0% found this document useful (0 votes)
19 views13 pages

Internet Security

The document discusses internet security, emphasizing the importance of protecting personal information against online threats such as phishing and malware. It outlines best practices, including using strong passwords, encryption, and being cautious with emails, to safeguard online activities. The conclusion stresses the need for vigilance and regular updates on security measures to defend against cyber risks.

Uploaded by

gamearmy419
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views13 pages

Internet Security

The document discusses internet security, emphasizing the importance of protecting personal information against online threats such as phishing and malware. It outlines best practices, including using strong passwords, encryption, and being cautious with emails, to safeguard online activities. The conclusion stresses the need for vigilance and regular updates on security measures to defend against cyber risks.

Uploaded by

gamearmy419
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Internet Security

By Shivem Sinha 10B

The increasing reliance on the internet

Rise in cybercrimes

Security measures

by Shivem Sinha
Introduction
1 Branch of computer security related to the Internet
Branch of computer security related to the Internet

2 Focuses on browser and network security


Focuses on browser and network security

3 Aims to protect against attacks like


phishing, malware, etc
Aims to protect against attacks like phishing, malware, etc

What is Internet Security?


Key Concepts

Internet as an Personal Information Online Threats


Insecure Channel Security Common threats include
The public nature of the Properly securing usernames, phishing, email spoofing, and
internet poses high risks of passwords, and financial malware attacks.
intrusion and fraud. information is critical.
Keep Username
and Password
Private
1 Avoid saving credentials on
shared/public computers
Avoid saving credentials on shared/public computers

2 Prevent unauthorized access


Prevent unauthorized access

Tips
Best Practices Overview
Use strong passwords Backup data
Use strong passwords Backup data

Use encryption software Keep username and password private


Use encryption software Keep username and password private

Secure transactions Use antivirus and antispyware


Secure transactions Use antivirus and antispyware

Be cautious with emails Clear browser cookies and history


Be cautious with emails Clear browser cookies and history

Update OS and software Install firewalls


Update OS and software Install firewalls

Avoid unknown software Manage browser settings


Avoid unknown software Manage browser settings
Use Antivirus and
Antispyware
1 Install and update regularly
Install and update regularly

2 Real-time protection
Real-time protection

Protect Against Malware


Backup Your Data
1 Save copies on external media
(USB drives, CDs)
Save copies on external media (USB drives, CDs)

2 Protects against data loss


Protects against data loss

Importance of Data Backup


_Font_: Sage, 28pt, Regular (for all bullets)
Using Strong Passwords
1 Combine letters, numbers, special characters
Combine letters, numbers, special characters

2 Avoid easily guessable info


Avoid easily guessable info

3 Change frequently (every 2-3 weeks)


Change frequently (every 2-3 weeks)

Tips for Strong Passwords


_Font_: Sage, 28pt, Regular (for all bullets)

_Example: u1vX:,4Hd{\]$_
Use Encryption Software
1 Protects data from unauthorized access 2 Available in operating systems
Protects data from unauthorized access
or via third-party software
Available in operating systems or via third-
party software

What is Encryption?
Secure Transactions
1 Ensure websites are legitimate 2 Look for HTTPS and padlock symbo
Ensure websites are legitimate Look for HTTPS and padlock symbol

Online Shopping and Banking


Clear Browser Cookies and History
• Regularly clear your browser's cookies and browsing history to prevent tracking and data theft.
• Cookies can be used to store your online activity and preferences, which could be accessed by
third parties without your knowledge or consent.
• Clearing your browsing history removes traces of the websites you've visited, making it
harder for others to piece together your online activity.
• This simple step helps protect your privacy and reduce the risk of identity theft or other
data-related crimes.
• Set your browser to clear cookies and history automatically on a regular basis, such as when
you close the browser or on a weekly schedule.
Be Cautious with Emails
1 Don't open emails or attachments 2 Beware of phishing attempts -
from unknown sources - Phishing emails Scammers may try to trick you into
often contain malicious links or files that revealing sensitive information like login
can compromise your device and data. credentials or financial details through
fake emails posing as legitimate
organizations.
Conclusion
• Implement best practices for security to protect your online activities and safeguard your
personal and financial information.
• Stay vigilant and updated on the latest security threats and best practices to maintain a
strong defense against cyber risks.
• Protect your personal and financial information by using strong passwords, enabling two-
factor authentication, and regularly reviewing your privacy and security settings.

You might also like