Submit Search
Upload
Unit+two+ +cyber+ethics+and+online+safety
•
1 like
•
297 views
Erdo Deshiant Garnaby
Follow
+ethics+and+online+safety
Read less
Read more
Software
Report
Share
Report
Share
1 of 13
Download now
Download to read offline
Recommended
CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
Cyberterrorismv1
Cyberterrorismv1
100688767-barrett
Cyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
Cyber crime & security
Cyber crime & security
Ronson Fernandes
Cyberterrorism
Cyberterrorism
Gohar Sokhakyan
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
Cyber security; one banker s perspective
Cyber security; one banker s perspective
Mohammad Ibrahim Fheili
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
Recommended
CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
Cyberterrorismv1
Cyberterrorismv1
100688767-barrett
Cyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
Cyber crime & security
Cyber crime & security
Ronson Fernandes
Cyberterrorism
Cyberterrorism
Gohar Sokhakyan
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
Cyber security; one banker s perspective
Cyber security; one banker s perspective
Mohammad Ibrahim Fheili
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
Cyber security
Cyber security
Debaroy1995
1358619756 cyber terrorism
1358619756 cyber terrorism
Gayatri Aryasomayajula
New internet security
New internet security
university of mumbai
Internet Security
Internet Security
mjelson
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
cyber terrorism
cyber terrorism
Accenture
Internet security
Internet security
Mohammed Adam
internet security
internet security
Cheryl Tanicala-Roldan
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
Computer & internet Security
Computer & internet Security
Gerard Lamusse
091005 Internet Security
091005 Internet Security
dkp205
Internet Security
Internet Security
Chris Rodgers
Tools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Computer Vandalism
Computer Vandalism
Aditya Singh
Cyber crime
Cyber crime
Aashir Khalil
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
Combatting cyberterrorism
Combatting cyberterrorism
kelvingg
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Ethics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
More Related Content
What's hot
Cyber security
Cyber security
Debaroy1995
1358619756 cyber terrorism
1358619756 cyber terrorism
Gayatri Aryasomayajula
New internet security
New internet security
university of mumbai
Internet Security
Internet Security
mjelson
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Andrew Morris
cyber terrorism
cyber terrorism
Accenture
Internet security
Internet security
Mohammed Adam
internet security
internet security
Cheryl Tanicala-Roldan
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
Computer & internet Security
Computer & internet Security
Gerard Lamusse
091005 Internet Security
091005 Internet Security
dkp205
Internet Security
Internet Security
Chris Rodgers
Tools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Computer Vandalism
Computer Vandalism
Aditya Singh
Cyber crime
Cyber crime
Aashir Khalil
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
Combatting cyberterrorism
Combatting cyberterrorism
kelvingg
What's hot
(20)
Cyber security
Cyber security
1358619756 cyber terrorism
1358619756 cyber terrorism
New internet security
New internet security
Internet Security
Internet Security
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
cyber terrorism
cyber terrorism
Internet security
Internet security
internet security
internet security
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Computer & internet Security
Computer & internet Security
091005 Internet Security
091005 Internet Security
Internet Security
Internet Security
Tools and methods used in cybercrime
Tools and methods used in cybercrime
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
Computer Vandalism
Computer Vandalism
Cyber crime
Cyber crime
Cyber Terrorism
Cyber Terrorism
Combatting cyberterrorism
Combatting cyberterrorism
Similar to Unit+two+ +cyber+ethics+and+online+safety
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Ethics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
the lesson about the information and communication to technology
the lesson about the information and communication to technology
lcnemedez
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
jennyJey2
L1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptx
HazelLynnAquiatan
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
Your e image presentation
Your e image presentation
lahill16
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Velma
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
Greater Cleveland PC Users Group
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
ssuserc4a497
Online ethics
Online ethics
Mohammad Syukran Kamal Ruzzaman
social networking .pptx
social networking .pptx
AdityaSingh875352
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
markgernale24
Computer Ethics By Anas Habib
Computer Ethics By Anas Habib
AnasHabib23
Similar to Unit+two+ +cyber+ethics+and+online+safety
(20)
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ethics and safety measures in Computing
Ethics and safety measures in Computing
the lesson about the information and communication to technology
the lesson about the information and communication to technology
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
L1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptx
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Your e image presentation
Your e image presentation
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
Online ethics
Online ethics
social networking .pptx
social networking .pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
Computer Ethics By Anas Habib
Computer Ethics By Anas Habib
More from Erdo Deshiant Garnaby
Hackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
Computer Security Hacking
Computer Security Hacking
Erdo Deshiant Garnaby
Org Design
Org Design
Erdo Deshiant Garnaby
HOS Talent management presentation
HOS Talent management presentation
Erdo Deshiant Garnaby
Talent management
Talent management
Erdo Deshiant Garnaby
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
Erdo Deshiant Garnaby
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
Erdo Deshiant Garnaby
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
Erdo Deshiant Garnaby
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
Erdo Deshiant Garnaby
microsoft+windows+security
microsoft+windows+security
Erdo Deshiant Garnaby
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
Erdo Deshiant Garnaby
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
Erdo Deshiant Garnaby
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
Erdo Deshiant Garnaby
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
Erdo Deshiant Garnaby
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
Erdo Deshiant Garnaby
Cyber Ethics
Cyber Ethics
Erdo Deshiant Garnaby
More from Erdo Deshiant Garnaby
(16)
Hackers Cracker Network Intruder
Hackers Cracker Network Intruder
Computer Security Hacking
Computer Security Hacking
Org Design
Org Design
HOS Talent management presentation
HOS Talent management presentation
Talent management
Talent management
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
microsoft+windows+security
microsoft+windows+security
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
Cyber Ethics
Cyber Ethics
Recently uploaded
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
aagamshah0812
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
Delhi Call girls
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
OnePlan Solutions
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
Define the academic and professional writing..pdf
Define the academic and professional writing..pdf
PearlKirahMaeRagusta1
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
AmarnathKambale
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
Shane Coughlan
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
kalichargn70th171
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Direct Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension Aid
Philip Schwarz
The title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
Jhone kinadey
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
ComplianceQuest1
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
Jittipong Loespradit
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
proinshot.com
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Delhi Call girls
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
kalichargn70th171
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
ryanfarris8
Recently uploaded
(20)
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
Define the academic and professional writing..pdf
Define the academic and professional writing..pdf
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
Direct Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension Aid
The title is not connected to what is inside
The title is not connected to what is inside
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Unit+two+ +cyber+ethics+and+online+safety
1.
