SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
➢Cyberspace refers to the virtual computer world, and
more specifically, is an electronic medium used to form
a global computer network to facilitate online
communication.
➢It is a large computer network made up of many
worldwide computer networks that employ TCP/IP
protocol to aid in communication and data exchange
activities.
➢Cyberspace's core feature is an interactive and virtual
environment for a broad range of participants.
➢Hacktivism
➢Cybercrime
➢Cyberespionage
➢Cyberterrorism
Hacktivism is the act of hacking, or breaking
into a computer system, for a politically or socially
motivated purpose. The individual who performs an
act of hacktivism is said to be a hacktivist.
Acts of hacktivism may include website
defacement, denial-of-service attacks (DoS), website
parodies, information theft, virtual sabotage and
virtual sit-ins.
❖Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offense (child pornography, hate crimes).
❖Cybercriminals may use computer technology to access
personal information, business trade secrets, or use the Internet
for exploitive or malicious purposes.
❖ Criminals can also use computers for communication and
document or data storage.
❖Criminals who perform these illegal activities are often
referred to as hackers.
Unauthorized spying by computer. The
term generally refers to the deployment
of viruses that clandestinely observe or
destroy data in the computer systems of
government agencies and large
enterprises.
➢Informational resources
➢Entertainment
➢Social networking
Informational resources
The Internet is a virtual library of information.
We can get any kind of information on any topic that
we desire, it will be available on the Internet.
Entertainment
Entertainment is another popular reason why
many people prefer to surf the Internet. We can
download games and music instead of going out of our
comfort zone to get the latest and the game or CD.
There are numerous games that can be downloaded for
free.
Social networking also plays a major role
in cyberspace. One cannot imagine an
online life without Facebook or Twitter.
Social networking has become so popular
amongst youth that it might one day
replace physical networking. It has
evolved as a great medium to connect
with millions of people with similar
interests.
Personal Information: If we use the Internet, our
personal information such as name, address, etc. can be
accessed by other people. If we use a credit card to shop
online, then our credit card information can also be
‘stolen’ which could be akin to giving someone a blank
check.
Spamming
This
unsolicited
refers to sending
e-mails in bulk, which
serve no purpose and unnecessarily
clog up the entire system.
Use different user ID / password
combinations for different accounts and avoid writing
them down. Make the passwords more complicated by
combining letters, numbers, special characters (minimum
10 characters in total) and change them on a regular
basis.
➢Firewalls are the first line of cyber defense;
they block connections to unknown or bogus
sites and will keep out some types of viruses and
hackers.
➢Prevent viruses from infecting our computer
by installing and regularly updating anti-virus
software.
➢Prevent spyware from infiltrating our
computer by installing and updating anti-
spyware software
➢Make sure your social networking profiles (e.g. Face
book, Twitter, YouTube, MSN, etc.) are set to private.
Check your security settings. Be careful what
information you post online. Once it is on the
Internet, it is there forever!
➢Be aware that your mobile device is vulnerable to
viruses and hackers. Download applications from
trusted sources.
cyber space.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Email Ppt
Email PptEmail Ppt
Email Ppt
Dyern
 

Was ist angesagt? (20)

Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & law
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Spam
Spam Spam
Spam
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Ähnlich wie cyber space.pdf

Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 

Ähnlich wie cyber space.pdf (20)

Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 

Mehr von Yashwanth Rm

statement of change in equity.pptx
statement of change in equity.pptxstatement of change in equity.pptx
statement of change in equity.pptx
Yashwanth Rm
 
tax aspects in investment (1).pdf
tax aspects in investment (1).pdftax aspects in investment (1).pdf
tax aspects in investment (1).pdf
Yashwanth Rm
 
riskandreturnmeasurement.pdf
riskandreturnmeasurement.pdfriskandreturnmeasurement.pdf
riskandreturnmeasurement.pdf
Yashwanth Rm
 
review of literature.pptx
review of literature.pptxreview of literature.pptx
review of literature.pptx
Yashwanth Rm
 
ozone and carbon trade.pptx
ozone and carbon trade.pptxozone and carbon trade.pptx
ozone and carbon trade.pptx
Yashwanth Rm
 
methods of data collection research methodology.pdf
methods of data collection research methodology.pdfmethods of data collection research methodology.pdf
methods of data collection research methodology.pdf
Yashwanth Rm
 

