SlideShare a Scribd company logo
1 of 4
Information TechnologyInformation Technology
Tyler GarrisonTyler Garrison
Professor JohnsonProfessor Johnson
ED 1023 – M1 – OnlineED 1023 – M1 – Online
Week 6Week 6
Internet Search ProcessInternet Search Process
1. Pick the best search tool such as: Bing, Google, Google Chrome, Mozilla
Firefox, or Internet Explorer.
2. Formulate the search query – putting in keywords or more words: God,
man, dog, history.
3. Perform the search – press the enter button/enter key.
4. Examine the search results – pick the best information needed for your
search.
5. Evaluate the credibility of the search results – double check to make sure
the information is valid and up to date.
Online Safety GuidelinesOnline Safety Guidelines
• Don’t post your every move.
• Only communicate with people you know
on a daily basis.
• Try not to get on them as much.
• Keep your contacts to a minimum.
• Avoid posting things that can ruin your
name or reputation.
• Finally, think before posting anything.
Wireless Network Security ThreatWireless Network Security Threat
• Lan Jacking - driving around with a laptop,
antenna, and wireless card searching for
unsecured wireless networks to access.
• Spoofing - hacker accessing a network to
create a fake Web site or sending mail
that looks as if coming from an internal
server.
• Rogue WLAN - hacker installing a
wireless router using a network resource
to expose network to security threats

More Related Content

What's hot

Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyKit O'Connell
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Social networking and internet security
Social networking and internet securitySocial networking and internet security
Social networking and internet securityFrank Brunke
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
 

What's hot (17)

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Users guide
Users guideUsers guide
Users guide
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online Privacy
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Social networking and internet security
Social networking and internet securitySocial networking and internet security
Social networking and internet security
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer Security
 

Viewers also liked

Ley de comercio electrónico, firmas electrónicas.
Ley de comercio electrónico, firmas electrónicas.Ley de comercio electrónico, firmas electrónicas.
Ley de comercio electrónico, firmas electrónicas.Alejandro Torres
 
Expolluta 2013 proyecto SP
Expolluta 2013 proyecto SPExpolluta 2013 proyecto SP
Expolluta 2013 proyecto SPAlexander Bichon
 
COLLEGE ENGLISH 1
COLLEGE ENGLISH 1COLLEGE ENGLISH 1
COLLEGE ENGLISH 1zzkimhieuzz
 
Partes de una vértebra
Partes de una vértebraPartes de una vértebra
Partes de una vértebraSharon Fonseca
 
Applying UX strategy to optimising the support experience
Applying UX strategy to optimising the support experienceApplying UX strategy to optimising the support experience
Applying UX strategy to optimising the support experienceProduct Anonymous
 
Mangosteen key performance indicators
Mangosteen key performance indicatorsMangosteen key performance indicators
Mangosteen key performance indicatorsRetno Astuti
 
Symmetry, rotation, translation, reflection
Symmetry, rotation, translation, reflectionSymmetry, rotation, translation, reflection
Symmetry, rotation, translation, reflectionTurnhout
 
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETES
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETESCENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETES
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETESccdn
 

Viewers also liked (14)

Ley de comercio electrónico, firmas electrónicas.
Ley de comercio electrónico, firmas electrónicas.Ley de comercio electrónico, firmas electrónicas.
Ley de comercio electrónico, firmas electrónicas.
 
Expolluta 2013 proyecto SP
Expolluta 2013 proyecto SPExpolluta 2013 proyecto SP
Expolluta 2013 proyecto SP
 
COLLEGE ENGLISH 1
COLLEGE ENGLISH 1COLLEGE ENGLISH 1
COLLEGE ENGLISH 1
 
Appar för pedagoger
Appar för pedagogerAppar för pedagoger
Appar för pedagoger
 
Presentación del block
Presentación del blockPresentación del block
Presentación del block
 
Partes de una vértebra
Partes de una vértebraPartes de una vértebra
Partes de una vértebra
 
Probabilidad1
Probabilidad1Probabilidad1
Probabilidad1
 
Applying UX strategy to optimising the support experience
Applying UX strategy to optimising the support experienceApplying UX strategy to optimising the support experience
Applying UX strategy to optimising the support experience
 
Target Analysis
Target AnalysisTarget Analysis
Target Analysis
 
Mangosteen key performance indicators
Mangosteen key performance indicatorsMangosteen key performance indicators
Mangosteen key performance indicators
 
01 clase07-08
01   clase07-0801   clase07-08
01 clase07-08
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Symmetry, rotation, translation, reflection
Symmetry, rotation, translation, reflectionSymmetry, rotation, translation, reflection
Symmetry, rotation, translation, reflection
 
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETES
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETESCENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETES
CENTRO DE CONTROL DE DIABETES Y NUTRICION.- CALIDAD DE VIDA CON DIABETES
 

Similar to Information technology powerpoint

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 

Similar to Information technology powerpoint (20)

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 

Information technology powerpoint

  • 1. Information TechnologyInformation Technology Tyler GarrisonTyler Garrison Professor JohnsonProfessor Johnson ED 1023 – M1 – OnlineED 1023 – M1 – Online Week 6Week 6
  • 2. Internet Search ProcessInternet Search Process 1. Pick the best search tool such as: Bing, Google, Google Chrome, Mozilla Firefox, or Internet Explorer. 2. Formulate the search query – putting in keywords or more words: God, man, dog, history. 3. Perform the search – press the enter button/enter key. 4. Examine the search results – pick the best information needed for your search. 5. Evaluate the credibility of the search results – double check to make sure the information is valid and up to date.
  • 3. Online Safety GuidelinesOnline Safety Guidelines • Don’t post your every move. • Only communicate with people you know on a daily basis. • Try not to get on them as much. • Keep your contacts to a minimum. • Avoid posting things that can ruin your name or reputation. • Finally, think before posting anything.
  • 4. Wireless Network Security ThreatWireless Network Security Threat • Lan Jacking - driving around with a laptop, antenna, and wireless card searching for unsecured wireless networks to access. • Spoofing - hacker accessing a network to create a fake Web site or sending mail that looks as if coming from an internal server. • Rogue WLAN - hacker installing a wireless router using a network resource to expose network to security threats