCTC) is an online portal that can be
used for booking travel tickets. www.irctc.co.in
• To work with IRCTC, you need to use a web browser and an active internet connection.
• Open any Browser and type www.irctc.co.in in the address bar and Press Enter.
• To perform transactions using IRCTC, you need to sign up for an IRCTC account.
• Once you logon to IRCTC, you can use the website for booking tickets.

SESSION 8: INTERNET SECURITY


▪ The Internet represents an insecure channel for exchanging information leading to a high
risk of intrusion or fraud, such as phishing.
▪ Though Internet provides valuable information and entertainment, it may leave your
computer unsecure due to many online threats.
▪ Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances
of users getting compromised.
▪ You can reduce risks by using best practices such as Antivirus Software, Antispyware
Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best
practices.
▪ Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security.
▪ Its objective is to establish rules and measures to use against attacks over the Internet.
▪ Internet security consists of various security measures for ensuring the security of
transactions done online.
▪ It prevents attacks targeted at browsers, network, operating systems, and other applications.
▪ Its objective is to establish rules and measures to use against attacks over the Internet.

Online Threats
The threats / vulnerabilities that uses www to facilitate crimes are called Online Threats. Like:-
1) Phishing :- The act of acquiring personal / private and sensitive data from personal
computers for use in fraudulent activities. For eg. Mails from unknown persons that ask for
your credit / debit card details.
2) Email spoofing :- It is the creation of email messages with a forged sender address. For eg.
Sending an email with a forged email address which appears to be original. These mails are
infected mails which contain worms.
3) Chat Spoofing:- Spoofing means hoax, trick, or deceive which contains false information.
Hiding / Faking the identity of another person over the internet is called chat spoofing

Best Practices for Security


 Use strong passwords, a combination of alphanumeric & special characters could be used.
 Most websites check for password effectiveness when a user attempts to register for the
first time or when they change password.
 Backup your data: Always keep copies of personal data in additional media such as
compact discs, pen drives, etc. This could be helpful when there is a loss of data.
 Use encryption software: (Usually available within the operating system) to protect your
data from unauthorized users. If encryption software is not available within the operating
system, use a 3rd party software.
 Keeping your username and password private
 Read the privacy statement or policy whenever you register with a website, the statement
or policy will include information about how the website use personal data.
 Do not share personal information
 While doing online transactions, make sure the website is a secure and a legitimate one.
 Use antivirus and antispyware software.
 Do not immediately respond to mails from unknown users. NEVER open attachment from an
unknown source.
 Clear browser cookies frequently.
 Keep the operating system and software applications up to date.
 Turn your firewall on.
 Never install software from unknown sources.
 Remove unwanted or unknown software applications.

Following is a general guideline for managing strong passwords.


✓ Keep the length of the password at least 12-14 characters if permitted.
✓ Change your password frequently at least 2 or 3 weeks so that your account information
remains secure.
✓ Avoid keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
✓ Use a combination of capital & lower-case letters & include numbers, & symbols if allowed.
✓ Avoid using the same password for multiple sites or purposes.
✓ Avoid using something that the public or workmates know you strongly like or dislike.
✓ Use random password generators if possible. You may also use websites such as
www.strongpasswordgenerator.com that can generate random strong passwords.

Secure transactions:
 If you are using online shopping or transactions, websites even store your credit card or
online banking personal information.
 This info can be tracked and used by un-authorized users often known as hackers to misuse
this information.
 Since such information is sent over the network, it is always recommended to use only
secure websites for such transactions.
 Verify if the website uses secure transaction; usually it is indicated through a digital
certificate represented as a golden lock in the web browser’s address bar.

▪ Use antivirus and antispyware software: Computers are prone to attacks from Malware
that could harm your computer. These tracks browsing behavior or send personal data from
your computer; programs such as keyloggers could be installed on your computer track and
transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.
▪ Do not immediately respond to mails from unknown users. It may be a fake mail trying to
gather personal information. NEVER open the attachment from an unknown source.
▪ Clear browser cookies frequently: Cookies are programs that are created on your local
computer when you visit websites. Though cookies are meant for storing data based on your
activity performed during your earlier visit such as logon details, details of a shopping cart,
visited pages in a website, etc. they could also be tracked by unauthorized users and
possibly gain access to your personal information.
▪ Keep the operating system and software applications up to date.
▪ Install firewalls: Firewalls could be software or hardware and can assist in keeping a
computer and a network secure. Firewalls analyze the network traffic and determine if the
traffic should be allowed or not.
▪ Never install software from unknown sources: Verify the source if it is legitimate by
searching the internet or referring to comments from other users before downloading them;
understand the nature and the purpose of the software before attempting to download and
install them.
▪ Remove unwanted or unknown software applications: These might have got installed without
your knowledge when you have visited some websites.

