SlideShare une entreprise Scribd logo
1  sur  16
Internet Safety

By Jonathan Callcott,
Charley Dyer, Laura
Nicolai, Patryk Piras and
Olamide Adesanya
Charley
Dyer

Privacy and safety online is a very big role
associating with being on the internet. Privacy and
safety is something that is not put into place by
some people online and can lead to massive
range of problems e.g cyber bullying, emails used
as a threatening message or harassment, unsafe
pop ups and hacks, and can also range to Trojans
and viruses coming into your computer alongside
a unsafe advertisement and email. The ranges of
unsafe behaviour on a computer, laptop, or tablet
can be quite devastating and can also include
blackmail. To ensure your security and privacy
online you must take precautions and avoid things
what you might find harmful and unsafe. Also if
you find a website unsafe and you don’t find it
trustworthy don’t use it!!!.
The way how you can ensure privacy and safety protection online is by a very easy set of
steps by using these steps you are ensuring that you want absolute total control over your
pc or laptop and don’t want any exposure when using the internet online.
Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a
great software to protect yourself in a security-based way and also can help- you scan a
malicious website.
Step 2:
After downloading Microsoft Security Essentials there is another programme which I highly
recommend for protection head back onto www.filehippo.com and then download Spyware
Blaster after downloading Spyware Blaster this is a excellent programme to use for blocking
pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware
protection it is still handy for scanning blocking and defeating malicious websites and can
also block ActiveX pop ups as well.
Step 3:
The final programme what you should decide to download is CCleaner Ccleaner is another
great and trustworthy programme to use for computer protection. This is one of the most
trustworthy programmes used for protection against malicious files serious malware and
temporary internet files download from www.filehippo.com and you will be sorted!.
Step 4:
After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want
more further protection while browsing the internet there are certain options what you can
put into place when browsing (e.g if you want to block a website what you may find with full
of malware or pop ups) then there are certain internet browsers which can help with this
option. If you use Internet Explorer there are certain options which can block malicious
Patryk Piras
Many people don't shop online because they think that their bank details are not safe. Shopping
online is just as safe as ordering by the telephone as long as you follow these rules.

 - Make sure that the company that your ordering from has a secure shopping
server.
 - Make sure that the website your using starts with “https:”
 - Make sure that you don't send any bank details to anyone in an email.
 - If you do receive an official looking email that asks you to send your
financial details, you should never replay because you could become a
victim of identity fraud.
 - If its a company that you have never heard of before , search their site
for any contact numbers and postal addresses. They would not mid you doing
a quick call asking few questions.
Take steps to protect your online privacy
Looking after your privacy online will help protect your personal
information from abuse.

 Good computer security includes installing anti-spyware,
anti-virus.
 Keep these security tools up to date.
 Make sure you are visiting secure web sites before handing
over personal information such as banking and credit card
details.
When creating passwords there are some rules that you should follow:
Do
 Make it at least eight characters in length.

 Combine letters, numbers and upper and lower case letters.
 Change your password regularly.
Don’t
 Use pet names, birthdates, family or friends names.
 Share passwords with others, even with friends.
 Store them on the device or write them down.
What do we mean by cyber
bullying?
 Cyber bullying is where people use
computers to abuse or harm someone else

 People use fake accounts to attack
vulnerable individuals to send offensive
comments/content
 People harass someone due to an event

 People use social networking site to target
people
The dangers of cyber bullying

When using the internet you should be very
careful of who you chat and become friends
to because the internet can be used 24/7
and people become more vulnerable to fake
accounts and people can send messages to
other people.
Different forms of cyber bullies

Cyber stalking >> Is where people make
other people scared and try to harm them
and threaten someone's privacy
Harassment >> Is when someone targets
an individual or group by sending offensive
messages/content
The effects and affects of cyber
bullying
 Can effect peoples confidence
 Can affect peoples lives

 Can lead to suicides and suicide thoughts
 People will stress over the event
 Can affect peoples attendance and
punctuation
Cyber Bullying
Laura Nicolai
What is Cyber Bullying?
 Bullying is no longer limited to the playground and can take away
the sense of safety that a child feels while at home.
 Stopbullying.gov defines cyber-bullying as, "...Bullying that takes
place using electronic technology. Electronic technology includes
devices and equipment such as cell phones, computers, and tablets
as well as communication tools including social media sites, text
messages, chat, and websites." Cyber-bullying behaviour can
include, but is not limited to:
 Posting nasty pictures or messages about others on blogs, websites,
or social media
 Pretending to be someone else/fake profiles
 Spreading rumors on social networks
 Harassing text messages or emails
Forms of Cyber Bullying
 Sending Spyware and/or Hacking Programs: Using technology to
jeopardize or gain unauthorized access to someone else’s computer.

