Internet Dangers Technology Communication Tools E-Literate.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Digital Citizenship Corbin Elementary.
Primary Threats to Computer Security
The Other Type of Networking: Social Networks using the Internet Dr.Mike Neal Nicole S. Horn University of Kansas March 11,2009.
Breaking Trust On The Internet
World has change Which side do CHOOSE you. A fight between GOOD EVIL.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
E-safety Quiz. Which one of these is not safe to share on your profile? Question 1.
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Company LOGO Internet Safety A Community Approach.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
E-ACCESS  An example of technology use in e- Access are : 1.Laptop 2.Tablet 3.handphone.
Internet Safety North Boone High School 2011 Mrs. Lenser.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE INFORMATION SAFETY & SECURITY Place yourself to be VICTIM while online?
Netiquette and Online Safety You know who it is! JOSH COHEN.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
Module 6 Using the Internet for Working & Learning.
GOOD COMPUTER SAFETY FOR 1 MALAYSIAN HEALTH CARE
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
ESafety Presentation Project Unit 1 – eSafety
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
INTERNET: The Good, The Bad and The Ugly
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
 Advance to the next slide to begin your Scavenger Hunt.  Click on each button for Scavenger Hunt directions.  When finished, hand in your internet.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Internet Safety Presentation for Families. Keeping Kids Safe What are they doing online? What are some of the concerns? How do we keep them safe?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Safety.
Personal spaces.
Homeland Security: Computer Protection
Year 10 ICT ECDL/ICDL IT Security.
Call AVG Antivirus Support | Fix Your PC
Presentation Project Year 7
Unit 4 IT Security Kerris Davies.

Presentation transcript:

Internet Dangers Technology

Communication Tools E-Literate

Computer E-Literate

Internet Connection Myspace Yahoo Messenger E-access

BUT……. IS IT SAFE ?

Internet Threat e-Safety Identity Theft Phishing s Hacker and Cracker Cyber stalking Cyber Bullying Internet Predator Cyber Crime

Internet Threat e-Safety

Be careful….

How to be careful?

Self awareness Technology : Antivirus Technology: Browser Security Social Networking Websites ONLINE PROTECTION e-Safety

Automatic Updates Firewall Backup Perental Control ONLINE PROTECTION e-Safety

Keep online safely Choice at your hands

Conclusion : The internet is an excellent resource for human but internet can pose variable hazard. We need to be careful and aware about the potential danger especially cyber crime. By using the latest technology or online protection, we can prevent internet threat while using the internet connection.

References : Google image : - internet safety - browser icon - communication devices - internet threat Power point slide - templates/344-networking_0809/ templates/344-networking_0809/