Your SlideShare is downloading. ×
0
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Cel1
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cel1

549

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
549
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CEL1: Electronic Mail and Dangers of the Internet
  • 2. Objectives <ul><li>Understand how electronic mail works </li></ul><ul><li>Use proper netiquette for e-mail </li></ul><ul><li>Know the dangers of the Internet </li></ul><ul><li>Know how to be safe on the Internet </li></ul>
  • 3. 1.1 Sending E-mail <ul><li>E-mail </li></ul><ul><ul><li>Stands for Electronic Mail </li></ul></ul><ul><ul><li>A message that is sent using electronic communication systems </li></ul></ul>
  • 4. 1.1 Sending E-mail <ul><li>Sending e-mail is easy </li></ul>
  • 5. 1.1 Sending E-mail <ul><li>An e-mail client is a program used to read and send e-mails </li></ul>
  • 6. 1.1 Sending E-mail <ul><li>E-mail services can also be accessed with a web browser </li></ul>
  • 7. 1.1 Sending E-mail <ul><li>An e-mail account is an e-mail address belonging to you </li></ul>
  • 8. 1.2 How E-mail Works
  • 9. 1.1 Sending E-mail <ul><li>Components of an e-mail message </li></ul>
  • 10. 1.3 E-mail Netiquette <ul><li>Good e-mail netiquette </li></ul><ul><ul><li>Read your message before sending </li></ul></ul><ul><ul><li>When replying, it may be useful to quote from the original messages </li></ul></ul><ul><ul><li>Avoid using a language style that others do not understand </li></ul></ul><ul><ul><li>Obey the e-mail policy of your school </li></ul></ul><ul><ul><li>Make sure that the content is relevant to the recipient </li></ul></ul><ul><ul><li>Be polite </li></ul></ul>
  • 11. <ul><li>Good e-mail netiquette (Cont’d) </li></ul><ul><ul><li>Have a relevant “Subject” line </li></ul></ul><ul><ul><li>Be patient, especially with inexperienced e-mail users </li></ul></ul><ul><ul><li>Sign off with your name at the end of your e-mail message </li></ul></ul><ul><ul><li>Do not include unnecessary or trivial content </li></ul></ul><ul><ul><li>Use emphasis (bold, italics) where it is useful </li></ul></ul>1.3 E-mail Netiquette
  • 12. 1.3 E-mail Netiquette <ul><li>Bad e-mail netiquette </li></ul><ul><ul><li>Reply to an e-mail message when you are angry </li></ul></ul><ul><ul><li>Type in CAPITALS </li></ul></ul><ul><ul><ul><li>This is considered SHOUTING </li></ul></ul></ul><ul><ul><ul><li>It is rude </li></ul></ul></ul><ul><ul><li>Send irrelevant messages </li></ul></ul><ul><ul><li>Argue with others </li></ul></ul><ul><ul><li>Provoke people by sending them abusive e-mail messages </li></ul></ul>
  • 13. 1.3 E-mail Netiquette <ul><li>Bad e-mail netiquette (Cont’d) </li></ul><ul><ul><li>Make personal remarks about other people </li></ul></ul><ul><ul><li>Mark messages as urgent when they are not </li></ul></ul><ul><ul><li>Post a friend’s e-mail address on websites </li></ul></ul><ul><ul><ul><li>This will attract spam </li></ul></ul></ul>
  • 14. 1.3 E-mail Netiquette
  • 15. 1.4 Dangers of the Internet <ul><li>Spamming </li></ul><ul><ul><li>Unsolicited e-mails </li></ul></ul><ul><ul><li>Whether dangerous or not depends on its contents </li></ul></ul><ul><ul><li>Can be dangerous if you trust what it says without verifying the reliability of its source </li></ul></ul>
  • 16. 1.4 Dangers of the Internet <ul><li>Identity theft </li></ul><ul><ul><li>Wrongfully obtains another person’s personal data </li></ul></ul><ul><ul><li>Uses that identity in some way involving fraud and deception </li></ul></ul><ul><ul><li>Phishing </li></ul></ul><ul><ul><ul><li>Fishing for information using deception </li></ul></ul></ul><ul><ul><ul><li>Bank account number, credit card number, password </li></ul></ul></ul>
