Cel1

672 views
591 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
672
On SlideShare
0
From Embeds
0
Number of Embeds
69
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cel1

  1. 1. CEL1: Electronic Mail and Dangers of the Internet
  2. 2. Objectives <ul><li>Understand how electronic mail works </li></ul><ul><li>Use proper netiquette for e-mail </li></ul><ul><li>Know the dangers of the Internet </li></ul><ul><li>Know how to be safe on the Internet </li></ul>
  3. 3. 1.1 Sending E-mail <ul><li>E-mail </li></ul><ul><ul><li>Stands for Electronic Mail </li></ul></ul><ul><ul><li>A message that is sent using electronic communication systems </li></ul></ul>
  4. 4. 1.1 Sending E-mail <ul><li>Sending e-mail is easy </li></ul>
  5. 5. 1.1 Sending E-mail <ul><li>An e-mail client is a program used to read and send e-mails </li></ul>
  6. 6. 1.1 Sending E-mail <ul><li>E-mail services can also be accessed with a web browser </li></ul>
  7. 7. 1.1 Sending E-mail <ul><li>An e-mail account is an e-mail address belonging to you </li></ul>
  8. 8. 1.2 How E-mail Works
  9. 9. 1.1 Sending E-mail <ul><li>Components of an e-mail message </li></ul>
  10. 10. 1.3 E-mail Netiquette <ul><li>Good e-mail netiquette </li></ul><ul><ul><li>Read your message before sending </li></ul></ul><ul><ul><li>When replying, it may be useful to quote from the original messages </li></ul></ul><ul><ul><li>Avoid using a language style that others do not understand </li></ul></ul><ul><ul><li>Obey the e-mail policy of your school </li></ul></ul><ul><ul><li>Make sure that the content is relevant to the recipient </li></ul></ul><ul><ul><li>Be polite </li></ul></ul>
  11. 11. <ul><li>Good e-mail netiquette (Cont’d) </li></ul><ul><ul><li>Have a relevant “Subject” line </li></ul></ul><ul><ul><li>Be patient, especially with inexperienced e-mail users </li></ul></ul><ul><ul><li>Sign off with your name at the end of your e-mail message </li></ul></ul><ul><ul><li>Do not include unnecessary or trivial content </li></ul></ul><ul><ul><li>Use emphasis (bold, italics) where it is useful </li></ul></ul>1.3 E-mail Netiquette
  12. 12. 1.3 E-mail Netiquette <ul><li>Bad e-mail netiquette </li></ul><ul><ul><li>Reply to an e-mail message when you are angry </li></ul></ul><ul><ul><li>Type in CAPITALS </li></ul></ul><ul><ul><ul><li>This is considered SHOUTING </li></ul></ul></ul><ul><ul><ul><li>It is rude </li></ul></ul></ul><ul><ul><li>Send irrelevant messages </li></ul></ul><ul><ul><li>Argue with others </li></ul></ul><ul><ul><li>Provoke people by sending them abusive e-mail messages </li></ul></ul>
  13. 13. 1.3 E-mail Netiquette <ul><li>Bad e-mail netiquette (Cont’d) </li></ul><ul><ul><li>Make personal remarks about other people </li></ul></ul><ul><ul><li>Mark messages as urgent when they are not </li></ul></ul><ul><ul><li>Post a friend’s e-mail address on websites </li></ul></ul><ul><ul><ul><li>This will attract spam </li></ul></ul></ul>
  14. 14. 1.3 E-mail Netiquette
  15. 15. 1.4 Dangers of the Internet <ul><li>Spamming </li></ul><ul><ul><li>Unsolicited e-mails </li></ul></ul><ul><ul><li>Whether dangerous or not depends on its contents </li></ul></ul><ul><ul><li>Can be dangerous if you trust what it says without verifying the reliability of its source </li></ul></ul>
  16. 16. 1.4 Dangers of the Internet <ul><li>Identity theft </li></ul><ul><ul><li>Wrongfully obtains another person’s personal data </li></ul></ul><ul><ul><li>Uses that identity in some way involving fraud and deception </li></ul></ul><ul><ul><li>Phishing </li></ul></ul><ul><ul><ul><li>Fishing for information using deception </li></ul></ul></ul><ul><ul><ul><li>Bank account number, credit card number, password </li></ul></ul></ul>
