Personal spaces.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Internet Basics. Its all going mobile All of what we have discussed can be achieved via mobile phones! This is also know as Convergence.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
CCT355H5 F Presentation: Phishing November Jennifer Li.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Internet Safety LPM
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Any criminal action perpetrated primarily through the use of a computer.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Keeping you and your computer safe in the digital world.
Rahul Nirmal 06/20/2010.  Search Engines  Facebook   Microsoft Office  Computer Security  Hardware/Software Maintenance.
Safety.
Facebook privacy policy
Hotspot Shield Protect Your Online Identity
IT Security  .
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Internet and security.
Topic: Operating Online
Topic 6: Issues Press F5 to view!
Privacy or Security Are they the same?
What is Web Browsers - What is Blogs-
Call us on (Toll-free). How to Manage the Norton Identity Safe Logins Those Login information that you store in Identity Safe includes.
AVG Antivirus Tech Support Number
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Bethesda Cybersecurity Club
Browsing in Private Mode
What devices use the internet?
Presentation transcript:

Personal spaces

Types of personal spaces Personal websites VLE Forums Blogs Social networking sites Online photo albums

Security rules on personal spaces Do not post anything online that you would not made public Minimise details that identify you or your whereabouts Not to share your account details online Only share with people you know Do not use the GPS function on your phone and share it with people you do not know

Your online reputation Search details on search engines such as google and yahoo Act if you see or read something about you do not like

Cookies Small text files sent to your computer by most websites when you visit them. they are stored on your computer and are used to track what you do on that website. This is used on order they might suggest things you like

What are the benefits of cookie Give two reasons why you should delete cookies from your computer

Controlling cookies Cookies track your browsing activity Get the browser to accept or reject cookies Get the browser to promote for cookies All websites who use cookies they to have a privacy policy describing the use of cookies

Spyware Identity theft Hackers can install software called Trojans to spy on your computer hackers can find out your personal and financial information as you enter it, and use it to commit fraud

Phishing Sent to get information out of people, is often urgent because they want you to hand over your information without thinking. Banks will never contact by emails Look for the greeting Check URL from the bank

Preventing spyware Use a firewall to stop auto download remotely accessed Install antispy software Be aware of downloading free music Download form websites you trust Never click ok or close on windows your not sure of