Your SlideShare is downloading. ×
0
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Module6 secure internet-b
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Module6 secure internet-b

182

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
182
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Module 6 Module 6Secure Internet Access & Usage © 2010 – Foreground Security. All rights reserved
  • 2. Module Module Objectives 6• This module will familiarize you with the following: – Internet Security Issues – Identity Theft – File Sharing – Downloading Programs – Secure Internet Practices © 2010 – Foreground Security. All rights reserved
  • 3. Secure Sites© 2010 – Foreground Security. All rights reserved
  • 4. SSL© 2010 – Foreground Security. All rights reserved
  • 5. Phishing & Identity Theft© 2010 – Foreground Security. All rights reserved
  • 6. Countermeasures© 2010 – Foreground Security. All rights reserved
  • 7. Content Filtering© 2010 – Foreground Security. All rights reserved
  • 8. Cookies© 2010 – Foreground Security. All rights reserved
  • 9. © 2010 – Foreground Security. All rights reserved
  • 10. © 2010 – Foreground Security. All rights reserved
  • 11. Security Settings© 2010 – Foreground Security. All rights reserved
  • 12. Downloading Files© 2010 – Foreground Security. All rights reserved
  • 13. Downloading Applications© 2010 – Foreground Security. All rights reserved
  • 14. Secure Email Clients© 2010 – Foreground Security. All rights reserved
  • 15. Secure Transport Protocols© 2010 – Foreground Security. All rights reserved
  • 16. Instant Messengers© 2010 – Foreground Security. All rights reserved
  • 17. File Sharing (P2P)© 2010 – Foreground Security. All rights reserved
  • 18. Portable Devices© 2010 – Foreground Security. All rights reserved
  • 19. Wireless Devices© 2010 – Foreground Security. All rights reserved
  • 20. USB Devices© 2010 – Foreground Security. All rights reserved
  • 21. Media Files© 2010 – Foreground Security. All rights reserved
  • 22. 3rd Party Software© 2010 – Foreground Security. All rights reserved
  • 23. Demonstration• Downloading a Program or Game• P2P Security Issues © 2010 – Foreground Security. All rights reserved

×