SlideShare a Scribd company logo
1 of 39
Internet Safety
Prepared by
Fatih Kazmacan
Muhammet Yasin PAK
Hasan Uçar
Overview
•   Why do people use the internet?
•   Internet usage statistics
•   Potential dangers of the internet
•   Internet safety tips for everyone
•   Survey
Why do people use the internet?
Why do people use the internet?
• Communication
• Information
• Entertainment
Communication
• E-mail
• Social media
• Instant Messaging
  Stay in touch with your friends…
            …from school…
                 …your city…
                       …your world!
Information
The world’s biggest library!
• Look up words
• Read stories
• Learn almost anything!
Entertainment
•   Play games by yourself or with others
•   Listen to music
•   Watch video clips
•   Find out about your favorite sports team or
    movie stars!
Internet usage statistics
Internet usage statistics

• 2,267,233,742 internet users
• 835 million Facebook users
• 526 million daily active users on average in
  March 2012.
• More than 300 million photos uploaded to
  Facebook per day
Internet is good but…
  • The internet is fun.

  • But it could also be
    dangerous.

  • That’s why,please listen
    carefully.
Potential dangers of the internet
 Causes:
 • Harmful softwares
 • The lack of information about
 internet safety

 Results:
 • Personal information can be stolen.
 • Internet fraud and scams
 (your money can be stolen)
Cause : Harmful softwares

• Malware (malicious software)
      Computer viruses
      Spams
      Worms
      Trojan horses
      Spyware
      Adware
Computer viruses

• A computer virus is a computer program that
  can replicate itself and spread from one
  computer to another.
      Delete important files
      Cause the computer to crash
      Spread easily
      Hide itself
Spams
• The term spam most often refers to an e-mail
  message sent to a large number of people
  without their consent.
• Spam: E-mail messages sent from someone you
  don’t know
An example : Send fake mail
Cause: The lack of information about internet
safety

 • Internet users have no enough information
 • Mass media should raise the awareness of public
Facebook

In the Ottoman
Empire
Copy-Paste 
Result: Personal information can be
 stolen
• Bad people may use your information for doing
  bad things

• Photos may be copied and used inappropriately
  by other people
Result: Internet Fraud and Scams (your
money can be stolen)
• Unsafe online shopping
     Especially, via credit card
• Keylogging
  ▫ is the action of tracking (or logging) the keys
    struck on a keyboard
Internet safety tips for everyone
 • NEVER GIVE OUT YOUR PERSONAL
 INFORMATION !
  Your real name   Phone number
  Address          Birthdate School number


 • KEEP YOUR PRIVATE LIFE PRIVATE !

 • USE NICK NAMES !
Internet safety tips for everyone
• DON’T UPLOAD PHOTOS PUBLICLY !
  ▫ Only your friends and family
  ▫ Photos may be copied and used
    inappropriately



• DON’T OPEN UNKNOWN WEBSITES !
  ▫ Especially; full free software websites
     A Quote : “The Only Free Cheese is in the Mousetrap”
Internet safety tips for everyone
• DON’T OPEN EMAIL FROM STRANGERS !
 ▫ Emails may contain viruses
 ▫ Delete emails from strangers !

• DON’T OPEN ANY ATTACHMENTS THAT YOU DON’T
  KNOW !
 ▫ It is so important

• LOG OFF WHEN YOU ARE DONE
 ▫ Especially in public internet cafe
Internet safety tips for everyone
• When using Email & Facebook…
  ▫ Change your password to your login often
  ▫ Keep it in a safe place



• ALWAYS USE A STRONG PASSWORD !
  ▫ Should be a combination of alphabets, number and
    special characters
  ▫ Should have a length of size greater than 8 characters.
Internet safety tips for everyone

• ALWAYS INSTALL GOOD ANTIVIRUS
  SOFTWARE
  ▫ Update it regularly
Most importantly,


• BECOME AWARE OF …
Survey

• About internet usage and safety

• Respondents: Male:56 Female:96

• It was made with Turkish questions
Survey Results
• Do you have any technological tools to connect
  the internet? (pc,mobile phone,tablet)
Do you have internet connection at
home?
Avarage internet usage per day
The frequency of using e-mail
The frequency of changing password
The length of the password
Is the password strong?
The use of Anti-virus programme
Have you ever be exposed to hack ?
Internet safety

