Download presentation
Presentation is loading. Please wait.
Published byNorma Stewart Modified over 9 years ago
1
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT : 2011390663
2
o E-safety is about measures and best practices fer netizens to guard their personel safety and the security of their network. E-Safety
3
Conditions where digital security breaches & attacks can happen Understand the effects of various kind of security breaches & attacks. Ways to get protect from security breaches & attacks. Important to safe guard digital safety and security. Shared Resources VS Dedicated Resources
4
Downloading pirated software Printing a lot of personel files Storing files that have nothing to do work such as personel photo files in the share storage
6
SPAM emails? - randomly sent email purporting to come from an organisation or individual and claim to contain urgent news, confirmation of a non-existent order. Why? - to get as much personal information from a user as possible. This includes login information, date of birth, and other identifiable information that can help Cyberstalkers open up bogus accounts under your name or steal from your existing ones. Effect? Visiting to this web site with an unprotected computer and web browser allows the attacker to run spyware on your PC.
7
Self Awareness Online Banking: Only do online banking in the security of your own home if at all possible. Identity Theft Phishing. keeping up to date is very important.
8
Implement policy Good Password Practice: Use strong password. Hard to guess.use hardly password Changed periodically by force password change on first login and establish a maximum password lifetime. it will minimize the risk of unauthorized access. Kept it secret. be VERY careful where it’s stored and don’t tell anyone else your password. And the most important thing is, you can remembered it: Embedding special characters like “P@sswOrd”. Use the first letters of a common phrase and throw in some special characters and numbers like “Hope for the best, plan for the worst” to “H4tb,p4tw”.
9
Implement policy on shared resources A shared resource or network share is a device or piece of information on a computer that can be remotely accessed from another computer via a local area network or Intranet. It can be a file access, printer, scanner or etc Best Practice: Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job. Ensure users have the correct hardware, resources and software in place to protect them against data breaches. Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications Ensuring users log off their accounts, turn of computers and don’t share passwords with others to prevent people accessing data. Plan backup and recovery strategy to ensure organisation functioning well. Ask user to report immediately to network admin if they see something weird on your pc.
10
Identify theft:the importance of securing personel information on that computer. Pishing email:phish,yir money gone. Hacker and cracker:kaspersky’s Malaysian site Hacked By Turkish Hacker. Cyber Stalking:Cyber Stalking a serious threat Cyber Bullying:Nine teenegerfs chared in the death of phoebe Prince Internet Predator:Calgary Man with luring 6 girls.
11
Dismantle the computer Take out the hard driver Physically destroy the hard disk
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.