Internet and security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Surrey Public Library Electronic Classrooms Essentials.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Threats To A Computer Network
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Behavior Tracking Dhaval Patel.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
Portaportal Portaportal is a web based bookmarking utility that lets you store links to your favorite websites online. Now your bookmarks are no longer.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Computer-made Cookies Presented by Helal Lutfi. What is a Computer Cookie?  A small text file which contains a unique ID tag.  Placed on your computer.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Any criminal action perpetrated primarily through the use of a computer.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Your File System LIBS100 January 26, Word of the Day Network Administrator An information technology professional responsible for setting up, maintaining,
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 24 December 2011Working On-Line (BG)1.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Windows Tutorial 5 Protecting Your Computer
Hotspot Shield Protect Your Online Identity
IT Security  .
Personal spaces.
Using Apps to Get and Share Information
Unit 12 Using the Internet & Browsing the Web
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Yahoo Support Ireland Toll-Free Number:
Importance of Privacy Internet Safety
Guide: How to Set, Get, and Delete Cookies in WordPress? Guided By: wpglobalsupportwpglobalsupport.
Unit 27 Web Server Scripting Extended Diploma in ICT
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
Information Security CS 526 Topic 9
Internet Vocabulary Beth Felton McKelvey.
Browsing in Private Mode
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Internet and security

Binary to decimal conversion 0001=1 0010=2 0011=3 0100=4 0101=5 0110=6 0111=7 1000=8 1001=9 1010=10

Where rightmost bit is called Least Significant bit(LSB) and leftmost bit is called MSB(Most Significant Bit)

privacy Online spying tools: 1.Cookies: A cookie is a small text file that a web browser asks your browser to place on your computer. The cookie contains information about your computer(Its IP address), and you(your user name, password, email address, and information about your visit to the website( your login and logout time, your preferences about the site e.g. your favorite color and last browsing history what are the items you searched last,

4 types of cookie: Persistent: that last at least a year Transient or session cookie: that only during the website visit, it will be deleted as soon as you exit the website. First Party: installed by the same website that you are visiting. Yahoo’s cookie while visiting Yahoo’s website Third Party: installed by the some other website than the one you are visiting. Cookie from a third party online ad company such as DoubleClick while visiting Yahoo’s website

security Spyware: software that tracks a computer user’s activity and report them to someone else. Another common term for spyware is adware because Internet advertising is a common source of spyware. Spam: unwanted mass emails received in your email inbox used a direct marketing tactic. Spam is the Internet equivalent of junk mail received in your mail box.