SlideShare a Scribd company logo
1 of 11
Ten important rules  for safe Internet usage   Aimed at higher education students
1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
3. Use Anti-Virus software Install a good anti-virus  program and keep it up to date to protect your PC from viruses.
4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
6. POP UPS Enable a popup blocker on your PC.
7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
8. Don’t believe everything you see or read online.
9. Pictures Never post your pictures online were anyone can gain access to them.
10. Never arrange to meet someone you have met online, unless you have known them for sometime.

More Related Content

What's hot

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

What's hot (20)

Empo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptxEmpo Tech 11 COT 2.pptx
Empo Tech 11 COT 2.pptx
 
Empowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptxEmpowerment Technologies - Module 1.pptx
Empowerment Technologies - Module 1.pptx
 
E-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptxE-Tech L7 Online Platforms for ICT Content Development.pptx
E-Tech L7 Online Platforms for ICT Content Development.pptx
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Responsible Use of Social Media in the Philippines
Responsible Use of Social Media in the PhilippinesResponsible Use of Social Media in the Philippines
Responsible Use of Social Media in the Philippines
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Office365 training - for the Beginner
Office365 training - for the BeginnerOffice365 training - for the Beginner
Office365 training - for the Beginner
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Final exam in empowerment technologies
Final exam in empowerment technologiesFinal exam in empowerment technologies
Final exam in empowerment technologies
 
Etech online platform
Etech online platformEtech online platform
Etech online platform
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
MIL Week 2.pptx
MIL Week 2.pptxMIL Week 2.pptx
MIL Week 2.pptx
 

Viewers also liked (9)

Defending Medical Malpractice
Defending Medical MalpracticeDefending Medical Malpractice
Defending Medical Malpractice
 
MONTREAL
MONTREALMONTREAL
MONTREAL
 
Presentation Test
Presentation TestPresentation Test
Presentation Test
 
Home
HomeHome
Home
 
Dia De La Amistad
Dia De La AmistadDia De La Amistad
Dia De La Amistad
 
Eusidic, The Outlook And The Future
Eusidic, The Outlook And The FutureEusidic, The Outlook And The Future
Eusidic, The Outlook And The Future
 
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015 Audits of the 340B Drug Pricing Program Expected to Increase in 2015
Audits of the 340B Drug Pricing Program Expected to Increase in 2015
 
RestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De CarcabosoRestauracióN De La Iglesia De Carcaboso
RestauracióN De La Iglesia De Carcaboso
 
Mgs Power Point Jan 2008
Mgs Power Point Jan 2008Mgs Power Point Jan 2008
Mgs Power Point Jan 2008
 

Similar to Ten Important Rules

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
PEC
 

Similar to Ten Important Rules (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Ten Important Rules

  • 1. Ten important rules for safe Internet usage Aimed at higher education students
  • 2. 1. Enable a firewall A firewall will help prevent unauthorised access to your PC from potential hackers.
  • 3. 2. Clear cache/history Clearing the internet cache & history will stop other people that use the same computer gaining access to e-mail accounts. The cache/history saves passwords and other personal information.
  • 4. 3. Use Anti-Virus software Install a good anti-virus program and keep it up to date to protect your PC from viruses.
  • 5. 4. Keep your PC up to date Keep your PC up to date with the latest patches and service packs.
  • 6. 5. Credit card details Never give out your credit card details to other people on the internet, when shopping online always make sure the site is a secure site.
  • 7. 6. POP UPS Enable a popup blocker on your PC.
  • 8. 7. Personal Details Never give your personal details to people over the Internet. Name Address Tel no
  • 9. 8. Don’t believe everything you see or read online.
  • 10. 9. Pictures Never post your pictures online were anyone can gain access to them.
  • 11. 10. Never arrange to meet someone you have met online, unless you have known them for sometime.