More Related Content

What's hot

Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 

What's hot (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Internet security
Internet securityInternet security
Internet security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet security
Internet securityInternet security
Internet security
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 

Similar to Internet safety

empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 

Similar to Internet safety (20)

Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Computer security
Computer securityComputer security
Computer security
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Internet safety

  • 1. Internet Safety Prepared by Fatih Kazmacan Muhammet Yasin PAK Hasan Uçar
  • 2. Overview • Why do people use the internet? • Internet usage statistics • Potential dangers of the internet • Internet safety tips for everyone • Survey
  • 3. Why do people use the internet?
  • 4. Why do people use the internet? • Communication • Information • Entertainment
  • 5. Communication • E-mail • Social media • Instant Messaging Stay in touch with your friends… …from school… …your city… …your world!
  • 6. Information The world’s biggest library! • Look up words • Read stories • Learn almost anything!
  • 7. Entertainment • Play games by yourself or with others • Listen to music • Watch video clips • Find out about your favorite sports team or movie stars!
  • 9. Internet usage statistics • 2,267,233,742 internet users • 835 million Facebook users • 526 million daily active users on average in March 2012. • More than 300 million photos uploaded to Facebook per day
  • 10. Internet is good but… • The internet is fun. • But it could also be dangerous. • That’s why,please listen carefully.
  • 11. Potential dangers of the internet Causes: • Harmful softwares • The lack of information about internet safety Results: • Personal information can be stolen. • Internet fraud and scams (your money can be stolen)
  • 12. Cause : Harmful softwares • Malware (malicious software)  Computer viruses  Spams  Worms  Trojan horses  Spyware  Adware
  • 13. Computer viruses • A computer virus is a computer program that can replicate itself and spread from one computer to another.  Delete important files  Cause the computer to crash  Spread easily  Hide itself
  • 14. Spams • The term spam most often refers to an e-mail message sent to a large number of people without their consent. • Spam: E-mail messages sent from someone you don’t know
  • 15. An example : Send fake mail
  • 16.
  • 17. Cause: The lack of information about internet safety • Internet users have no enough information • Mass media should raise the awareness of public
  • 18.
  • 21. Result: Personal information can be stolen • Bad people may use your information for doing bad things • Photos may be copied and used inappropriately by other people
  • 22. Result: Internet Fraud and Scams (your money can be stolen) • Unsafe online shopping  Especially, via credit card • Keylogging ▫ is the action of tracking (or logging) the keys struck on a keyboard
  • 23. Internet safety tips for everyone • NEVER GIVE OUT YOUR PERSONAL INFORMATION ! Your real name Phone number Address Birthdate School number • KEEP YOUR PRIVATE LIFE PRIVATE ! • USE NICK NAMES !
  • 24. Internet safety tips for everyone • DON’T UPLOAD PHOTOS PUBLICLY ! ▫ Only your friends and family ▫ Photos may be copied and used inappropriately • DON’T OPEN UNKNOWN WEBSITES ! ▫ Especially; full free software websites  A Quote : “The Only Free Cheese is in the Mousetrap”
  • 25. Internet safety tips for everyone • DON’T OPEN EMAIL FROM STRANGERS ! ▫ Emails may contain viruses ▫ Delete emails from strangers ! • DON’T OPEN ANY ATTACHMENTS THAT YOU DON’T KNOW ! ▫ It is so important • LOG OFF WHEN YOU ARE DONE ▫ Especially in public internet cafe
  • 26. Internet safety tips for everyone • When using Email & Facebook… ▫ Change your password to your login often ▫ Keep it in a safe place • ALWAYS USE A STRONG PASSWORD ! ▫ Should be a combination of alphabets, number and special characters ▫ Should have a length of size greater than 8 characters.
  • 27. Internet safety tips for everyone • ALWAYS INSTALL GOOD ANTIVIRUS SOFTWARE ▫ Update it regularly
  • 29. Survey • About internet usage and safety • Respondents: Male:56 Female:96 • It was made with Turkish questions
  • 30. Survey Results • Do you have any technological tools to connect the internet? (pc,mobile phone,tablet)
  • 31. Do you have internet connection at home?
  • 33. The frequency of using e-mail
  • 34. The frequency of changing password
  • 35. The length of the password
  • 36. Is the password strong?
  • 37. The use of Anti-virus programme
  • 38. Have you ever be exposed to hack ?