What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
World has change Which side do CHOOSE you. A fight between GOOD EVIL.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Company LOGO Internet Safety A Community Approach.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
BY AISLING PHILPOTT e-safety. S s can be dangerous because you could Fall victim to a scam for money. you could fall for someone wanting to.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety Presentation for Families. Keeping Kids Safe What are they doing online? What are some of the concerns? How do we keep them safe?
Internet Dangers Technology Communication Tools E-Literate.
CYBER INTERACTION & COLLABORATION MODULE 4. LEARNING OUTCOMES By the end of this module, you should be able to: 1.Identify current digital tools for communication.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
Mass Media – the Internet  Role of media  Types of media  What is the Internet  www  Information on the Internet  Usage of the Internet  Favourite.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Information Technology. *At Home *In business *In Education *In Healthcare Computer Uses.
Safety.
Using a Computer Network
How And The Internet Work
Video: Digital citizenship is defined as the norms of appropriate,
Prepared By : Binay Tiwari
الانترنت والبريد الإلكتروني
Social Issues in Computing
Social Issues in Computing
Mass Media – the Internet
Mass Media – the Internet
Presentation transcript:

What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.

What can you do on the internet?

Internet Security ?

Network Vulnerabilities

Forms of internet dangers:- -identity theft -phishing s -hacker and cracker -cyber stalking -cyber bullying -internet predator

Shared Resources vs Dedicated Resources? a)Shared resources refer to devices or information on a computer that can be shared or accessed by many users. b) Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.

Unethical behavior:- -download pirated software -printing and storing photo files or personal files not work related -sending spam s -causing congested or overwhelmed bandwidth by loading large files.

Right ways to dispose of computer? 1 Dismantle computer. 2 Take out the hard drive. 3 Physically destroy the hard drive.

7 LEVELS OF CHANGE WITH INTERNET USAGE 1 DOING THINGS RIGHT 2 DO THE RIGHT THINGS 3 DO AWAY WITH THINGS 4 DO THINGS BETTER 5 DO THINGS OTHER PEOPLE ARE DOING 6 DO THINGS THAT HAVEN’T BEEN DONE 7 DO THINGS THAT CAN’T BE DONE