Clearing Data Stored In Browsers


 Web browsers have built-in password management designed to store passwords used in
forms on websites.
 Browsers often prompt to save usernames and passwords when users attempt to logon to
websites.
 This facility is offered to users, so that they can logon to their frequently used websites
without having to type the usernames or passwords. But it is not advisable to leave the web
browser store this data particularly on public or shared computers.
 To clear personal data from a web browser such as Mozilla Firefox, launch the browser.
▪ Click Tools Menu, click Options.
▪ Click Security Tab.
▪ Notice that under Passwords section, Remember password for sites is checked.
▪ To clear this stored data, click General tab > Option.
▪ Click Privacy Tab. The following window will be displayed:
▪ Under History section, click the drop down menu next to Firefox.
▪ Select Use custom settings for history from the drop down list.
▪ Click Clear Now and then click OK. From now on, Mozilla Firefox will not remember any
history as you have configured it that way.

SESSION 9 : MAINTAIN WORKPLACE SAFETY


Maintain Workplace Safety
▪ Every organization must follow a standard set of safety rules and procedures.
▪ These rules must be stated and displayed clearly at important areas.
▪ All the employees must be given a demonstrations and training to follow safety rules .
▪ Basic safety rules to follow at workplace – Fire safety, Falls and slips, Electrical safety, Use
of first aid.

Basic Fire safety rules in an organization are :


Most of the time fire can be prevented using appropriate measures.
- Fire escape plans must be installed at proper levels
- Conduct regular drills
- Smoke alarms must be placed at proper intervals
- Keep workplace a no-smoking zone
- Maintenance of safety equipment must be taken care of regularly

Falls and Slips Safety rules


- Keep the moving area clean and clutter free.
- Workplace must be proper ventilated receive light.
- Wear non slippery footwear.
- Floors must be clean and dry
- Oil spills, dust must be immediately cleaned.
Electrical Safety Rules:
We must take appropriate measures to ensure safety from electrical devices at home as well as
at workplace.
- Electrical equipment used should be approved by a recognised organization.
- Workers should be trained to handle the electric equipment safely
- Damaged and hazardous electrical equipment should be immediately replaced. All old and
workout and frayed switches and wires should be changed.
- Heat emanating equipment should be kept away from the electrical equipment.
- Take care that the outlets/ circuits should not be overloaded.
- Switch off and unplug the electrical appliances before cleaning or relocating them.

Use of First Aid


✓ First Aid is the immediate assistance provided to the injured to save life and minimize
health loss till the proper medical aid/ facility is provided.
✓ Every organization must have basic First Aid Kit. Kit must have all necessary items.
Some rules of First Aid are :
- Assure the injured to remain calm and not to panic
- Keep them warm if they are under shock
- Do not move the victim in case of back/neck injury

OCCUPATIONAL HAZZARDS
❑ A worker may face Occupational hazards at workplace.
❑ An occupational hazard is the illness one may acquire due to his occupation.
❑ Like people working in a chemical factory may get affected due to presence of certain
chemicals.
❑ Some types of occupational hazards are : Physical hazards, chemical hazards, biological
hazards, , behavioural hazards, radiological hazards, ergonomic hazards etc.

SESSION 10 : PREVENT ACCIDENTS AND EMERGENCIES


• Accident: an accident is an unplanned event that may happen all of a sudden and may lead to
unwanted or unprecedented results/outcomes.
• It can be defined as an unfortunate incident that occurs unintentionally causing hazardous
result or injury or unwanted results.
• Emergency : any unexpected situation that needs immediate attention and action.
• An emergency situation might pose a sudden risk to life, property health etc. and needs
intervention to prevent deteriorating results/ hazards.

