Your SlideShare is downloading. ×
0
COMPUTER RESOURCES   NICKO Sapnu
   It involves the right or mandate of personal    privacy concerning the storing, repurposing,    providing to third-par...
   The first is that privacy helps individuals    maintain their autonomy and individuality.   Because of its functional...
   attempting to acquire information.   such as usernames, passwords, and credit card    details by masquerading as a tr...
   Phishing is typically carried out by e-mail    spoofing or instant messaging.    Phishing emails may contain links to...
   Phishing -a way of attempting to acquire    information such as usernames, passwords,    and credit card details by ma...
• Whaling- Several recent phishing  attacks have been directed specifically at  senior executives and other high profile  ...
   A Fake Facebook Login Page   An Exploit Kit in a Fraudulent Facebook Page   A Fraudulent Online Pharmacy Website   ...
   Disclosure of private information by either    yourself or friends/contacts.   Bullying.   Cyber-stalking.   Access...
• Friends’, other people’s and  companies posts encouraging you  to link to fraudulent or  inappropriate websites.• People...
   Be wary of publishing any identifying    information about yourself – either in your    profile or in your posts – suc...
• Set up a separate email account to register and  receive mail from the site. That way if you want  to close down your ac...
• Be aware of what friends post about you, or  reply to your posts, particularly about your  personal details and activiti...
   Allows you to browse the Internet without    saving any information about which sites and    pages you’ve visited.   ...
   At the top of the Firefox window, click the    Firefox button (Tools menu in Windows XP)    and select Start Private B...
   When you turn on Private Browsing, Firefox    alerts you that it will save your current    windows and tabs for after ...
   The Private Browsing information screen    appears to confirm that youre in Private    Browsing mode.   When browsing...
   At the top of the Firefox window, click the    Firefox button (Tools menu in Windows XP)    and select Stop Private Br...
   It is safe for your computer data security.   No one can track your data when you use    secure browsing or private b...
Online privacy
Online privacy
Upcoming SlideShare
Loading in...5
×

Online privacy

102

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
102
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Online privacy "

  1. 1. COMPUTER RESOURCES NICKO Sapnu
  2. 2.  It involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet.
  3. 3.  The first is that privacy helps individuals maintain their autonomy and individuality. Because of its functional benefits.
  4. 4.  attempting to acquire information. such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Is a way to trick computer and Internet users into revealing personal and financial information through a fraudulent email or website.
  5. 5.  Phishing is typically carried out by e-mail spoofing or instant messaging. Phishing emails may contain links to websites that are infected with malware. an example of social engineering techniques used to deceive users,
  6. 6.  Phishing -a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Clone Phishing- A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
  7. 7. • Whaling- Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.• Spear Phishing- Attackers may gather personal information about their target to increase their probability of success.
  8. 8.  A Fake Facebook Login Page An Exploit Kit in a Fraudulent Facebook Page A Fraudulent Online Pharmacy Website A Fraudsters Order Page A Fraudulent YouTube E-mail A Fake Virus Scanner
  9. 9.  Disclosure of private information by either yourself or friends/contacts. Bullying. Cyber-stalking. Access to age-inappropriate content Online grooming and child abuse. People hacking into or hijacking your account or page.
  10. 10. • Friends’, other people’s and companies posts encouraging you to link to fraudulent or inappropriate websites.• People hacking into or hijacking your account or page.• Viruses or spyware contained within message attachments or photographs.
  11. 11.  Be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday. Pick a user name that does not include any personal information. For example, “joe_glasgow” or “jane_liverpool” would be bad choices.
  12. 12. • Set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as Hotmail, Yahoo! Mail or gmail.• Keep your profile closed and allow only your friends to view your profile.• What goes online stays online. Do not say anything or publish pictures that might later cause you or someone else embarrassment.
  13. 13. • Be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities.• Remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile.• Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network.• Be on your guard against phishing scams.• Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.
  14. 14.  Allows you to browse the Internet without saving any information about which sites and pages you’ve visited. To put Firefox into a temporary state where no information about the users browsing session is stored locally.
  15. 15.  At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Start Private Browsing.
  16. 16.  When you turn on Private Browsing, Firefox alerts you that it will save your current windows and tabs for after you finish using Private Browsing. Click Start Private Browsing to continue. Check the box next to "Do not show this message again" if you dont want to receive this alert when you turn on Private Browsing.
  17. 17.  The Private Browsing information screen appears to confirm that youre in Private Browsing mode. When browsing in Private Browsing mode, the Firefox button will be purple (for Windows XP the window title will say (Private Browsing) instead) during your session.
  18. 18.  At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Stop Private Browsing.The windows and tabs you were using when you enabled PrivateBrowsing will appear, and you can use Firefox normally. The Firefoxbutton will turn orange again (for Windows XP the Firefox window titlewill no longer say (Private Browsing)) when Private Browsing is off.
  19. 19.  It is safe for your computer data security. No one can track your data when you use secure browsing or private browsing. this is the safe and secure way for online banking . it clear the history and passwords when you close the browser.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×