SlideShare a Scribd company logo
1 of 21
COMPUTER RESOURCES
   NICKO Sapnu
   It involves the right or mandate of personal
    privacy concerning the storing, repurposing,
    providing to third-parties, and displaying of
    information pertaining to oneself via the
    Internet.
   The first is that privacy helps individuals
    maintain their autonomy and individuality.
   Because of its functional benefits.
   attempting to acquire information.
   such as usernames, passwords, and credit card
    details by masquerading as a trustworthy
    entity in an electronic communication.
   Is a way to trick computer and Internet users
    into revealing personal and financial
    information through a fraudulent email or
    website.
   Phishing is typically carried out by e-mail
    spoofing or instant messaging.
    Phishing emails may contain links to websites
    that are infected with malware.
   an example of social engineering techniques
    used to deceive users,
   Phishing -a way of attempting to acquire
    information such as usernames, passwords,
    and credit card details by masquerading as a
    trustworthy entity in an electronic
    communication.
   Clone Phishing- A type of phishing attack
    whereby a legitimate, and previously
    delivered, email containing an attachment or
    link has had its content and recipient
    address(es) taken and used to create an almost
    identical or cloned email.
• Whaling- Several recent phishing
  attacks have been directed specifically at
  senior executives and other high profile
  targets within businesses, and the term
  whaling has been coined for these kinds
  of attacks.
• Spear Phishing- Attackers may gather
  personal information about their target
  to increase their probability of success.
   A Fake Facebook Login Page
   An Exploit Kit in a Fraudulent Facebook Page
   A Fraudulent Online Pharmacy Website
   A Fraudster's Order Page
   A Fraudulent YouTube E-mail
   A Fake Virus Scanner
   Disclosure of private information by either
    yourself or friends/contacts.
   Bullying.
   Cyber-stalking.
   Access to age-inappropriate content
   Online grooming and child abuse.
   People hacking into or hijacking your account
    or page.
• Friends’, other people’s and
  companies' posts encouraging you
  to link to fraudulent or
  inappropriate websites.
• People hacking into or hijacking
  your account or page.
• Viruses or spyware contained
  within message attachments or
  photographs.
   Be wary of publishing any identifying
    information about yourself – either in your
    profile or in your posts – such as phone
    numbers, pictures of your home, workplace or
    school, your address or birthday.
   Pick a user name that does not include any
    personal information. For example,
    “joe_glasgow” or “jane_liverpool” would be
    bad choices.
• Set up a separate email account to register and
  receive mail from the site. That way if you want
  to close down your account/page, you can
  simply stop using that mail account. Setting up a
  new email account is very simple and quick to
  do using such providers as Hotmail, Yahoo!
  Mail or gmail.
• Keep your profile closed and allow only your
  friends to view your profile.
• What goes online stays online. Do not say
  anything or publish pictures that might later
  cause you or someone else embarrassment.
• Be aware of what friends post about you, or
  reply to your posts, particularly about your
  personal details and activities.
• Remember that many companies routinely view
  current or prospective employees’ social
  networking pages, so be careful about what you
  say, what pictures you post and your profile.
• Learn how to use the site properly. Use the
  privacy features to restrict strangers’ access to
  your profile. Be guarded about who you let join
  your network.
• Be on your guard against phishing scams.
• Ensure you have effective and updated
  antivirus/antispyware software and firewall
  running before you go online.
   Allows you to browse the Internet without
    saving any information about which sites and
    pages you’ve visited.
   To put Firefox into a temporary state where no
    information about the user's browsing session
    is stored locally.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Start Private Browsing.
   When you turn on Private Browsing, Firefox
    alerts you that it will save your current
    windows and tabs for after you finish using
    Private Browsing. Click Start Private Browsing
    to continue.
   Check the box next to "Do not show this
    message again" if you don't want to receive this
    alert when you turn on Private Browsing.
   The Private Browsing information screen
    appears to confirm that you're in Private
    Browsing mode.
   When browsing in Private Browsing mode, the
    Firefox button will be purple (for Windows XP
    the window title will say (Private Browsing)
    instead) during your session.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Stop Private Browsing.




