Internetsecutity
Internetsecutity
OutLine
Introduction.
Attacks examples.
Conclusion
Introduction: 2
It’s where we access our banking records, credit card statements, tax returns
and other highly sensitive personal information.
But with all the good things the Internet offers us, it also opens the door to
serious, potentially devastating threats.
Internet Security:
3
What it is
We must secure our computers with technology in the same way that we
secure the doors to our offices Security
We must act in ways that protect us against the risks and threats that
come with Internet use Safety
Internet Security:
4
Why you need it.
Request
Response
carries with it unwanted hidden
- Installed in your computer. software
- watches and records
everything you do online.
- leaving your passwords.
The criminals use in accessing :
- and other personal and • your private information.
sensitive information • stealing your identity or your money.
vulnerable • It can also be used to highjack your
computer for illegal purposes.
Hackers:
5
Who is a Hacker ?
Intelligent individuals
with excellent For some
computer skills with hackers,hacking is a
the ability to create hobby to see how
and explore many computers they
computer’s software can compromise
and Hardware
Phishi
ng
‘ ’ Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication ’ ’
Attacks exemples. 9
Phishi
ng
Attacks exemples. 10
Pharmi
ng
Is another technique
used to steal confidential
access code. It works by
redirecting users to a
rogue server
11
What should I do to be safe
online ?.
What should I do to be safe 12
online ?.
To protect your
self
Keep you
passwords
private and
create ones too
strong that are
hard to “crack”
If you have received
an Email encounters,
you may have been
the target of a
common scam called
‘phishing’.
What should I do to be safe 13
online ?.
To protect your n g
ki
self a n
b
n d
Be wary of publishing a
g
any information that n
o pi
identifies you, such as sh
your phone number, e
lin
photos of your home, n
O
your address, date of If you make purchases
birth or full name. or do your banking
online, make sure you
protect your financial
networking information
Use ‘https://’
What should I do to be safe 14
online ?.
To protect your
Computer
Use Anti-virus Use Anti-spyware
Software: Software:
Anti-virus software can Use anti-spyware software
detect and destroy so unknown people cannot
computer viruses lurk on your computer and
before potentially
they cause damage steal your information
What should I do to be safe 15
online ?.
To protect your Firewall
Computer
Keep Your Computer LAN
Updated:
Install all security updates
as soon as they are WAN
available Automatic
updates provide the best
protection Use a Firewall:
It is a placed at the
gateway between the two
networks which is usually
a private Network and a
public network such as
the internet
Conclusion 16
Being aware of the dangers of the internet and taking the right
steps to avoid them means you can enjoy the internet safely.