SlideShare a Scribd company logo
1 of 10
Internet Safety
Internet safety, online safety or
cyber safety means trying to be safe
on the internet. It is maximizing the
user’s personal safety and security
risks to private information and
property associated with using the
internet, including self-protection
from computer crime.
Information Security
Sensitive information, such as
personal information, identity and
passwords are often associated with
personal property and privacy and
may be present security concerns if
leaked. Unauthorized access and
usage of private information may
result in consequences such as
identity and property theft.
Common causes of security breaches:
 PHISHING-Scammers disguise as a trustworthy source
in an attempt to obtain private information, such as
passwords, credit card information, etc. through the use
of fake websites that look identical and legitimate.
 INTERNET SCAMS- These are schemes that deceive the
users in various ways in an attempt to take advantage
of them.
 Malware-It is a malicious malware disguised to collect
and transmit private information, such as password
without the user’s consent or knowledge.
Personal safety and threats
A threat, in the context of computer security, refers
to anything that has the potential to cause serious
harm to a computer system .
Cybercrime is now becoming alarming in the life of
every individual and the organization as they intend to
steal information that they can sell or trade such as
financial details, credit card information, personal
details or any other information using computer
networks.
Ways on how to ensure that computer
networks can be protected:
 Install anti-virus software
 Ensure that the anti-virus software is up-to-date
 Employ a firewall to protect networks
 Filter all email traffic
 Educate all users to be careful of suspicious e-mails
 Scan internet downloads
 Do not run programs of unknown origin
Ways on how to ensure that computer
networks can be protected:
 Implement a vulnerability management system
 Make regular backups of critical data
 Develop an information security policy
 Monitor logs and systems
 Develop an incident response plan
 Restrict end-user access to the system
CYBERBULLYING
Cyberbullying, cyber harassment or
online bullying is a form of bullying or
harassment using electronic means
usually among minors in a school
setting and has become increasingly
common especially among teenagers.
TYPES OF CYBERBULLYING:
1. INTERNET TROLLING- is a common forms of
bullying over the internet in an online community
to elicit a reaction, disruption of intentionally
provokes and offend others.
2. CYBERSTALKING- is another form of bullying or
harassment that uses electronic communication to
stalk a victim and post a credible threat to harass
him/her.
Implications of bullying in schools
Schools should initiate various anti-bullying
programs and campaigns to protect students from
being threatened or victimized by such offense. More
so, teachers should be oriented and trained in
handling bullying cases and executing teaching
strategies to address and reduce bullying cases in
class. Also schools should conduct students
empowerment activities that can be engaged by the
students, including bullies to divert their attention and
energy into something worthwhile and engagement
that they can be busy about.
CYBERCRIME
Avast defines cybercrime as
any criminal activity carried
out using computers or the
internet. Cybercrime uses tools
like phishing, viruses, spyware,
ransomware and social
engineering to break the law.

More Related Content

Similar to Internet-Safety-1.pptx

Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsCyber Security Experts
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscapecyberprosocial
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 

Similar to Internet-Safety-1.pptx (20)

Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety Tips
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 

More from AnnaRicaSicang

Contemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applicationsContemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applicationsAnnaRicaSicang
 
CRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and fourCRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and fourAnnaRicaSicang
 
6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.pptAnnaRicaSicang
 
Learners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptxLearners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptxAnnaRicaSicang
 
local_media7091492881283460429.pptx
local_media7091492881283460429.pptxlocal_media7091492881283460429.pptx
local_media7091492881283460429.pptxAnnaRicaSicang
 
ma'am Lademora report.pdf
ma'am Lademora report.pdfma'am Lademora report.pdf
ma'am Lademora report.pdfAnnaRicaSicang
 
teachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdfteachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdfAnnaRicaSicang
 
unit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdfunit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdfAnnaRicaSicang
 
524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdfAnnaRicaSicang
 

More from AnnaRicaSicang (11)

Contemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applicationsContemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applications
 
CRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and fourCRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and four
 
6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt
 
Learners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptxLearners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptx
 
volcanoes.pptx
volcanoes.pptxvolcanoes.pptx
volcanoes.pptx
 
local_media7091492881283460429.pptx
local_media7091492881283460429.pptxlocal_media7091492881283460429.pptx
local_media7091492881283460429.pptx
 
ma'am Lademora report.pdf
ma'am Lademora report.pdfma'am Lademora report.pdf
ma'am Lademora report.pdf
 
teachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdfteachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdf
 
K-12.pptx
K-12.pptxK-12.pptx
K-12.pptx
 
unit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdfunit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdf
 
524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Internet-Safety-1.pptx

  • 1. Internet Safety Internet safety, online safety or cyber safety means trying to be safe on the internet. It is maximizing the user’s personal safety and security risks to private information and property associated with using the internet, including self-protection from computer crime.
  • 2. Information Security Sensitive information, such as personal information, identity and passwords are often associated with personal property and privacy and may be present security concerns if leaked. Unauthorized access and usage of private information may result in consequences such as identity and property theft.
  • 3. Common causes of security breaches:  PHISHING-Scammers disguise as a trustworthy source in an attempt to obtain private information, such as passwords, credit card information, etc. through the use of fake websites that look identical and legitimate.  INTERNET SCAMS- These are schemes that deceive the users in various ways in an attempt to take advantage of them.  Malware-It is a malicious malware disguised to collect and transmit private information, such as password without the user’s consent or knowledge.
  • 4. Personal safety and threats A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system . Cybercrime is now becoming alarming in the life of every individual and the organization as they intend to steal information that they can sell or trade such as financial details, credit card information, personal details or any other information using computer networks.
  • 5. Ways on how to ensure that computer networks can be protected:  Install anti-virus software  Ensure that the anti-virus software is up-to-date  Employ a firewall to protect networks  Filter all email traffic  Educate all users to be careful of suspicious e-mails  Scan internet downloads  Do not run programs of unknown origin
  • 6. Ways on how to ensure that computer networks can be protected:  Implement a vulnerability management system  Make regular backups of critical data  Develop an information security policy  Monitor logs and systems  Develop an incident response plan  Restrict end-user access to the system
  • 7. CYBERBULLYING Cyberbullying, cyber harassment or online bullying is a form of bullying or harassment using electronic means usually among minors in a school setting and has become increasingly common especially among teenagers.
  • 8. TYPES OF CYBERBULLYING: 1. INTERNET TROLLING- is a common forms of bullying over the internet in an online community to elicit a reaction, disruption of intentionally provokes and offend others. 2. CYBERSTALKING- is another form of bullying or harassment that uses electronic communication to stalk a victim and post a credible threat to harass him/her.
  • 9. Implications of bullying in schools Schools should initiate various anti-bullying programs and campaigns to protect students from being threatened or victimized by such offense. More so, teachers should be oriented and trained in handling bullying cases and executing teaching strategies to address and reduce bullying cases in class. Also schools should conduct students empowerment activities that can be engaged by the students, including bullies to divert their attention and energy into something worthwhile and engagement that they can be busy about.
  • 10. CYBERCRIME Avast defines cybercrime as any criminal activity carried out using computers or the internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and social engineering to break the law.