SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Internet Safety
Click for details Click for details Click for details
Cyber Security Cyber Safety Cyber Ethics
Definition: Cyber security is the body of technologies, processes and
practices designed to protect networks, computers, programs and data from
attack, damage or unauthorized access. In a computing context, the
term security implies cyber security.
Cyber Security
Steps
•Place computer in high traffic area.
•Install effective security software
-Layered with Anti-virus, anti-spyware, and a firewall.
•Enable Parental controls
Definition: Cyber safety is the safe and responsible use of information and
communication technology. It is about keeping information safe and secure,
but also about being responsible with that information, being respectful of
other people online, and using good 'netiquette' (internet etiquette).
Cyber Safety
Steps
•Establish family PC rules and post them next to the computer.
-Never reveal the password, phone numbers, addresses or personal
information to strangers.
-Never post inappropriate photos online.
- Never open attachment from strangers etc.
Definition: Cyber ethics is the philosophic study of ethics pertaining to
computers, encompassing user behavior and what computers are
programmed to do, and how this affects individuals and society.
Cyber Ethics
Steps
•Report any illegal activities to parents and/or authorities.
•Understanding that internet could be dangerous.
•Applying real-world common sense while using internet.
•Knowing what unsafe websites are and staying away from them.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
carlyxxjo55
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
cikgushaharizan
 
Security privacy health environmental
Security privacy health environmentalSecurity privacy health environmental
Security privacy health environmental
herbison
 

Was ist angesagt? (17)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber security
Cyber security Cyber security
Cyber security
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
Security privacy health environmental
Security privacy health environmentalSecurity privacy health environmental
Security privacy health environmental
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Andere mochten auch

Initial Idea for Music Video
Initial Idea for Music VideoInitial Idea for Music Video
Initial Idea for Music Video
RachelElizaaa
 
Question 2
Question 2Question 2
Question 2
laceyu
 
Idj 3 (portfolio)
Idj 3 (portfolio)Idj 3 (portfolio)
Idj 3 (portfolio)
Edy Wijaya
 

Andere mochten auch (14)

Hydrolyzed milk formula for prevention of allergy, an updated meta analysis
Hydrolyzed milk formula for prevention of allergy, an updated meta analysisHydrolyzed milk formula for prevention of allergy, an updated meta analysis
Hydrolyzed milk formula for prevention of allergy, an updated meta analysis
 
Red Fox Revamp
Red Fox Revamp Red Fox Revamp
Red Fox Revamp
 
Media evaluation 5
Media evaluation 5Media evaluation 5
Media evaluation 5
 
Hyper IgD syndrome
Hyper IgD syndromeHyper IgD syndrome
Hyper IgD syndrome
 
Esta soy
Esta soyEsta soy
Esta soy
 
ICT 2013 - DFRC AG
ICT 2013 - DFRC AGICT 2013 - DFRC AG
ICT 2013 - DFRC AG
 
Initial Idea for Music Video
Initial Idea for Music VideoInitial Idea for Music Video
Initial Idea for Music Video
 
fasle 10 ketab hach
fasle 10 ketab hachfasle 10 ketab hach
fasle 10 ketab hach
 
Leadership Concerns in the 21st century
Leadership Concerns in the 21st centuryLeadership Concerns in the 21st century
Leadership Concerns in the 21st century
 
Puasa romadon online 2013
Puasa romadon online 2013Puasa romadon online 2013
Puasa romadon online 2013
 
Essay english
Essay   englishEssay   english
Essay english
 
Question 2
Question 2Question 2
Question 2
 
Idj 3 (portfolio)
Idj 3 (portfolio)Idj 3 (portfolio)
Idj 3 (portfolio)
 
Vomar Voordeelmarkt Haarlem - JosDeVries The Retail Company
Vomar Voordeelmarkt Haarlem - JosDeVries The Retail CompanyVomar Voordeelmarkt Haarlem - JosDeVries The Retail Company
Vomar Voordeelmarkt Haarlem - JosDeVries The Retail Company
 

Ähnlich wie Webgraphicorganizerkaur

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
jayveeperez1
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Tanvi Jindal
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 

Ähnlich wie Webgraphicorganizerkaur (20)

Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Jason r mc kinney halfday
Jason r mc kinney halfdayJason r mc kinney halfday
Jason r mc kinney halfday
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 

Kürzlich hochgeladen

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Kürzlich hochgeladen (20)

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 

Webgraphicorganizerkaur

  • 1. Internet Safety Click for details Click for details Click for details Cyber Security Cyber Safety Cyber Ethics
  • 2. Definition: Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. Cyber Security Steps •Place computer in high traffic area. •Install effective security software -Layered with Anti-virus, anti-spyware, and a firewall. •Enable Parental controls
  • 3. Definition: Cyber safety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette). Cyber Safety Steps •Establish family PC rules and post them next to the computer. -Never reveal the password, phone numbers, addresses or personal information to strangers. -Never post inappropriate photos online. - Never open attachment from strangers etc.
  • 4. Definition: Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. Cyber Ethics Steps •Report any illegal activities to parents and/or authorities. •Understanding that internet could be dangerous. •Applying real-world common sense while using internet. •Knowing what unsafe websites are and staying away from them.