SlideShare a Scribd company logo
1 of 19
Cyber safety
What is cyber safety?
Cyber safety refers to the safe and
responsible use of internet to insure
safety and security of personal
information and not posing thread to
anyone else information.
Confidentiality of information
 PRACTICES TO ENSURE CONFIDENTIALITY OF INFORMATION
 1) use firewall wherever possible
 2)control browser setting to block tracking
 3)browser privately wherever possible
 4)be careful while posting on internet
 5)ensure safe sites while entering crucial information
 6)carefully handle emails
 7)do not give sensitive information on wireless networks
 8)avoid using public computers
Identity protection while using internet
MANY WAY WEBSITES TRACK YOU
a)Ip address
b)Cookies and tracking scripts
c)HTTP referrer
d)Super cookies
e)User agent
PRIVATE BROWSING AND ANONYMOUS BROWSING
Anonymous browsers allow users to view websites without revealing any personal info of users
like their ip address , machine type, location,etc
Private browsing includes a)incognito browsing b)proxy c)virtual private network
Cybercrime: is any criminal offence that is facilitated by ,or
involves the use of, electronic communications or information
systems, including any electronic device, computer or the
internet.
 A) cyber trolls and bulling: derogatory messages or comments posted
online targeting people are called cyber trolls.
 B) cyber bullying: harassing, demeaning, someone using modern tech. like
internet, cell phones ,etc is called cyber bulling.
 C) cyber stalking: this is kind of online harrassement wherein victim is
subjected to a barrage of online messages and emails.
 D) spreading rumours online: is a cybercrime and is a punishable offence.
 REPORTING CRIME : if any cybercrime happens, one must report it firstly
to parents , school authorities and then to police.

Appropriate usage of social networks.
 WHAT YOU SHOULD KNOW?
 Digital footprints: are the records and traces individuals activities as they use the internet.
Digital footprints are permanently stored.
 Privacy settings: always set-up privacy settings yourself by using account settings. You
can control: a)who can see what you posted b)who can send requests. C)what all information
about you is visible to others, even to your contacts etc.
 DO- USAGE WHAT YOU SHOULD RULES
 1) Be authentic: represent yourself in clear and honest way, without boasting.
 2) Use a disclaimer: share your personal views about something, do make it clear that these
are your personal views and you do not represent any institution here.
 3) Don’t pick fights online: sometimes people may respond your post in bad way.it is advised
that not to pick fights online.
Online access and computer security
 THREADS TO COMPUTER SECURITY
 1) COMPUTER VIRUSES: are the malicious codes/programs that cause damage to data
and files on a system. There are similar programs that cause virus like affects: worms and
Trojan horses.
 Damages caused by viruses: a)damage or delete files. b)slow down your computers.
c)invade your email program.
 2) SPYWARE: is a software which is installed on your computer to spy on your activities
and report this data to people willing to pay for it.
 Damages caused by spyware: a)compromises your data, computing habits, and
identity. b) alters PC settings c) slows down your PC
3)Adware: This are the program that deliver unwanted ads to your computer .they consume your network bandwidth.
 DAMAGE CAUSED BY ADWARE :a)Adware tracks information just like spyware b)Displays arrays of annoying
advertising c)slows down your PC
4)Spamming: refers to the sending of bulk mail by an identified or unidentified source. In non malicious form bulk
advertising mail is sent to many account.
DAMAGE CAUSED BY SPAMMING: a)spam reduces productivity b)spam eats up your time c)spam can lead to
worse things.
5)Intrusion: every pc connected to the internet is a potential target for hackers. Pc intrusion can occur in any of the
following form:
a) Sweeper attack b)denial of services c)password guessing.