Types of Accidents:
Accidents may be of following types :
- Accidents at workplace : Slips and fall accidents, fire
- Industrial disease/illness
- Road traffic accidents
- Clinical Accidents
- Sports related accidents

 Workplace accidents may include injuries that are caused to the workers due to falls, slips
and trips.
 Slip and call accidents may occur at any working environment and the injuries may vary
from minor ache to major severe accident.
 Some injuries suffered might include fracture, sprain, knee or elbow injury, wrist or head
injuries etc.
Handling Accidents:
Accidents must be handled carefully. The accident should be handled compassionately
without assigning blame on others.
- Every organization must follow SOP for accident handling
- Safety measures must be placed to prevent workplace accidents
- Immediately call the medical team for any injury
- Stay alert
- Pay attention to and follow emergency drills

Emergency :
• Any unexpected situation that needs immediate attention and action.
• An emergency situation might pose a sudden risk to life, property health etc. and needs
intervention to prevent deteriorating results/ hazards.
• An emergency situation is one that:
➢ threatens the employees, customers or the public
➢ disrupts or shuts down the operations
➢ causes physical or environmental damage
Emergencies that require evacuation include:
Fire , Explosion , Floods , Earthquake , Hurricane , Tornado , Toxic material release , Civil
disturbance , Workplace violence

Types of Emergency :
✓ Various types of emergencies are there and there should be an emergency management
plan to handle the situation of emergency. Some of the types of emergencies are as
follows :
✓ - Chemical spills , Extreme heat waves , Droughts , Pandemics , Terrorist attack ,
Fire , Floods , Thunderstorms , Leakage of some hazardous gas/ chemical
✓ Generally the situation of emergency occurs as a result of some disaster. Disaster may be
either natural or caused by some human activity.
✓ Some of the types of emergencies that require evacuation are: Fire , Explosion , Floods
, Earthquake , Hurricane , Tornado , Toxic material release , Civil disturbance ,
Workplace violence

SESSION 11: PROTECT HEALTH AND SAFETY AT WORK

Hazards And Sources Of Hazards


An organization can face some health hazards that could put the lives of the employees in
danger. A hazard is anything that is the source of any potential harm, damage or any kind of
potential loss of health or life.
Hazards can be of different types depending on the industry and the environment in which the
employees work. The different types of hazards include:
● Physical , Chemical , Biological , Mechanical

Sources of Hazards
Checklist for Workstations :
The workstation should:
● provide sufficient space for the user to alter position comfortably
● provide adequate lighting
● have windows fitted with adjustable coverings to alter the sunlight level
● be spacious enough when a workstation is shared by more than one person

The display screen should:


● display well-defined characters of adequate size and spacing
● have a stable image
● have easily adjustable brightness and contrast
● tilt and swivel easily to suit the user
● be free from glare and reflections
● Use a separate base for the screen or an adjustable table

The keyboard should:


● be able to tilt easily and should be able to separate from the screen to allow the user to
adopt a comfortable working position
● have space in front to provide support for the hands or arms of the user
● have a matt surface
● have clearly legible symbols on the keys

The work surface should:


● provide adequate space for the user
● have a low reflective surface
● be of an adequate size to allow the screen, keyboard and other peripherals to be flexibly
arranged
● have a stable and adjustable document holder, which should be at the same level as the
screen and at the same viewing distance

Workplace Evacuation
In case of emergency there should be provision for evacuation. Evacuation is the process of
emptying a place in case of an emergency, disaster.
Every company must ensure following points for evacuation in case of any emergency:
• An evacuation policy : Every organization must have an evacuation policy. All the Team
Leaders are responsible for informing about the policy to their employees about it.
• Organization must have a designated assembly point for emergencies.
• A ‘buddy system’ for individuals with special needs or disabilities must be designated. This
system ensures that differently-abled are assisted and guided out of the premises or the
impacted area properly.
• Floor plans with evacuation routes in work areas.
• Assembly areas, where you are required to assemble after evacuation, must be properly
taken care of.
• Periodic evacuation drills should be conducted.

Healthy Living
✓ ‘A healthy body has a healthy mind’ - a very popular saying is true .
✓ ‘Healthy Lifestyle leads to a healthy being.
✓ A healthy living has a lasting impact on an individual which ultimately yields a healthy
environment at home as well as at work place. a happy and healthy worker will always
perform best to his ability.
✓ A healthy lifestyle helps to keep and improve people’s health and well being.
✓ A healthy lifestyle includes : healthy eating habits , physical activities , stress management
, healthy mind , sound sleep , goal setting

You might also like