SlideShare a Scribd company logo
1 of 9
Web sharing----IT
By
1B
 CATHY WONG
(28)
 http://infosec.gov.hk/english/main.html
What is IT?
IT mean information Technology
Use to Management and processing of
information.
What is the main theme of the
website???
● Teach you how to be a smart computer
user.
● resources on information security as well as
measures and best practices for
prevention of cyber crimes.
How can students protect their
privacy??
● Learn how to use the site and take careful
note of the privacy statement for the site.
● Be wary of saying anything or publishing
any identifying information about yourself
How to protect your computer?
● Install & Enable Anti-virus & Anti-spyware
Software
● Install and enable personal firewall
● Apply security patches regularly
Why I choose this website
It have somethings the other website hasn't
Example of internet fraud
Technical References
Games
Glossary
What it has?
● Different point for different people
● students youngsters
● parents teacher
● Colorful picture
● A Lots of useful information
comment
● Too many information, it make the website look
order less.
● Can say somethings about what the government do
to solve the problem of internet fraud.
THE END

More Related Content

Viewers also liked

Viewers also liked (11)

1 d13
1 d131 d13
1 d13
 
1b07朱卓廷
1b07朱卓廷1b07朱卓廷
1b07朱卓廷
 
1 b03
1 b031 b03
1 b03
 
Application for employment
Application for employmentApplication for employment
Application for employment
 
1 d 22
1 d 221 d 22
1 d 22
 
1 a23
1 a231 a23
1 a23
 
1 a30
1 a301 a30
1 a30
 
1 a27
1 a271 a27
1 a27
 
1 a15
1 a151 a15
1 a15
 
Study in Germany - Studyfeeds
Study in Germany - StudyfeedsStudy in Germany - Studyfeeds
Study in Germany - Studyfeeds
 
TARIQUE ALSTOM
TARIQUE ALSTOMTARIQUE ALSTOM
TARIQUE ALSTOM
 

Similar to 1b28

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in societyAnjan Mahanta
 
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019ManagedMethods
 
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfLesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfrh8g7p44p7
 
Turn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoTTurn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoTiTrainMalaysia1
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board MembersBill Clark
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Discovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptxDiscovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptxGIFTCHIMWENDO
 
Skylarch Company Preso EEFUNG
Skylarch Company Preso EEFUNGSkylarch Company Preso EEFUNG
Skylarch Company Preso EEFUNGYouweiChen6
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiativehpetrich
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 

Similar to 1b28 (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
 
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdfLesson 1 - Overview of Information and Communication Technology (ICT).pdf
Lesson 1 - Overview of Information and Communication Technology (ICT).pdf
 
Turn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoTTurn Data to Gold using Data Science and IoT
Turn Data to Gold using Data Science and IoT
 
EmergingTrend.pdf
EmergingTrend.pdfEmergingTrend.pdf
EmergingTrend.pdf
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Eumind
EumindEumind
Eumind
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Discovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptxDiscovering computers- Chapter 1 (1).pptx
Discovering computers- Chapter 1 (1).pptx
 
Skylarch Company Preso EEFUNG
Skylarch Company Preso EEFUNGSkylarch Company Preso EEFUNG
Skylarch Company Preso EEFUNG
 
Team black
Team blackTeam black
Team black
 
Technology Integration Initiative
Technology Integration InitiativeTechnology Integration Initiative
Technology Integration Initiative
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 

More from chiujuey

More from chiujuey (11)

1 c 11
1 c 111 c 11
1 c 11
 
1 d 18
1 d 181 d 18
1 d 18
 
1 d16
1 d161 d16
1 d16
 
1 d20
1 d201 d20
1 d20
 
1c 19
1c 191c 19
1c 19
 
1c32
1c321c32
1c32
 
1 c 13
1 c 131 c 13
1 c 13
 
1 a08
1 a081 a08
1 a08
 
1a29
1a291a29
1a29
 
1 a17
1 a171 a17
1 a17
 
1 a28
1 a281 a28
1 a28
 

1b28

  • 1. Web sharing----IT By 1B  CATHY WONG (28)  http://infosec.gov.hk/english/main.html
  • 2. What is IT? IT mean information Technology Use to Management and processing of information.
  • 3. What is the main theme of the website??? ● Teach you how to be a smart computer user. ● resources on information security as well as measures and best practices for prevention of cyber crimes.
  • 4. How can students protect their privacy?? ● Learn how to use the site and take careful note of the privacy statement for the site. ● Be wary of saying anything or publishing any identifying information about yourself
  • 5. How to protect your computer? ● Install & Enable Anti-virus & Anti-spyware Software ● Install and enable personal firewall ● Apply security patches regularly
  • 6. Why I choose this website It have somethings the other website hasn't Example of internet fraud Technical References Games Glossary
  • 7. What it has? ● Different point for different people ● students youngsters ● parents teacher ● Colorful picture ● A Lots of useful information
  • 8. comment ● Too many information, it make the website look order less. ● Can say somethings about what the government do to solve the problem of internet fraud.