  17. 17. 1.4 Dangers of the Internet <ul><li>E-mail scams </li></ul><ul><ul><li>A scheme or plan to cheat people of money </li></ul></ul><ul><ul><li>Plays on the greed of the victims </li></ul></ul>
  18. 18. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  19. 19. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  20. 20. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  21. 21. 1.5 How to be Safe on the Internet <ul><li>If it sounds too good to be true, it is probably not true </li></ul><ul><ul><li>Someone might be trying to cheat you </li></ul></ul>
  22. 22. 1.5 How to be Safe on the Internet <ul><li>Have a personal and non-personal e-mail address </li></ul><ul><ul><li>Personal e-mail address </li></ul></ul><ul><ul><ul><li>Do not circulate this e-mail address widely </li></ul></ul></ul><ul><ul><li>Non-personal e-mail address </li></ul></ul><ul><ul><ul><li>For non-important matters </li></ul></ul></ul><ul><ul><ul><ul><li>Registering yourself on websites </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Sending e-mails to friends whom you are not so close to </li></ul></ul></ul></ul><ul><ul><li>If the non-personal e-mail account is compromised, create another one </li></ul></ul>
  23. 23. 1.5 How to be Safe on the Internet <ul><li>If you’re not sure whether it is true, assume that it is FALSE </li></ul><ul><ul><li>Do not be too trusting </li></ul></ul><ul><ul><ul><li>Behind a computer, anyone can claim anything and pass off as anybody </li></ul></ul></ul>
  24. 24. 1.5 How to be Safe on the Internet <ul><li>Be extra careful with personal details </li></ul><ul><ul><li>Do not give your personal details to people or websites that you cannot trust </li></ul></ul><ul><ul><li>Restrict the information that you give others </li></ul></ul><ul><ul><li>To avoid having your identity “stolen” </li></ul></ul>
  25. 25. 1.5 How to be Safe on the Internet <ul><li>Be extra careful with personal details </li></ul>
  26. 26. 1.5 How to be Safe on the Internet <ul><li>Keep your OS and software updated </li></ul><ul><ul><li>Software usually has security “holes” that allow hackers </li></ul></ul><ul><ul><li>Keep your OS and software updated with security patches that plug the “holes” </li></ul></ul><ul><ul><ul><li>First step to keeping your computers more secure </li></ul></ul></ul><ul><ul><ul><li>There are other security measures </li></ul></ul></ul>
  27. 27. <ul><li>Be polite, be patient etc. </li></ul><ul><li>Online banking, web-based e-mail etc. </li></ul><ul><li>See “1.5 How to be Safe on the Internet”, pages 35 to 37 </li></ul>
  28. 28. <ul><li>An e-mail is a message that is sent using electronic communication systems. </li></ul><ul><li>An e-mail client is a program that allows you to read and send e-mail. E.g. Microsoft Outlook, Mozilla Thunderbird. </li></ul>Summary
  29. 29. <ul><li>E-mail service (e.g. Hotmail, Yahoo) can be accessed using a Web browser. </li></ul><ul><li>An e-mail account is your e-mail address. </li></ul><ul><li>An e-mail message consists of a few components: Sender, Time stamp, Addressee, Subject, Body, Carbon Copy. </li></ul>Summary
  30. 30. Summary <ul><li>Before sending your e-mail, check to make sure it is clear and sounds polite. </li></ul><ul><li>Spam is e-mail you did not ask for. </li></ul><ul><li>The Internet is full of people with good intentions as well as people with bad intentions. </li></ul>
  31. 31. Summary <ul><li>Spammers send as many e-mail as possible to advertise their products. </li></ul><ul><li>Identity thieves wrongfully obtain and use others’ personal data in ways that involve fraud. </li></ul>
  32. 32. Summary <ul><li>Scammers are people who swindle you by means of fraud. </li></ul><ul><li>To be safe on the Internet, you should not let others get hold of things that they can use against you, such as your personal details. </li></ul>

×