SlideShare une entreprise Scribd logo
1  sur  3
Internet Use Issues<br />Reliability of Information<br />Good thingBad thingsAnyone can create a web page and say whatever they want toPeople or organizations can easily spread lies and hatred.Websites contain bigoted viewpointsMuch of the information is biased, inaccurate or just plain wrong.<br />How to check which information is reliable.<br />,[object Object]
Only use websites that belong to trusted organizations. For example if the website ends in .gov.uk
Look at the spelling and grammar user. Too many spelling errors means that the site is least likely to be trusted.Undesirable Information<br />if you are researching the causes of over-heating in young chickens, searching for ‘hot chicks’ might not find the information that you are looking for!Many websites now days are highly offensive and have illegal material. So what many schools, governments and parents have done is that they have used a web page filtering software which attempts to prevent offensive and illegal material from being accessed.<br />Other ways to protect your computer is by :<br />,[object Object]

Contenu connexe

Tendances

Tendances (19)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Phishing
PhishingPhishing
Phishing
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
 
Phishing
PhishingPhishing
Phishing
 
Online Security
Online SecurityOnline Security
Online Security
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 

En vedette (9)

Al Baqarah Ayah 21-25 Notes
Al Baqarah Ayah 21-25 NotesAl Baqarah Ayah 21-25 Notes
Al Baqarah Ayah 21-25 Notes
 
Al Baqarah Ayah 6-7 Notes
Al Baqarah Ayah 6-7 NotesAl Baqarah Ayah 6-7 Notes
Al Baqarah Ayah 6-7 Notes
 
Brownie recipe
Brownie recipeBrownie recipe
Brownie recipe
 
Preparedness and phobias
Preparedness and phobias Preparedness and phobias
Preparedness and phobias
 
Al Baqarah Ayah 8-16 Notes
Al Baqarah Ayah 8-16 NotesAl Baqarah Ayah 8-16 Notes
Al Baqarah Ayah 8-16 Notes
 
Al Baqarah Ayah 60-62 Notes
Al Baqarah Ayah 60-62 NotesAl Baqarah Ayah 60-62 Notes
Al Baqarah Ayah 60-62 Notes
 
Fatihah Ayah 1-7 Notes
Fatihah Ayah 1-7 NotesFatihah Ayah 1-7 Notes
Fatihah Ayah 1-7 Notes
 
Al Baqarah Ayah 63-73 Notes
Al Baqarah Ayah 63-73 NotesAl Baqarah Ayah 63-73 Notes
Al Baqarah Ayah 63-73 Notes
 
Surah Fatiha
Surah FatihaSurah Fatiha
Surah Fatiha
 

Similaire à Online secuirty

Phishing
PhishingPhishing
Phishing
Syahida
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 

Similaire à Online secuirty (20)

Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Internet Use Issues.pptx
Internet Use Issues.pptxInternet Use Issues.pptx
Internet Use Issues.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Phishing
PhishingPhishing
Phishing
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Phishing
PhishingPhishing
Phishing
 
internet security
internet securityinternet security
internet security
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Antiphishing
AntiphishingAntiphishing
Antiphishing
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Plus de Momina Mateen

Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word
Momina Mateen
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)
Momina Mateen
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)
Momina Mateen
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)
Momina Mateen
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)
Momina Mateen
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)
Momina Mateen
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)
Momina Mateen
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)
Momina Mateen
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)
Momina Mateen
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)
Momina Mateen
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)
Momina Mateen
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)
Momina Mateen
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)
Momina Mateen
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)
Momina Mateen
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)
Momina Mateen
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)
Momina Mateen
 

Plus de Momina Mateen (20)

Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned
 
Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes
 
Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word
 
Zakariyya and Yahya
Zakariyya and YahyaZakariyya and Yahya
Zakariyya and Yahya
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)
 
Al Mulk Revision
Al Mulk RevisionAl Mulk Revision
Al Mulk Revision
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)
 

Online secuirty

  • 1.
  • 2. Only use websites that belong to trusted organizations. For example if the website ends in .gov.uk
  • 3.
  • 4. Don’t click the links that are shown in junk email.
  • 5.
  • 6. 3490063244490The website URL should begin with https:// (the s stands for Secure)
  • 7. The web browser should show a closed padlock icon.Phishing<br />This is the nickname given to the sending of a fraudulent e-mails that attempt to trick people into revealing details about their bank accounts or other online accounts.<br />The bank details are then used to login into the victim’s bank account and then take their money.<br />The email may look very convincing; it will sound urgent and scary. It scares the person receiving it and they panic.<br />Pharming<br />This is similar to phishing but instead of deceiving you; your computer is deceived.<br />In a pharming attack, you enter a completely genuine URL and your computer is deceived by displaying a fake website.<br />Then when you try to login into the fake website; your username and password are recorded and are used to take money from your real account.<br />E-mail spam<br /> <br />This is the name given to unsolicited e-mails (ones sent without being asked for)<br />They usually contain adverts for products.<br />Spam filters are used to separate spam messages from genuine messages.<br /> <br />