Course Title: WEB SECURITY Chapter No: 02 “I nternet: S ocial T hreats and S afety ” 1 Maiwand Institute Of Higher Education.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Digital Awareness--Lesson 1 START. Internet safety isnt about a bunch of rules telling you never do this, or trying to scare you into safe behavior. Internet.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Information for Students and Families
INTERNET SAFETY FOR EVERYONE
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship By: Miranda Scorver.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
Cyberbullying Online Social Aggression Guidelines for Educators.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
What is Spam? d min.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
Personal Safety Online
Lesson 2- Protecting Yourself Online
Presentation transcript:

Course Title: WEB SECURITY Chapter No: 02 “I nternet: S ocial T hreats and S afety ” 1 Maiwand Institute Of Higher Education

Internet Safety The internet has revolutionized(changed) the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday tasks. However, there are a number of risks associated( related ) with going online. These result from either visiting malicious websites or unintentional disclosure (leak, release) of personal information. Maiwand Institute Of Higher Education 2

Internet Safety Internet Safety, or Online Safety, is the knowledge of maximizing the user's personal safety and security risks on private information and property associated with using the internet, and the self-protection from computer crime in general. Maiwand Institute Of Higher Education 3

Need of Internet Safety As the number internet users continue to grow worldwide, internet safety is a growing concern for both children and adults. Common concerns regarding safety of the internet include:  malicious users (Spam, Phishing, Cyber- bullying, Cyber-stalking etc.),  websites and software ( Malware, Computer Virus, etc.) and  various types of obscene or offensive(agreessive) content. Several crimes can be committed on the Internet such as stalking, identity theft and more. Maiwand Institute Of Higher Education 4

Security Concerns Information Security Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property. Maiwand Institute Of Higher Education 5

Causes of Information Security Common causes of information security breaches include: Phishing Cyberstalking Cyberbullying Obscene/Offensive Content Maiwand Institute Of Higher Education 6

Phishing Phishing is a type of scam (cheat) where the scammers disguise (mask) as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through s and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legal equivalent to avoid suspicion from the user. Maiwand Institute Of Higher Education 7

Cyberstalking Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact, monitoring, making threats, identity theft, damage to data or equipment, or gathering information that may be used to harass. Maiwand Institute Of Higher Education 8

Cyberbullying Cyberbullying is often an extension of bullying (harasment) outside the internet, and may take form in many different ways. For example, the malicious user might release images of the user without his or her consent. Cyberbullying often stems from real-life bullying, this is largely a social concern, rather than internet safety. Cyberbullying occurs more frequently than real- life bullying as the internet provides often provides means to carry out bullying while allowing the doer to remain anonymous and hidden, avoiding backlash in the process. Maiwand Institute Of Higher Education 9

Obscene/Offensive Content Various websites on the internet may contain offensive, distasteful or explicit material, which may often be not of the user's liking. Such material may sometimes be stumbled upon through chance and may have adverse effect on users, particularly children. Such websites may include shock sites, hate speech or otherwise inflammatory content. Offensive content may manifest in many ways, such as pop-up ads and unsuspecting links. Maiwand Institute Of Higher Education 10

Prevention/ Securing Information Keep shared information at a minimum Passwords PINs Social Network Websites Keeping Up-to-Date Avoid Scams Maiwand Institute Of Higher Education 11

Keep shared information at a minimum Cyberstalking and identity theft often begins by malicious users identifying the user through identifying information provided by the user himself. It is important to remember that information posted online may be seen by more people than is originally intended. Social networks make it simple to inadvertently share details about oneself (address, phone number, birthday, etc.), so as a precaution, it is best not to input this type of information onto these websites. Maiwand Institute Of Higher Education 12

Keep shared information at a minimum It is also a common occurrence for users to make the mistake of sharing small bits of information occasionally, and through the use of search engines and some research it is possible to piece these information together to identify the user. As such, avoid sharing personal information and personal history whenever possible. When creating usernames, websites, or addresses, avoiding using anything that reveals any useful information such as a year of birth. Passwords and PINs should never be shared under any circumstances. Maiwand Institute Of Higher Education 13

Passwords Passwords are often created to keep personal information and property secure. If a password is compromised, it may lead to consequences such as financial theft from online services such as bank accounts. One common way that passwords may be compromised is through repeated guessing. Weak passwords make this process easier, so it is important that passwords be strong. Maiwand Institute Of Higher Education 14

Passwords Creating strong passwords is a way of keeping information secure. A strong password may contain the following: At least 10 characters Both upper and lower case letters Numbers Symbols (if allowed) Does not contain dictionary words Maiwand Institute Of Higher Education 15

PINs PINs, like passwords, are means of keeping information secure. A PIN may consist of at least 4 digits. Birthdays, birth-years, consecutive numbers, repeating numbers, and banking PINs should not be used as PINs for your internet accounts. Maiwand Institute Of Higher Education 16

Social Network Websites Profiles on social network websites may be seen by people you may not know. These websites often have privacy settings that you can alter so you can control who sees you profile and what information they are allowed to see. Do not accept friend requests from people you don't know. Maiwand Institute Of Higher Education 17

Keeping Up-to-Date Many computer software, such as operating systems, are not without flaws. Computer viruses often take advantage of these flaws to gain unauthorized access to a user's computer. Operating systems, anti-viruses, and any other programs should be kept up-to-date with the newest security updates in order to keep viruses and harmful software from taking advantage of exploits that have been fixed with updates. Maiwand Institute Of Higher Education 18

Avoid Scams Be cautious of the internet. Avoid misleading ads, strangers with offers, strange s, and questionable websites. Do research to verify the validity of these offers. If someone you know is sending you messages that don’t seem like themselves, their account may have been taken over by somebody trying to get information out of you. The best way to avoid scams is to be fully informed of the deal. Maiwand Institute Of Higher Education 19

Tips It's best to have three accounts. One for friends and websites and the other for job alone and the other for your personal clients, bank correspondence, job hunting and other secure things. Use a proper name and a difficult password for the last two. Keep a backup of important s and documents on a USB flash drive, or in print or both. Use good hints that only you will know the answer to. Maiwand Institute Of Higher Education 20