Mehr von Yashwanth Rm (20)

Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...Understanding There are many factors All these forces come under one word cal...
Understanding There are many factors All these forces come under one word cal...
 
income statement.pptx
income statement.pptxincome statement.pptx
income statement.pptx
 
statement of change in equity.pptx
statement of change in equity.pptxstatement of change in equity.pptx
statement of change in equity.pptx
 
business ethics ppt.pdf
business ethics ppt.pdfbusiness ethics ppt.pdf
business ethics ppt.pdf
 
tax aspects in investment (1).pdf
tax aspects in investment (1).pdftax aspects in investment (1).pdf
tax aspects in investment (1).pdf
 
riskandreturnmeasurement.pdf
riskandreturnmeasurement.pdfriskandreturnmeasurement.pdf
riskandreturnmeasurement.pdf
 
review of literature.pptx
review of literature.pptxreview of literature.pptx
review of literature.pptx
 
Mod 2.pptx
Mod 2.pptxMod 2.pptx
Mod 2.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Mod.pptx
Mod.pptxMod.pptx
Mod.pptx
 
Cash Book.pdf
Cash Book.pdfCash Book.pdf
Cash Book.pdf
 
4 Presentation Skills.pptx
4 Presentation Skills.pptx4 Presentation Skills.pptx
4 Presentation Skills.pptx
 
comparative stmnt.pdf
comparative stmnt.pdfcomparative stmnt.pdf
comparative stmnt.pdf
 
Acct jargons.pptx
Acct jargons.pptxAcct jargons.pptx
Acct jargons.pptx
 
Global ADVT.pdf
Global ADVT.pdfGlobal ADVT.pdf
Global ADVT.pdf
 
ozone and carbon trade.pptx
ozone and carbon trade.pptxozone and carbon trade.pptx
ozone and carbon trade.pptx
 
value chain analysis.pdf
value chain analysis.pdfvalue chain analysis.pdf
value chain analysis.pdf
 
methods of data collection research methodology.pdf
methods of data collection research methodology.pdfmethods of data collection research methodology.pdf
methods of data collection research methodology.pdf
 
discriminant analysis.pdf
discriminant analysis.pdfdiscriminant analysis.pdf
discriminant analysis.pdf
 
data collection.pdf
data collection.pdfdata collection.pdf
data collection.pdf
 

KĂźrzlich hochgeladen

VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
Adnet Communications
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

KĂźrzlich hochgeladen (20)

(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 

cyber space.pdf

  • 1.
  • 2. ➢Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. ➢It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. ➢Cyberspace's core feature is an interactive and virtual environment for a broad range of participants.
  • 4. Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. Acts of hacktivism may include website defacement, denial-of-service attacks (DoS), website parodies, information theft, virtual sabotage and virtual sit-ins.
  • 5. ❖Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). ❖Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. ❖ Criminals can also use computers for communication and document or data storage. ❖Criminals who perform these illegal activities are often referred to as hackers.
  • 6. Unauthorized spying by computer. The term generally refers to the deployment of viruses that clandestinely observe or destroy data in the computer systems of government agencies and large enterprises.
  • 7.
  • 9. Informational resources The Internet is a virtual library of information. We can get any kind of information on any topic that we desire, it will be available on the Internet. Entertainment Entertainment is another popular reason why many people prefer to surf the Internet. We can download games and music instead of going out of our comfort zone to get the latest and the game or CD. There are numerous games that can be downloaded for free.
  • 10. Social networking also plays a major role in cyberspace. One cannot imagine an online life without Facebook or Twitter. Social networking has become so popular amongst youth that it might one day replace physical networking. It has evolved as a great medium to connect with millions of people with similar interests.
  • 11. Personal Information: If we use the Internet, our personal information such as name, address, etc. can be accessed by other people. If we use a credit card to shop online, then our credit card information can also be ‘stolen’ which could be akin to giving someone a blank check.
  • 12. Spamming This unsolicited refers to sending e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system.
  • 13. Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.
  • 14. ➢Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. ➢Prevent viruses from infecting our computer by installing and regularly updating anti-virus software. ➢Prevent spyware from infiltrating our computer by installing and updating anti- spyware software
  • 15. ➢Make sure your social networking profiles (e.g. Face book, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever! ➢Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.