The windows and tabs you were using when you enabled Private
Browsing will appear, and you can use Firefox normally. The Firefox
button will turn orange again (for Windows XP the Firefox window title
will no longer say (Private Browsing)) when Private Browsing is off.
   It is safe for your computer data security.
   No one can track your data when you use
    secure browsing or private browsing.
   this is the safe and secure way for online
    banking .
   it clear the history and passwords when you
    close the browser.

More Related Content

What's hot

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
thaash95
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
Abhishek Gupta
 
6 online identity
6 online identity6 online identity
6 online identity
COMP 113
 
online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Phishing
PhishingPhishing
Phishing
Syahida
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
computers 11
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 

What's hot (19)

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
6 online identity
6 online identity6 online identity
6 online identity
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Phishing
PhishingPhishing
Phishing
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 

Similar to Online privacy

Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
Rozell Sneede
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 

Similar to Online privacy (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Online privacy

  • 1. COMPUTER RESOURCES NICKO Sapnu
  • 2. It involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet.
  • 3. The first is that privacy helps individuals maintain their autonomy and individuality.  Because of its functional benefits.
  • 4.
  • 5. attempting to acquire information.  such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Is a way to trick computer and Internet users into revealing personal and financial information through a fraudulent email or website.
  • 6. Phishing is typically carried out by e-mail spoofing or instant messaging.  Phishing emails may contain links to websites that are infected with malware.  an example of social engineering techniques used to deceive users,
  • 7. Phishing -a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Clone Phishing- A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
  • 8. • Whaling- Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks. • Spear Phishing- Attackers may gather personal information about their target to increase their probability of success.
  • 9. A Fake Facebook Login Page  An Exploit Kit in a Fraudulent Facebook Page  A Fraudulent Online Pharmacy Website  A Fraudster's Order Page  A Fraudulent YouTube E-mail  A Fake Virus Scanner
  • 10. Disclosure of private information by either yourself or friends/contacts.  Bullying.  Cyber-stalking.  Access to age-inappropriate content  Online grooming and child abuse.  People hacking into or hijacking your account or page.
  • 11. • Friends’, other people’s and companies' posts encouraging you to link to fraudulent or inappropriate websites. • People hacking into or hijacking your account or page. • Viruses or spyware contained within message attachments or photographs.
  • 12.
  • 13. Be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday.  Pick a user name that does not include any personal information. For example, “joe_glasgow” or “jane_liverpool” would be bad choices.
  • 14. • Set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as Hotmail, Yahoo! Mail or gmail. • Keep your profile closed and allow only your friends to view your profile. • What goes online stays online. Do not say anything or publish pictures that might later cause you or someone else embarrassment.
  • 15. • Be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities. • Remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile. • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network. • Be on your guard against phishing scams. • Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.
  • 16. Allows you to browse the Internet without saving any information about which sites and pages you’ve visited.  To put Firefox into a temporary state where no information about the user's browsing session is stored locally.
  • 17. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Start Private Browsing.
  • 18. When you turn on Private Browsing, Firefox alerts you that it will save your current windows and tabs for after you finish using Private Browsing. Click Start Private Browsing to continue.  Check the box next to "Do not show this message again" if you don't want to receive this alert when you turn on Private Browsing.
  • 19. The Private Browsing information screen appears to confirm that you're in Private Browsing mode.  When browsing in Private Browsing mode, the Firefox button will be purple (for Windows XP the window title will say (Private Browsing) instead) during your session.
  • 20. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Stop Private Browsing. The windows and tabs you were using when you enabled Private Browsing will appear, and you can use Firefox normally. The Firefox button will turn orange again (for Windows XP the Firefox window title will no longer say (Private Browsing)) when Private Browsing is off.
  • 21. It is safe for your computer data security.  No one can track your data when you use secure browsing or private browsing.  this is the safe and secure way for online banking .  it clear the history and passwords when you close the browser.