  • 17. 1.4 Dangers of the Internet <ul><li>E-mail scams </li></ul><ul><ul><li>A scheme or plan to cheat people of money </li></ul></ul><ul><ul><li>Plays on the greed of the victims </li></ul></ul>
  • 18. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  • 19. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  • 20. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  • 21. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  • 22. 1.5 How to be Safe on the Internet <ul><li>Have a personal and non-personal e-mail address </li></ul><ul><ul><li>Personal e-mail address </li></ul></ul><ul><ul><ul><li>Do not circulate this e-mail address widely </li></ul></ul></ul><ul><ul><li>Non-personal e-mail address </li></ul></ul><ul><ul><ul><li>For non-important matters </li></ul></ul></ul><ul><ul><ul><ul><li>Registering yourself on websites </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Sending e-mails to friends whom you are not so close to </li></ul></ul></ul></ul><ul><ul><li>If the non-personal e-mail account is compromised, create another one </li></ul></ul>
  • 23. 1.5 How to be Safe on the Internet <ul><li>If you’re not sure whether it is true, assume that it is FALSE </li></ul><ul><ul><li>Do not be too trusting </li></ul></ul><ul><ul><ul><li>Behind a computer, anyone can claim anything and pass off as anybody </li></ul></ul></ul>
  • 24. 1.5 How to be Safe on the Internet <ul><li>Be extra careful with personal details </li></ul><ul><ul><li>Do not give your personal details to people or websites that you cannot trust </li></ul></ul><ul><ul><li>Restrict the information that you give others </li></ul></ul><ul><ul><li>To avoid having your identity “stolen” </li></ul></ul>
  • 25. 1.5 How to be Safe on the Internet <ul><li>Be extra careful with personal details </li></ul>
  • 26. 1.5 How to be Safe on the Internet <ul><li>Keep your OS and software updated </li></ul><ul><ul><li>Software usually has security “holes” that allow hackers </li></ul></ul><ul><ul><li>Keep your OS and software updated with security patches that plug the “holes” </li></ul></ul><ul><ul><ul><li>First step to keeping your computers more secure </li></ul></ul></ul><ul><ul><ul><li>There are other security measures </li></ul></ul></ul>
  • 27. <ul><li>Be polite, be patient etc. </li></ul><ul><li>Online banking, web-based e-mail etc. </li></ul><ul><li>See “1.5 How to be Safe on the Internet”, pages 35 to 37 </li></ul>
  • 28. <ul><li>An e-mail is a message that is sent using electronic communication systems. </li></ul><ul><li>An e-mail client is a program that allows you to read and send e-mail. E.g. Microsoft Outlook, Mozilla Thunderbird. </li></ul>Summary
  • 29. <ul><li>E-mail service (e.g. Hotmail, Yahoo) can be accessed using a Web browser. </li></ul><ul><li>An e-mail account is your e-mail address. </li></ul><ul><li>An e-mail message consists of a few components: Sender, Time stamp, Addressee, Subject, Body, Carbon Copy. </li></ul>Summary
  • 30. Summary <ul><li>Before sending your e-mail, check to make sure it is clear and sounds polite. </li></ul><ul><li>Spam is e-mail you did not ask for. </li></ul><ul><li>The Internet is full of people with good intentions as well as people with bad intentions. </li></ul>
  • 31. Summary <ul><li>Spammers send as many e-mail as possible to advertise their products. </li></ul><ul><li>Identity thieves wrongfully obtain and use others’ personal data in ways that involve fraud. </li></ul>
  • 32. Summary <ul><li>Scammers are people who swindle you by means of fraud. </li></ul><ul><li>To be safe on the Internet, you should not let others get hold of things that they can use against you, such as your personal details. </li></ul>

×