0% found this document useful (0 votes)
15 views28 pages

Presentation n0.2

Uploaded by

jelov3777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views28 pages

Presentation n0.2

Uploaded by

jelov3777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

INTERNET

SAFETY
Security

Online Safety

Etiquette
Standards
What is
INTERNET ?
INTERNET
is defined as the information superhighway.
This means that everyone with access to this
highway has the ability to place and retrieve
information.
The larger the risk, the more information you
share online. Identity theft, phishing, malware
infestations, and other threats are all possible.
As a result, Facebook is constantly improving
its security features.
Internet Safety refers to the online security or
safety of people and their information when
using internet.

NETIQUETTE Combination of the words


network and etiquette and is defined as a set
of rules for acceptable online behavior.
RULES FOR
NETIQUETTE
RULE 1: REMEMBER THE HUMAN
 Remember this saying when sending an email: Would I
say this to the person’s face.
 The internet brings people together who would
otherwise never meet
 You need to remember that you are talking to a real
person when you are online.
RULE 2: ADHERE TO THE SAME STANDARDS ONLINE
THAT YOU FOLLOW IN REAL LIFE.
 You need to remember that you can get caught doing
things you should not be doing online just like you can
in real life.
 You need to behave the same way online that you do
in real life.
 You are still talking to a real person with feelings even
though you can’t see them.
RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE

 Always take a look around when you enter a new


domain when surfing the web.
 Get a sense of what the discussion group is about
before you join it.
RULE 4: RESPECT OTHER PEOPLE’S TIME AND
BANDWIDTH
 Remember people have other things to do besides
read your email. You are not the center of their world.
 Keep your post and emails to minimum by saying what
you want to say.
 Remember everyone won’t answer your questions.

RULE 5: MAKE YOURSELF LOOK GOOD ONLINE

 Be polite and pleasant to everyone.


 Always check your spelling and grammar before
posting.
 Know what you are talking about and make sense
saying it.

RULE 6: SHARE EXPERT KNOWLEDGE


 Ask questions online
 Share what you know online.
 Post the answers to your questions online because
someone may have the same question you do.
RULE 7: HELP KEEP FLAME WARS UNDER CONTROL
 Netiquette does not forgive flaming.
 Netiquette does however forbid people who are
flaming to hurt discussion groups by putting the group
down.

RULE 8: RESPECT OTHER PEOPLE’S PRIVACY


 Do not read other people’s mail without their permission.
 Going through other people’s things could cost you, your job or you
could even go to jail.
 Not respecting other people’s privacy is a bad netiquette.

RULE 9: DON’T ABUSE YOUR POWER.


 Do not take advantage of other people just because
you have more knowledge or power than them.
 Treat others as you would want them to treat you if the
roles were reversed.
RULE 10: BE FORGIVING OF OTHER PEOPLE’S
MISTAKE

 Do not point out mistakes to people online.


 Remember that you were once the new kid on the block.
 You still need to have a good manners even though you are
online and cannot see the person face to face
INTERNET SAFETY
Be mindful of what you share and what site you share it to.

Do not just accept terms and conditions; read it.

Check out the privacy policy page of a website.

Know the security features of the social networking site you use.

Passwords should not be shared with anyone. Your password


should be treated like a toothbrush. Allow no one to use it, and
replace it every six months.
Logging into public networks/Wi-Fi is a bad idea.

Do not talk to strangers whether online or face-to-face.

Never post anything about future vacation.

Add friends you know in real life.

Avoid visiting untrusted websites.


On your computer, install and update antivirus software. To
avoid conflicts, use only one antivirus software.

If you have a Wi-Fi at home, make it a private network by


adding a password.

Downloading anything from untrusted websites is a bad idea.

Buy the software; do not use pirated ones.

Do not reply or click links from suspicious emails.


DIFFERENT KIND
OF MALWARES
SPAM
Most of our email accounts come with a ‘Spam’ or ‘Junk’
folder. Spam emails are a huge issue, with more than 50%
of emails being syphoned into these folders. Aside from
being an annoyance, spam emails are not a direct threat,
but many can contain malware.

