Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Footprint.

Similar presentations


Presentation on theme: "Information Security Footprint."— Presentation transcript:

1 Information Security Footprint

2 Glossary Responsibilities Society Forums Interact Fear Violence
Word Rights Responsibilities Individuals Society Positive Forums Active Interact Respect Fear Freedom of expression Violence Privacy Threatened Right of response Justice Ownership Perceived Authorship reveal Accurate information Concise Knowledge Footprint Protection Offensive participation Incite

3 Lesson Objectives Identify rights, responsibilities and internet etiquettes. Recognize inappropriate use of techniques. Define “Digital Footprint” Define computer IP address.

4 Enjoy watching !!

5 Rights and Responsibilities

6 Rights and Responsibilities
Rights: allows individuals to grow to their full potential as positive and active member of their society. Responsibilities: are about respect for oneself and others.

7 Activity 1 – Page # 43 Identify which of the concepts below you think are online rights or your online responsibilities. Education – Freedom of expression – privacy- right of response – personal – respect – access to information – ownership/authorship – accurate information – safe environment. Rights Responsibilities Education Freedom of expression Privacy Right of response Ownership/ authorship. Safe environment Personal Respect Access to information Accurate information

8 Activity 2 Define and discuss the Rights in the following fields:

9 Activity 2

10 Responsibilities Respect Oneself Respect Others People must be aware of their own digital footprint and how this affects how they are perceived. People must know that it is their responsibility not to impede the basic rights of others or not to be harmful to others.

11 Activity 3 – Page # 44 Education Freedom of expression
Respect Explain : Everyone has the freedom of expression and to respond to the internet but without diminishing the respect of others Freedom of expression Right of response Access to information Explain: everyone have the right to educate using the internet, but that not mean he can access to privacy information using hacking technique. Education

12 Internet Etiquette Etiquette is a set of behaviour that reaches expectations for social behaviour. Sticking to a set of rules and ethics when using any means of communication is called internet etiquette.

13 Writing & Communication
Internet Etiquette Internet Etiquette Identity Privacy Copyright Writing & Communication

14 Identity ( Culture – Religion)
Don’t harm anyone because of culture or religion. Don’t impersonate others.

15 Don’t reveal sensitive information online.
Privacy & Security Don’t reveal sensitive information online. Have an effective protection program. Avoid pop-up advertising by blocking them. Use strong passwords for all accounts. Be careful when open attachments. Don’t download apps from any website. Don’t do financial transactions when using public wireless network.

16 Refer the information to its source.
Copyright Refer the information to its source. Make sure the information is correct and credible (believable) There are government punishments for the electronic publishing correspondence.

17 Writing and Communication
Use clear and concise language. Avoid spelling errors. Use standard fonts :Times New Roman 12 or 14. Interaction and Responses: Deal with others like you deal with them face to face. Respect others and their opinions. Choose the right words to get your meaning across. If you face offensive ask for help from instructor. When you disagree some ideas express in respectful way.

18 Writing and Communication
Writing and Publishing: Consider others’ privacy. Avoid inappropriate material like photos. Think about your message before send it. Give proper credit when referencing or quoting source. Don’t spread bad and insulting ideas whether religious or based on race, gender and nationality.

19 UAE Cybercrime Law According to article no.9 : anyone convicted of using the internet or any other high-tech means for threatening or blackmailing another person, to incite them to carry out an act or not, shall be sentenced to no more than two years in jail and fined no more than Dhs or both.

20 Activity 4 – Page # 46 As groups , discuss the positive impact of UAE cybercrime law article 9 on individuals and society. Individual Society Individual will not misuse the technology . Reduction of electronic crimes. Ensure the security and safety on internet.

21 Social media etiquette
If someone else breaks these rules, you can just ignore them. Remember everything you post online is public. Don’t post pictures of yourself or others. Don’t give out personal and confidential information online.

22 Cyber Predator People who use the internet to hunt for victims to take advantage of them in some way, including emotionally, psychologically or financially. UAE law punished those by 2 years at most in jail and fine Dhs

23 Enjoy watching !!

24 Types of Digital Footprint
The trail of information that you leave online. Types of digital footprint: Types of Digital Footprint Passive Active Data you unintentionally leave online Ex. * IP address * Browse history * Search history Data you intentionally submit online * * logon to a site * social media

25 IP Address As a home task pls. go through the pages and practice the practical steps to find out your IP address and delete cookies

26 Activity 5 – Page # 51 In your group, identify the things that people should share and shouldn't share: Should Share Shouldn’t Share

27 Tips to Remember Do not share passwords Always log off Use your footprint : history and bookmarks to remember the favorite sites. Some websites log your visit and track the websites you visited before and after their website. Ask adults for help.


Download ppt "Information Security Footprint."

Similar presentations


Ads by Google