Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

INTERNET SAFETY-WPS Office (1).pptx

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 15 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie INTERNET SAFETY-WPS Office (1).pptx (20)

Aktuellste (20)

Anzeige

INTERNET SAFETY-WPS Office (1).pptx

  1. 1. INTERNET SAFETY
  2. 2. TOOLS OF INTERNET World Wide Web (WWW): This is the part of the internet that most people are most familiar with. It's the system of interconnected documents and other resources that can be accessed via a web browser. Domain: A domain is the part of a web address that identifies a particular website. For example, in the web address "www.example.com", "example.com" is the domain
  3. 3. • IP address: An IP address is a numerical label Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: it identifies the host or device, and it provides the location of the host in the network. • Server: A server is a computer that provides services to other computers or devices. For example, a web server is a computer that stores and serves web pages to users. • Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.
  4. 4. • Use strong and unique passwords: Use a combination of letters, numbers, and special characters in your passwords and make sure to use different passwords for different accounts. • Enable two-factor authentication: This adds an extra layer of security to your accounts by requiring you to enter a code sent to your phone or email in addition to your password. • Be Careful Who You Meet Online-People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber
  5. 5. • Keep Personal Information Professional and Limited- Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online. • . Keep Your Privacy Settings On-Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available.
  6. 6. • Be cautious of phishing attacks: Be wary of emails or website that ask for personal information or login credentials. If you're unsure about the legitimacy of an email or website, do some research or contact the company directly. • Install anti-virus software: This can help protect your computer from malware and viruses that can steal your personal information or damage your system. • Be mindful of what you share online: Think twice before posting personal information or photos online, and be cautious about accepting friend requests from strangers
  7. 7. • Make Sure Your Internet Connection is Secure.- Use a Secure VPN Connectionimprove your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. • Make Online Purchases From Secure Sites-Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.
  8. 8. TYPES OF INTERNET ISSUES •Malware- • Malware is one of the types of attacks that need maximum defense by a Cyber Safety system. Typically, malware enters your system/ network and denies access to the critical components of the network. There are various types of it such as- • Viruses-A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected. • Spyware-Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user.
  9. 9. •PHISING- • Phising attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is coaxed into providing confidential information, often on a scam website.
  10. 10. CYBER SECURITY A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and disgruntled employees.
  11. 11. CYBER BULLYING Cyberbullying is the act of using the internet to harm someone. There are various forms of cyberbullying. Flaming – This type of cyberbullying involves online fights with angry and vulgar messages. Harassment – Online harassment can take the form of insulting, mean, and derogatory messages online. Denigration – Denigration is when someone posts rumors or gossip about someone online, with the purpose of damaging their reputation. Impersonation – Impersonation means pretending to be someone else to get them in trouble. Outing – Outing is when someone shares somebody else’s secrets, images or information online. Trickery – When people trick someone into revealing things and then post them online, it’s called Trickery. Exclusion – Exclusion is when an individual or a group of people intentionally keeps someone out of an online group. Cyberstalking – Cyberstalking is usually done to create fear in an individual using repeated harassment and denigration.
  12. 12. CYBER BULLYING PREVENTION TIPS FOR STUDENTS • TALK ABOUT IT.- If you’re the target of cyberbullying. Whether it’s your parents, a teacher, or another trusted adult, or even your best friend, never keep to yourself the fact that you’re being bullied. • IGNORE THEM- If there is an isolated incident where you are being bullied, don’t respond to the instigator. Those who cyberbully but who do not get a response from their target may just move on.
  13. 13. • NEVER RETALIATE- Be the bigger person and never retaliate against someone who is mean to you. Retaliation only further perpetuates the cycle of violence, and does nothing to solve the problem. • SAVE THE EVIDENCE-. Record all instances of cyberbullying. Print out social media posts and emails, save texts, and capture screen shots when cyberbullying occurs. You can even make screen recordings of Snapchat, Facebook, or Instagram Stories. • REPORT IT TO THE CONTENT PROVIDER.- If don’t know who is cyberbullying you, contact the provider of the site or platform where the cyberbullying is occurring and make a report.
  14. 14. SAFE DIGITAL BANKING

×