AIR FORCE ASSOCIATION’S NATIONAL
YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org UNIT TWO Cyber Ethics and Online Safety
2.
AIR FORCE ASSOCIATION’S NATIONAL
YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION ONE Cyber Ethics 1
3.
© Air Force
Association Commonly accepted rules of how to behave online 2 Netiquette • Do not spam forums, chat rooms, or social media sites with useless or repeated information • Do not pretend to be someone else • Do not post or distribute illegal material • Do not use abusive or threatening language • Do not try to obtain personal info about someone H00psF@N89: Did you guys see the game last night? B@ll3r4Lyfe: I did! Miami did alright on D, but they have to work on their 3pt game L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
4.
© Air Force
Association • Affects 29.2% of students every year and the number is growing • Forms: ‐ Insulting texts or emails ‐ Rumors sent via email or social networking sites ‐ Fake profiles ‐ Embarrassing photos or videos • Why it’s harmful: ‐ Anonymous ‐ Can be done 24/7 3 Cyberbullying An0nym0us1234: OMG. Did u see Jane’s skirt today?? What color was that??! puke green??? N0n@me1234: I know!!!!! She’s totally uggo. Source: http://www.stopbullying.gov/cyberbullying/
5.
© Air Force
Association • Do not respond to any messages, posts or emails • Block offenders • Document and report the behavior so it can be addressed • Flag the content so other people aren’t hurt by it 4 Cyberbullying: If it Happens to You Source: http://www.stopbullying.gov/cyberbullying/
6.
© Air Force
Association • To schools: • Inform your school of any cyberbullying as you would with other types of bullying • Provide screenshots or records of bullying • To your parents and law enforcement, especially if it involves any of the following: • Threats of violence • Explicit messages or photos • Taking a photo or video of someone in a place where he or she would expect privacy • Stalking and hate crimes 5 Cyberbullying: Report It
7.
© Air Force
Association 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. 6 The 10 Commandments of Computer Ethics Source: The Computer Ethics Institute, http://computerethicsinstitute.org/
8.
AIR FORCE ASSOCIATION’S NATIONAL
YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION TWO Online Safety 7
9.
© Air Force
Association • Chat only with trusted, verified individuals • Never publically share these things online: ‐ Passwords ‐ Social Security number ‐ Student ID number ‐ Other Personally Identifiable Information (PII) • Never share your password • Always log out when you are done • Never post anything you do not want public ‐ You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to someone else 8 Safety Online: The Basics
10.
© Air Force
Association • Online Shopping • Social Media • Any other website that requires Personally Identifiable Information (PII) • These sites are enjoyable and useful. Just make sure you are being extra careful when visiting them. 9 Risk Sites
11.
© Air Force
Association https://login.microsoftonline.com/ • Do not use public Wi-Fi to access risk sites • Check the address for spoofs • Use a secure website, especially when submitting PII ‐ Look for an "s" after “http” in the web address ‐ Look for a ‘padlock’ in the browser address bar ‐ Look for a green background or green text 10 Safe Browsing http://bank0famerica.com
12.
© Air Force
Association • Use automatic updates • Use and regularly update built-in safety features ‐ Pop-up blockers ‐ Anti-spyware ‐ Anti-virus ‐ Anti-phishing • Do not use “Save Password” or “Remember Me” functions • Internet Explorer is more frequently targeted and has more security flaws than any other browser 11 Browser Tools
13.
© Air Force
Association • Be picky ‐ Only accept or follow friends you know if real life • Do not post your location • Be careful with apps ‐ Games and geo-tracking apps may give away your location or other PII • Assume everything you post online is permanent ‐ Colleges and employers check social media accounts • Don’t over-share ‐ Just because a site asks for information doesn’t mean it’s required to set up an account • Customize and update your security settings ‐ Default settings are weak 12 Social Media Tips ? Source: play.google.com
Download now