What is Internet? - Is a worldwide collection of computers networks, cooperating with each other to exchange data using a common software standard, on.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Implications and Security Issues of the Internet By Neelesh Patel.
The Internet.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Company LOGO Internet Safety A Community Approach.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Digital Citizenship Project By Allen Naylor Ed 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
LESSON 2: Internet, Computer Ethics and Security
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Is a worldwide collection of computer networks, cooperating with each other to exchange data. The Internet provides the following main facilities: 1. .
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
ST. JOHN WHAT IS INTERNET?? The internet is a worldwide collection of computer network The internet provides following main facilities: 1 2 chat.
IT Security  .
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
CYBERSAFETY & Personal information
Lesson 2- Protecting Yourself Online
Presentation transcript:

What is Internet? - Is a worldwide collection of computers networks, cooperating with each other to exchange data using a common software standard, on which end-user services, such as world wide web sites or data archives, are located, enabling data and other information to be exchange also called the net. Global connection The internet provides the following main facilities: Chat Searching jobs Advertising for business E-commerce Searching information

What is Website? A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combine together to provide some kind of useful information. All the data found on a website is bounded together by code, which can range from simple markup like Html to less simple scripting languages like PHP, Perl or Asp.

Types of Website Portal Website – is a web site which aggregates many function. News website – are similar to blogs, in that they present stories in reverse-chronological order. Informational Website-are dedicated to the purpose of providing information – whether free or paid. They can include anything like : news websites, science websites, encyclopedias, business news websites, websites giving analysis on some subject, medical information websites, educational websites, websites that give information on a subject like this websites, university/college/school websites and others. Business/Marketing Website-Professional websites that are built purely for business reasons. Business websites can be divide into: Small business. Large Business Educational Website- have the potential to be more than a compendium of information Entertainment Website-is to provide a diversion for your audience that depart from their everyday life experience. Advocacy Website- Opinions or Ideas Blog Sites- reverse-chronological order. Wiki Websites- It can be Edited, by who have accounts on the wiki. Content Aggregator Website- organization that gathers web content Social websites- is a social networking Search Engine, directories, Yellow pages and portal Websites- Some engine companies like Google or Gigablast

Computer Ethics Is the responsible use of computers and computers network. Netiquette, or net etiquette, refers to etiquette on the internet 1.Real People Exist Behind The computers 2.Protect your Privacy 3.Avoid Spamming Day-To-Day Ethics  Software Piracy-Simply produces it and distributes.  Computer Viruses/Worms- Like stealing information or destroying.  Plagiarism-copying someone else’s work.  Hacking-accessing others computers.  File Privacy-Remain Private.  Intellectual Property Rights- Refers to the ownership.  Copyright-is a legal means of protecting an author’s work.  Information Privacy-Privacy of personal information. COMPUTER SECURITY RISK -Very General Statement because many things are in fact, computer Security risks.

The Republic Act: Anti-Cyber Crime Law 1. Illegal Access 2. Illegal Interception 3. Data Interference 4. System Interference 5. Misuses of Devices 6. Cyber-squatting 7. Computer-related Forgery 8. Computer-related Fraud 9. Computer-related Identity Theft 10. Cybersex 11. Child Pornography 12. Unsolicited Commercial Communications 13. Libel COPUTER AND INTERNET SECURITY MEASURES  Protection From Threats  Hardware Theft  Non-Criminal Security Threats  How To Secure Personal Computers 1. Work With Your It Department 2. Use Strong Passwords 3. Don’t Enable the save password option 4. Use Network File Shares instead of local file shares 5. Lock Your Computer When You Leave Your Desk 6. Use Password Protection on Your Screensaver 7. Encrypt Files Containing Confidential or Business Critical Files

How To Secure PC When Online 1. Invest in trusted, multi-faceted security software. 2. Always access the internet from behind a firewall. 3. Use a PC you know is secure. 4. Watch out for phishing scams. 5. Secure your wireless network. 6. Never install potentially unwanted programs (PUPs) Like spyware or adware on your PC. 7. Do not answer chain Monitor your credit reports and be aware. 9. Monitor your children’s online activity. 10. Make regular backups of critical data. 11. Don’t open questionable s. 12. Encrypt messages when appropriate. 13. Use the junk Filter in outlook.

87% of Filipino Internet users have been victims of cybercrimes–DOJ MANILA, Philippines — Almost 9 out of 10 Filipino Internet users have been victimized by cybercrime or a malicious activity on the Internet at one time or another, the Department of Justice (DOJ) primer on facts and trends about cybercrimes committed in the country, said on Tuesday. The primer on Philippine cybercrime has been prepared by the DOJ as part of its advocacy program to prevent abuses in cyberspace as the legality of the new law against cybercrime is being deliberated in the Supreme Court.

Cyber crime refers to illegal activities that take place online, including fraud, spam, identity theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or spyware, phishing schemes and the like. Most people become victims of these at one time or another, but there are ways to avoid or deal with cyber crime by protecting yourself appropriately

How to Prevent Cyber Crime Instructions: 1. Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages, such as fraudulent s and phishing s, from getting to your inbox. 2. Make sure you have adequate anti-virus software for your computer, such as McAfee, Norton Anti- Virus, STOPzilla or other similar programs. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems. If you don't want to purchase security software, then there are programs, such as AVG, that offer free versions. 3. Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on. 4. Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system. 5.Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number. 6. Make sure that you do online shopping on a secure website, like those with a URL that starts with "https" and/or have a Trustee or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud. 7. Avoid getting taken in by common scams, such as foreign lotteries, phony sweepstakes and similar methods used by cyber criminals to get your personal information and money. If it sounds too good to be true, it probably is. 8.Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and activity. A wise thing to do is to use parental control software that limits the types of sites the user can gain access to.

REFERENCES USED IN THE RESEARCH internet-users-have-been-victims-of-cybercrimes-doj crime.html PRESENTED BY : Romel Celestino & Neil Baron Evangelista