6)Eavesdropping: unauthorized, monitoring of other people’s communications is called eavesdropping.
7)Phishing and pharming: in phishing, an imposter uses an authentic looking email or web site to trick recipients
into giving out sensitive personal information.in pharming, an attacks in which a hacker attempts to redirect a websites
traffic to another, bogus website.
8)Cookies: includes a)session data b)tracking information c)public computers.
Solutions to viruses, adware and spyware.
 There are two types of solutions:
 A)active protection b)preventive measures
 Solutions to viruses ,adware and spyware.
Active protection: a)use anti-virus and anti-spyware software.
b)Download updates regularly. C)run frequent full-system scans.
Preventative measures: a)keep your system up-to-date.
b)Use caution when downloading files on the internet. C)be careful with email.
D)disable cookies, if possible.
 Solutions to spam, eavesdropping
Active protection: a)use anti-spam software.it includes:
1)Sender filtering: this method allows only messages from your approved sender list to
reach your inbox. sender filtering is done on the basis of digital certificates and digital
signatures.
2)Keyword filtering: this method filters out email messages that contain certain
keywords or phrases, which are defined by you or others.
preventive measures: a) keep your email address private.
1)Always avoid conducting online transactions or using online banking services on
public networks or public internet facilities.
2)Install personal firewall on computers connected to the internet so as keep a check
on incoming and outgoing information and connections.
3)Install personal firewall on computers connected to the internet.
 Solutions to PC intrusion.
 Active protection: a) Authorization: asking the user a legal
login-id performs authorization. b) Authentication: is also termed
as password-protection as the authorized user is asked to provide
a valid password. c) firewall: a system designed to prevent
unauthorized access to form a private network is called firewall.
 Preventive measures: a)use proper file access permissions
when sharing files on the internet-file access permissions refer to
privileges that allow a user to read, write or execute a file. File
permissions are given for three sets of users: owner, group and
others.
 b)disconnect from the internet when away:
 Solutions to phishing and pharming.
 Active protection: a)take the computer offline. b)backup all files on the
hand drive. C) list the information given to phishing scammers. D) run anti-
virus software. E)contact credit agencies to report any possibilities of
identity scammers.
 Preventive measures: a) don’t open emails from unknown sources or
click on links embedded in suspect messages.
b)check the security guidelines of websites such as pay pal so that you can
distinguish between legitimate and bogus emails.
c) also, rather than on clicking on the link embedded in an email , you can
type the general link in your web browser
d) Most important, when in doubt, do not click.
firewall-an important solution for
computer security.
 An internet firewall is a device or software that is designed to protect your
computer data and viruses that you do not want.
 A firewall is a network security system, either hardware or software –based,
that controls incoming and outgoing network traffic based on a set of
rules.
 Firewalls can be implemented in two forms:
Software firewall.
Hardware firewall.
What is software firewall and hardware firewall?
Software firewall:
A software firewall is a special type of computer software running on a computer.it
protects your computer from outside attempts to control or gain access, and
depending on your choice of software firewall, it could also provide protection against
the most common Trojan programs or email worms.
Hardware firewall:
It is physical piece of equipment designed to perform firewall duties. Firewall keep out
malevolent hackers and people who intended to do damage and take over other
peoples servers
Presented:
shubhangi
roll no: 22
class- xi ‘a’