 Sending Pictures: Sending, posting, or altering compromising
pictures of others whether the images were taken with or without
consent.
THANK YOU FOR LISTENING :

Contenu connexe

Tendances

Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 

Tendances (20)

Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 

En vedette

Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsingjgswift
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarismkcarreon
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Mary Alice Osborne
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationSteve Nelson
 

En vedette (20)

Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Avoiding plagiarism
Avoiding plagiarismAvoiding plagiarism
Avoiding plagiarism
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer crime
 Computer crime Computer crime
Computer crime
 
What Is Plagiarism
What Is PlagiarismWhat Is Plagiarism
What Is Plagiarism
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?Plagiarism vs. Cheating: What is the difference?
Plagiarism vs. Cheating: What is the difference?
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 

Similaire à Internet safety

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 

Similaire à Internet safety (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Users guide
Users guideUsers guide
Users guide
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Protect
ProtectProtect
Protect
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Internet safety

  • 1. Internet Safety By Jonathan Callcott, Charley Dyer, Laura Nicolai, Patryk Piras and Olamide Adesanya
  • 2. Charley Dyer Privacy and safety online is a very big role associating with being on the internet. Privacy and safety is something that is not put into place by some people online and can lead to massive range of problems e.g cyber bullying, emails used as a threatening message or harassment, unsafe pop ups and hacks, and can also range to Trojans and viruses coming into your computer alongside a unsafe advertisement and email. The ranges of unsafe behaviour on a computer, laptop, or tablet can be quite devastating and can also include blackmail. To ensure your security and privacy online you must take precautions and avoid things what you might find harmful and unsafe. Also if you find a website unsafe and you don’t find it trustworthy don’t use it!!!.
  • 3. The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet online. Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself in a security-based way and also can help- you scan a malicious website. Step 2: After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as well. Step 3: The final programme what you should decide to download is CCleaner Ccleaner is another great and trustworthy programme to use for computer protection. This is one of the most trustworthy programmes used for protection against malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!. Step 4: After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this option. If you use Internet Explorer there are certain options which can block malicious
  • 5. Many people don't shop online because they think that their bank details are not safe. Shopping online is just as safe as ordering by the telephone as long as you follow these rules.  - Make sure that the company that your ordering from has a secure shopping server.  - Make sure that the website your using starts with “https:”  - Make sure that you don't send any bank details to anyone in an email.  - If you do receive an official looking email that asks you to send your financial details, you should never replay because you could become a victim of identity fraud.  - If its a company that you have never heard of before , search their site for any contact numbers and postal addresses. They would not mid you doing a quick call asking few questions.
  • 6. Take steps to protect your online privacy Looking after your privacy online will help protect your personal information from abuse.  Good computer security includes installing anti-spyware, anti-virus.  Keep these security tools up to date.  Make sure you are visiting secure web sites before handing over personal information such as banking and credit card details.
  • 7. When creating passwords there are some rules that you should follow: Do  Make it at least eight characters in length.  Combine letters, numbers and upper and lower case letters.  Change your password regularly. Don’t  Use pet names, birthdates, family or friends names.  Share passwords with others, even with friends.  Store them on the device or write them down.
  • 8.
  • 9. What do we mean by cyber bullying?  Cyber bullying is where people use computers to abuse or harm someone else  People use fake accounts to attack vulnerable individuals to send offensive comments/content  People harass someone due to an event  People use social networking site to target people
  • 10. The dangers of cyber bullying When using the internet you should be very careful of who you chat and become friends to because the internet can be used 24/7 and people become more vulnerable to fake accounts and people can send messages to other people.
  • 11. Different forms of cyber bullies Cyber stalking >> Is where people make other people scared and try to harm them and threaten someone's privacy Harassment >> Is when someone targets an individual or group by sending offensive messages/content
  • 12. The effects and affects of cyber bullying  Can effect peoples confidence  Can affect peoples lives  Can lead to suicides and suicide thoughts  People will stress over the event  Can affect peoples attendance and punctuation
  • 14. What is Cyber Bullying?  Bullying is no longer limited to the playground and can take away the sense of safety that a child feels while at home.  Stopbullying.gov defines cyber-bullying as, "...Bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites." Cyber-bullying behaviour can include, but is not limited to:  Posting nasty pictures or messages about others on blogs, websites, or social media  Pretending to be someone else/fake profiles  Spreading rumors on social networks  Harassing text messages or emails
  • 15. Forms of Cyber Bullying  Sending Spyware and/or Hacking Programs: Using technology to jeopardize or gain unauthorized access to someone else’s computer.  Sending Pictures: Sending, posting, or altering compromising pictures of others whether the images were taken with or without consent.
  • 16. THANK YOU FOR LISTENING :

Notes de l'éditeur

  1. The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet online. Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself in a security-based way and also can help- you scan a malicious website.Step 2:After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as well. Step 3:The final programme what you should decide to download is CCleanerCcleaner is another great and trustworthy programme to use for computer protection. This is one of the most trustworthy programmes used for protection against malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!.Step 4: After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this option. If you use Internet Explorer there are certain options which can block malicious websites here are the steps..