By :Mitchell Christie by :Mitchell Christie Email safety.

Slides:



Advertisements
Similar presentations
Computer Technology Timpview High School. is inexpensive and easy to use and track Spam – s sent in bulk to many peoples accounts;
Advertisements

A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Information about the computer By Sophia and Christina C.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
How to Read Outlook . Make sure the computer is on.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
By Tia, Amy & Carly Don’t share any of these things to anyone:  Phone number  address  Where you live  Your name  Age  Sex  Photos of yourself.
Internet Safety Internet Safety LPM
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Internet Safety By. Connor G. Passwords  Never share your password online to strangers.  A password should be a combination of letters and numbers.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Etiquette & Safety This is based on things you might experience when using you’re .
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
INTERNET SAFETY By Philip & Bryan. SOCIAL MEDIA It is very important to stay safe when on social media sites. Facebook and Snapchat are two of the main.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
 Being free from public attention that means not being watched or disturbed by other people.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
SCHOLARSHIPS You wont get scholarships if you don’t apply for them…
Key words: Secure | Password | Character
Dove science academy Cyber Club
Lesson 3 Safe Computing.
Safe Internet Mechatronika Budapest.
Lesson 2- Protecting Yourself Online
DOVE SCIENCE ACADEMY CYBER CLUB
Unit 4 IT Security Kerris Davies.
Lesson 2- Protecting Yourself Online
COMPUTER SAFTEY IS IMPORTANT….
Safe, secure and empowered
Who Wants To Be A Millionaire?
Fix Hotmail Account Hacked Problems with Hotmail Support Phone Number
Presentation transcript:

by :Mitchell Christie by :Mitchell Christie safety

A strong password makes it harder for people to access your accounts. Use passwords that include at least one number and some capital letters. Don’t make it easy for other people to know your password and change your password every 6 weeks. Password safety

ID fraud This means that when people get your personal details and use them to get into your private things or yours them to get something personal.

Virus A virus is a small computer program that spreads from one computer to another and messes up you computer and my send viruses through .

Spam Its an that’s junk. To protect yourself from getting spam you can unsubscribe to s and watch what your marking.

Hackers Where people hack you bank accounts or other accounts and steal information like passwords names sometimes money and your personal information.