More Related Content

Similar to shubhangi.pptx

Similar to shubhangi.pptx (20)

Internet security
Internet securityInternet security
Internet security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Hamza
HamzaHamza
Hamza
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Computer security
Computer securityComputer security
Computer security
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

shubhangi.pptx

  • 2.
  • 3. What is cyber safety? Cyber safety refers to the safe and responsible use of internet to insure safety and security of personal information and not posing thread to anyone else information.
  • 4.
  • 5. Confidentiality of information  PRACTICES TO ENSURE CONFIDENTIALITY OF INFORMATION  1) use firewall wherever possible  2)control browser setting to block tracking  3)browser privately wherever possible  4)be careful while posting on internet  5)ensure safe sites while entering crucial information  6)carefully handle emails  7)do not give sensitive information on wireless networks  8)avoid using public computers
  • 6.
  • 7. Identity protection while using internet MANY WAY WEBSITES TRACK YOU a)Ip address b)Cookies and tracking scripts c)HTTP referrer d)Super cookies e)User agent PRIVATE BROWSING AND ANONYMOUS BROWSING Anonymous browsers allow users to view websites without revealing any personal info of users like their ip address , machine type, location,etc Private browsing includes a)incognito browsing b)proxy c)virtual private network
  • 8.
  • 9. Cybercrime: is any criminal offence that is facilitated by ,or involves the use of, electronic communications or information systems, including any electronic device, computer or the internet.  A) cyber trolls and bulling: derogatory messages or comments posted online targeting people are called cyber trolls.  B) cyber bullying: harassing, demeaning, someone using modern tech. like internet, cell phones ,etc is called cyber bulling.  C) cyber stalking: this is kind of online harrassement wherein victim is subjected to a barrage of online messages and emails.  D) spreading rumours online: is a cybercrime and is a punishable offence.  REPORTING CRIME : if any cybercrime happens, one must report it firstly to parents , school authorities and then to police. 
  • 10. Appropriate usage of social networks.  WHAT YOU SHOULD KNOW?  Digital footprints: are the records and traces individuals activities as they use the internet. Digital footprints are permanently stored.  Privacy settings: always set-up privacy settings yourself by using account settings. You can control: a)who can see what you posted b)who can send requests. C)what all information about you is visible to others, even to your contacts etc.  DO- USAGE WHAT YOU SHOULD RULES  1) Be authentic: represent yourself in clear and honest way, without boasting.  2) Use a disclaimer: share your personal views about something, do make it clear that these are your personal views and you do not represent any institution here.  3) Don’t pick fights online: sometimes people may respond your post in bad way.it is advised that not to pick fights online.
  • 11. Online access and computer security  THREADS TO COMPUTER SECURITY  1) COMPUTER VIRUSES: are the malicious codes/programs that cause damage to data and files on a system. There are similar programs that cause virus like affects: worms and Trojan horses.  Damages caused by viruses: a)damage or delete files. b)slow down your computers. c)invade your email program.  2) SPYWARE: is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it.  Damages caused by spyware: a)compromises your data, computing habits, and identity. b) alters PC settings c) slows down your PC
  • 12. 3)Adware: This are the program that deliver unwanted ads to your computer .they consume your network bandwidth.  DAMAGE CAUSED BY ADWARE :a)Adware tracks information just like spyware b)Displays arrays of annoying advertising c)slows down your PC 4)Spamming: refers to the sending of bulk mail by an identified or unidentified source. In non malicious form bulk advertising mail is sent to many account. DAMAGE CAUSED BY SPAMMING: a)spam reduces productivity b)spam eats up your time c)spam can lead to worse things. 5)Intrusion: every pc connected to the internet is a potential target for hackers. Pc intrusion can occur in any of the following form: a) Sweeper attack b)denial of services c)password guessing. 6)Eavesdropping: unauthorized, monitoring of other people’s communications is called eavesdropping. 7)Phishing and pharming: in phishing, an imposter uses an authentic looking email or web site to trick recipients into giving out sensitive personal information.in pharming, an attacks in which a hacker attempts to redirect a websites traffic to another, bogus website. 8)Cookies: includes a)session data b)tracking information c)public computers.
  • 13. Solutions to viruses, adware and spyware.  There are two types of solutions:  A)active protection b)preventive measures  Solutions to viruses ,adware and spyware. Active protection: a)use anti-virus and anti-spyware software. b)Download updates regularly. C)run frequent full-system scans. Preventative measures: a)keep your system up-to-date. b)Use caution when downloading files on the internet. C)be careful with email. D)disable cookies, if possible.
  • 14.  Solutions to spam, eavesdropping Active protection: a)use anti-spam software.it includes: 1)Sender filtering: this method allows only messages from your approved sender list to reach your inbox. sender filtering is done on the basis of digital certificates and digital signatures. 2)Keyword filtering: this method filters out email messages that contain certain keywords or phrases, which are defined by you or others. preventive measures: a) keep your email address private. 1)Always avoid conducting online transactions or using online banking services on public networks or public internet facilities. 2)Install personal firewall on computers connected to the internet so as keep a check on incoming and outgoing information and connections. 3)Install personal firewall on computers connected to the internet.
  • 15.  Solutions to PC intrusion.  Active protection: a) Authorization: asking the user a legal login-id performs authorization. b) Authentication: is also termed as password-protection as the authorized user is asked to provide a valid password. c) firewall: a system designed to prevent unauthorized access to form a private network is called firewall.  Preventive measures: a)use proper file access permissions when sharing files on the internet-file access permissions refer to privileges that allow a user to read, write or execute a file. File permissions are given for three sets of users: owner, group and others.  b)disconnect from the internet when away:
  • 16.  Solutions to phishing and pharming.  Active protection: a)take the computer offline. b)backup all files on the hand drive. C) list the information given to phishing scammers. D) run anti- virus software. E)contact credit agencies to report any possibilities of identity scammers.  Preventive measures: a) don’t open emails from unknown sources or click on links embedded in suspect messages. b)check the security guidelines of websites such as pay pal so that you can distinguish between legitimate and bogus emails. c) also, rather than on clicking on the link embedded in an email , you can type the general link in your web browser d) Most important, when in doubt, do not click.
  • 17. firewall-an important solution for computer security.  An internet firewall is a device or software that is designed to protect your computer data and viruses that you do not want.  A firewall is a network security system, either hardware or software –based, that controls incoming and outgoing network traffic based on a set of rules.  Firewalls can be implemented in two forms: Software firewall. Hardware firewall.
  • 18. What is software firewall and hardware firewall? Software firewall: A software firewall is a special type of computer software running on a computer.it protects your computer from outside attempts to control or gain access, and depending on your choice of software firewall, it could also provide protection against the most common Trojan programs or email worms. Hardware firewall: It is physical piece of equipment designed to perform firewall duties. Firewall keep out malevolent hackers and people who intended to do damage and take over other peoples servers