ADWARE
When a person surfs the internet, adware is a sort of virus
that displays unwanted advertisements. A valid technique of
generating advertising money that help fund development is
frequently included in many shareware or freeware
downloads. Some websites, on the other hand, are tainted
with dangerous adware that is downloaded to your
computer automatically.
TROJAN
Trojans leave your computer vulnerable to hackers, allowing
them to steal any data on your computer. Trojans frequently
disguise themselves as harmless computer programs in
order for hackers

VIRUS
A virus is one of the most talked about internet threats.
Because viruses are designed to propagate at an alarming
rate, they usually attach themselves discreetly to
downloads. Antivirus software is often attached to files for
download, shares virus-infected email attachments, or
loaded onto computers via CDs, DVDs, and USB sticks.
WORMS
Malicious email attachments or USB sticks are the most
common ways for worms to get onto a computer. When a
worm infects your computer, it will most likely send itself to
every email account on your machine. Your email will
appear innocent to the recipient until they read it and find
themselves infected by the same worm.

PHISHING
Phishing is a type of fraudulent behavior in its most basic
form. Official-looking emails impersonating a well-known
source, such as a bank, are frequently sent. It is the
purpose of these emails to acquire people's passwords and
credit card information.
It’s goal is to acquire sensitive personal information like
passwords and credit card details.
SPYWARE
Spyware is another type of malware. Known as spyware, it is an
all-encompassing internet ailment that is commonly associated
with downloading file pop-ups. Spyware can monitor your
keystrokes, read, and destroy your files, reformat your hard drive,
and access your apps once it is installed on your computer.
Without your knowledge, the individual in charge of the spyware
has access to your personal information.

KEYLOGGERS
Keyloggers, which are similar to spyware, record a user's
keyboard operations. The majority of keyloggers will hunt
for easily identifiable key entries, such as bank card
numbers and passwords. Identity and intellectual property
theft are frequently tied to keylogging.
PHARMING
Pharming is a more sophisticated form of phishing that takes
advantage of the DNS system. Pharmers frequently construct web
pages that look like those of a reputable company, such as an
online banking log-in page. Users will then submit their credentials,
assuming they are logging in to their regular service, and the
pharmer will steal their credentials.

ROGUE SECURITY
SOFTWARE
This is a form of malicious software and internet fraud that
misleads users into believing there is a virus on their
computer and aims to convince them to pay for a fake
malware removal tool that actually installs malware on their
computer.
MALWARE
Stands for Malicious Software, any program or file that is
harmful to a computer user.
1. ILOVEYOU (2000) computer worm, spreading thru
email, Love-Letter-ForYou.txt.vbs
2. Code Red (2001) – Microsoft IIs Server software
3. My Doom (2004) – email targeting government,
business across the globe
4. Crypto Locker (2013) - malicious software encrypted
the files on a victim’s computer demanded a ransom
for the decryption key.
5. Wanna Cry (2017) – attacking Microsoft Windows for
ransom payments in the Bitcoin cryptocurrency.
PROTECTING
REPUTATIONS ONLINE
INTELLECTUAL PROPERTY
Intellectual property is a category of property that includes intangible
creations of the human intellect. Intellectual property encompasses
two types of rights: industrial property rights and copyright.

COPYRIGHT LAW
It is the legal protection extended to the owner of the rights in
an original work.

COPYRIGHT PAGE
The copyright page is where the publisher places all the
legal notices and information related to a book.
TO AVOID COPYRIGHT
INFRINGEMENT
UNDERSTAND
Copyright protect literary works, photographs paintings, drawing,
films, music choreography and sculptures.

BE RESPONSIBLE
Even if a material does not say that it is copyrighted, it is not
a valid defense against copyright.

BE CREATIVE
Ask yourself whether what you are making issomething that
came from you or something made from somebody else
creativity.

KNOW THE LAW


There are some limitations to copyright laws.
ONLINE RESEARCH
Have a question in mind- Focus on a question you want answered

Narrow it down- Search engines like Google, Bing, or Yahoo use several
filters to determine the most appropriate result for you.

Advanced Search- The best way to filter information you get from search
engines is by using the advanced search

Look for a credible sources- Some wikis, filled with updated


information, are not a credible source. When using wikis, check
out the link of the cited texts

Give credit- Give credit to the original author of the page or


information. To properly site a reference, you may use the format
below

You might also like