SlideShare une entreprise Scribd logo
1  sur  15
• The internet is
forever
• Do not post personal
information
• Smartphone safety
• Hacking advices
• If you post anything on
the internet even your
grandchilds will be able
to search for it.
• Everything that is on the
internet will last forever!
• You must be careful and
decide what you want to
upload using your head.
• Do not post personal
information such as
phone numbers or
email addresses on
the internet.
• This leaves you
unprotected against
cyber bullies.
• Do not accept
phonecalls from
unknown people.
• Either messages!
• No matter how safety
is something, there
still are chances to be
hacked.
• Once you’ve been
hacked, there are
some advices you can
follow to escape from
the hack.
• This one must be
more secure than
the hacked one.
• There are some
websites that can
determinate the
strenght level of
your password.
• Go and check if you
are able to use this.
• This consists of a
secondary question
which you can
increase your
security with.
• Go and check your
email to know if you
have some spam or
phishing links.
• You must download
an antivirus if this
happens.
• If you are having a virus
inside your computer, go
and make a backing to
your files.
• Perhaps you can lose
them.
• Keep them into an
external hard drive to
not lose them!
• With the latest
patches, and use a
less-targeted
browser such as
Chrome or Firefox.
• If your login
credentials are ever
grabbed by a hacker,
the attacker will
have inadvertently
gained access to
your entire digital
world.
• We live in a digital
age in which we can
download just about
anything we want to
watch, listen to or
use… and have
access to it almost
immediately.
• Internet is not a
world of care bears!
You received a gift,
an invitation, found
a USB stick or are
asked to perform a
specific action to
your computer.

Contenu connexe

Tendances

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

Tendances (20)

Data security
Data securityData security
Data security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
cyber security
cyber securitycyber security
cyber security
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

En vedette

Processos de separação de misturas
Processos de separação de misturasProcessos de separação de misturas
Processos de separação de misturas
Hugo Cruz Rangel
 

En vedette (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet more secure (1)
Internet more secure (1)Internet more secure (1)
Internet more secure (1)
 
Security tips
Security tipsSecurity tips
Security tips
 
Security tips
Security tipsSecurity tips
Security tips
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Processos de separação de misturas
Processos de separação de misturasProcessos de separação de misturas
Processos de separação de misturas
 
Approaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccinesApproaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccines
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Tic(1)
Tic(1)Tic(1)
Tic(1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to improve performance
How to improve performanceHow to improve performance
How to improve performance
 
3Com 3C13889A
3Com 3C13889A3Com 3C13889A
3Com 3C13889A
 
274
274274
274
 
Factors affected 20th century novel
Factors affected  20th century novelFactors affected  20th century novel
Factors affected 20th century novel
 
Presentacion plan de empresa
Presentacion plan de empresaPresentacion plan de empresa
Presentacion plan de empresa
 
Casuísticas planificación curricular aguaytía
Casuísticas planificación curricular  aguaytíaCasuísticas planificación curricular  aguaytía
Casuísticas planificación curricular aguaytía
 
Preshow
PreshowPreshow
Preshow
 

Similaire à Internet security

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
Belinda Larson
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
ahad55
 

Similaire à Internet security (20)

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Dernier

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Dernier (20)

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 

Internet security

  • 1.
  • 2. • The internet is forever • Do not post personal information • Smartphone safety • Hacking advices
  • 3. • If you post anything on the internet even your grandchilds will be able to search for it. • Everything that is on the internet will last forever! • You must be careful and decide what you want to upload using your head.
  • 4. • Do not post personal information such as phone numbers or email addresses on the internet. • This leaves you unprotected against cyber bullies.
  • 5. • Do not accept phonecalls from unknown people. • Either messages!
  • 6. • No matter how safety is something, there still are chances to be hacked. • Once you’ve been hacked, there are some advices you can follow to escape from the hack.
  • 7. • This one must be more secure than the hacked one. • There are some websites that can determinate the strenght level of your password.
  • 8. • Go and check if you are able to use this. • This consists of a secondary question which you can increase your security with.
  • 9. • Go and check your email to know if you have some spam or phishing links. • You must download an antivirus if this happens.
  • 10. • If you are having a virus inside your computer, go and make a backing to your files. • Perhaps you can lose them. • Keep them into an external hard drive to not lose them!
  • 11.
  • 12. • With the latest patches, and use a less-targeted browser such as Chrome or Firefox.
  • 13. • If your login credentials are ever grabbed by a hacker, the attacker will have inadvertently gained access to your entire digital world.
  • 14. • We live in a digital age in which we can download just about anything we want to watch, listen to or use… and have access to it almost immediately.
  • 15. • Internet is not a world of care bears! You received a gift, an invitation, found a USB stick or are asked to perform a specific action to your computer.