SlideShare a Scribd company logo
1 of 8
E-SAFETY
To remain virtually protected.
WHAT IS E-SAFETY?
 It refers to safety while using the internet.
 It also refers to the benefits ,risks and
responsibilities while using computer technology.
SOME COMMON RULES :
> Try to maintain your privacy settings on social media platforms.
> Use secure sites and learner-friendly search –engine.
> Open e-mails only from known sources.
HOW TO PREVENT HACKING ?
 Hacking is gaining unauthorised access to a
Computer system.
 It can be prevented by:
a) Use of firewalls *.
b) Use of strong passwords.^.
Myth : encryption prevents hacking.
No, it doesn't. It only makes the message unreadable
to the hacker.
HOW TO PREVENT PHISHING?
 Phishing is sending legitimate –looking
E-mails which require the targeted user to in fill his
confidential information.
 It can be prevented as follows ;
a) By using ISPs or browsers that are capable of
filtering phishing e-mails.
b) Avoiding clicking on executable file attachments.
HOW TO COMBAT SPYWARE ?
 This software gathers data by monitoring key
presses on the user’s keyboard.
 It’s risk can be reduced by:
a) Using anti-spyware software.
b) Try using pointing devices/touch screen while
entering data [e.g. Password]
HOW TO DEAL WITH VIRUS ?
 This replicating software is developed with an
intention to delete, corrupt files on a computer .
 It can be stopped by:
a) Using Anti-virus*.
b) Being careful while opening e-mail attachments.
Internet Safety Techniques

More Related Content

What's hot

Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 

What's hot (20)

Adware
AdwareAdware
Adware
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Introduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacksIntroduction to Cyber Security | Malware | Phishing attacks
Introduction to Cyber Security | Malware | Phishing attacks
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Internet security
Internet securityInternet security
Internet security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Spyware
SpywareSpyware
Spyware
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Internet Safety Techniques

Internet security
Internet securityInternet security
Internet security
at1211
 

Similar to Internet Safety Techniques (20)

It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
techalpha07
techalpha07techalpha07
techalpha07
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Internet security
Internet securityInternet security
Internet security
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 

More from Anup Dixit

More from Anup Dixit (7)

The Ultimate Guide To Study Online
The Ultimate Guide To Study OnlineThe Ultimate Guide To Study Online
The Ultimate Guide To Study Online
 
Applications of Radioactivity
Applications of RadioactivityApplications of Radioactivity
Applications of Radioactivity
 
How we use energy?
How we use energy?How we use energy?
How we use energy?
 
What is Night Vision?
What is Night Vision?What is Night Vision?
What is Night Vision?
 
Separation and purification, chromatography
Separation and purification, chromatographySeparation and purification, chromatography
Separation and purification, chromatography
 
Microprocessors and their Use
Microprocessors and their UseMicroprocessors and their Use
Microprocessors and their Use
 
Area, Perimeter and Volume
Area, Perimeter and VolumeArea, Perimeter and Volume
Area, Perimeter and Volume
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (17)

TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 

Internet Safety Techniques

  • 2. WHAT IS E-SAFETY?  It refers to safety while using the internet.  It also refers to the benefits ,risks and responsibilities while using computer technology.
  • 3. SOME COMMON RULES : > Try to maintain your privacy settings on social media platforms. > Use secure sites and learner-friendly search –engine. > Open e-mails only from known sources.
  • 4. HOW TO PREVENT HACKING ?  Hacking is gaining unauthorised access to a Computer system.  It can be prevented by: a) Use of firewalls *. b) Use of strong passwords.^. Myth : encryption prevents hacking. No, it doesn't. It only makes the message unreadable to the hacker.
  • 5. HOW TO PREVENT PHISHING?  Phishing is sending legitimate –looking E-mails which require the targeted user to in fill his confidential information.  It can be prevented as follows ; a) By using ISPs or browsers that are capable of filtering phishing e-mails. b) Avoiding clicking on executable file attachments.
  • 6. HOW TO COMBAT SPYWARE ?  This software gathers data by monitoring key presses on the user’s keyboard.  It’s risk can be reduced by: a) Using anti-spyware software. b) Try using pointing devices/touch screen while entering data [e.g. Password]
  • 7. HOW TO DEAL WITH VIRUS ?  This replicating software is developed with an intention to delete, corrupt files on a computer .  It can be stopped by: a) Using Anti-virus*. b) Being careful while opening e-mail attachments.

Editor's Notes

  1. Good morning/afternoon to all. Our topic is e-safety.. Lets start.