SlideShare a Scribd company logo
1 of 11
How can we stay safe?
• Understand what a Computer Virus is
• Know how to protect your computer from a virus
• Understand Social Networking and how to stay safe
online
a piece of code which is capable of copying itself and
typically has a detrimental effect, such as corrupting the
system or destroying data.
• Antivirus Software - Antivirus or anti-virus software is software used to
prevent, detect and remove malware, such as: computer viruses, hijackers,
backdoors, rootkits, trojan horses, worms, adware and spyware.
• Firewall - protect (a network or system) from unauthorized access with a firewall.
• Browser Privacy Settings - Privacy settings are controls available on
many social networking and other websites that allow users to limit who can access
your profile and what information visitors can see.
• Pop-up Blocker - Pop-up ads or pop-ups are often forms of online advertising
on the World Wide Web intended to attract web traffic or capture email addresses.
Pop-ups are generally new web browser windows to display advertisements.
• User account control - is a technology and security infrastructure
introduced with Microsoft's Windows Vista. To summarise, a user account may have
administrator privileges assigned to it, but applications that the user runs do not inherit
those privileges unless they are approved beforehand or the user explicitly authorizes
it.
Ask Jeeves states;
‘Virus protection is important because it prevents loss of
data and intrusion of spyware into your computer. Having a
virus in your computer will usually slow down your
computer, and may make you lose control of your
computer. Viruses today have also been used by hackers
to get personal information from your computer such as
your credit card information’.
• Install an antivirus program
• Don’t open e-mails from unfamiliar senders
• Use a pop-up blocker
• Keep Windows updated
• Use a firewall
• Use your browser’s privacy settings
• Turn on User account control
• Clear your Internet cache and your browsing history
Click on the Windows icon for more information
• Think about the information, do you want it kept private or
made public?
• Photos
• Can’t take it back!
• Watch the Social Media Experiment below
produced by or involving two or more parties working
together.
"collaborative research
Blogs - a personal website or web page on which
an individual records opinions, links to other sites,
etc. on a regular basis or add new material to or
regularly update a blog.
Click on the icon for link to
the Apprenticeship Blog
Forums - An Internet forum, or message board,
is an online discussion site where people can hold
conversations in the form of posted messages.
They differ from chat rooms in that messages are
often longer than one line of text, and are at least
temporarily archived. Also, depending on the
access level of a user or the forum set-up, a
posted message might need to be approved by a
moderator before it becomes visible.
Click on the icon for links
to the Apprenticeship Forum
Pro’s
Talk to anyone around the world at any time not
just 9-5
Lots of varied opinions
Cons
Some sites not moderated so maybe just an
opinion not fact
Opinions from limited audience, only people who
use IT?
We should now
 Understand what a Computer Virus is
 Know how to protect your computer from
a virus
 Understand Social Networking and how to
stay safe online

More Related Content

What's hot

It security training
It security trainingIt security training
It security training
gethumamaravi
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
nicamos
 

What's hot (20)

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Spyware
SpywareSpyware
Spyware
 
Next Gen Firewall buyer's guide
Next Gen Firewall buyer's guideNext Gen Firewall buyer's guide
Next Gen Firewall buyer's guide
 
It security training
It security trainingIt security training
It security training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spyware spyware
spyware
 
Network security 22.1.18
Network security 22.1.18Network security 22.1.18
Network security 22.1.18
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
Spyware
SpywareSpyware
Spyware
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
spyware
spywarespyware
spyware
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 

Viewers also liked

Idol databases3
Idol databases3Idol databases3
Idol databases3
Kieffala
 
годишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайтгодишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайт
niod
 
navodila za admin
navodila za adminnavodila za admin
navodila za admin
pesec
 
扶青團經營建議方針
扶青團經營建議方針扶青團經營建議方針
扶青團經營建議方針
mrJim Note
 
сoncept-рouse-web-12
сoncept-рouse-web-12сoncept-рouse-web-12
сoncept-рouse-web-12
blackfung
 

Viewers also liked (17)

Dlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacjiDlaczego ludzie boją się prywatyzacji
Dlaczego ludzie boją się prywatyzacji
 
Idol databases3
Idol databases3Idol databases3
Idol databases3
 
Lv digital culture_rix_dc
Lv digital culture_rix_dcLv digital culture_rix_dc
Lv digital culture_rix_dc
 
годишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайтгодишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайт
 
navodila za admin
navodila za adminnavodila za admin
navodila za admin
 
扶青團經營建議方針
扶青團經營建議方針扶青團經營建議方針
扶青團經營建議方針
 
News Flash May 2013
News Flash May 2013News Flash May 2013
News Flash May 2013
 
Allah kahan hai
Allah kahan haiAllah kahan hai
Allah kahan hai
 
Aspis Night Blinds
Aspis Night BlindsAspis Night Blinds
Aspis Night Blinds
 
Seo shiksha
Seo shikshaSeo shiksha
Seo shiksha
 
Eu unit 10
Eu unit 10Eu unit 10
Eu unit 10
 
L unit 4
L unit 4L unit 4
L unit 4
 
Ventajas de moodle
Ventajas de moodleVentajas de moodle
Ventajas de moodle
 
сoncept-рouse-web-12
сoncept-рouse-web-12сoncept-рouse-web-12
сoncept-рouse-web-12
 
D2 interview skills v1
D2 interview skills v1D2 interview skills v1
D2 interview skills v1
 
Freelance vs freetime pomodoro technique
Freelance vs freetime pomodoro technique Freelance vs freetime pomodoro technique
Freelance vs freetime pomodoro technique
 
Set up a company in Ireland
Set up a company in IrelandSet up a company in Ireland
Set up a company in Ireland
 

Similar to Being online

Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 

Similar to Being online (20)

9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Internet security
Internet securityInternet security
Internet security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
anti_virus
anti_virusanti_virus
anti_virus
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer security
Computer securityComputer security
Computer security
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Internet
InternetInternet
Internet
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Internet security
Internet securityInternet security
Internet security
 

More from hpinn

Concentric and isometric
Concentric and isometricConcentric and isometric
Concentric and isometric
hpinn
 
Vacuum suction powerpoint
Vacuum suction powerpointVacuum suction powerpoint
Vacuum suction powerpoint
hpinn
 

More from hpinn (20)

Skin
SkinSkin
Skin
 
Joints
JointsJoints
Joints
 
Concentric and isometric
Concentric and isometricConcentric and isometric
Concentric and isometric
 
Concentric and isometric
Concentric and isometricConcentric and isometric
Concentric and isometric
 
Heart and voluntary
Heart and voluntaryHeart and voluntary
Heart and voluntary
 
Major muscles 1
Major muscles 1Major muscles 1
Major muscles 1
 
Stakeholder mapping
Stakeholder mappingStakeholder mapping
Stakeholder mapping
 
Bones millionaire quiz
Bones millionaire quizBones millionaire quiz
Bones millionaire quiz
 
Faradic body treatment
Faradic body treatmentFaradic body treatment
Faradic body treatment
 
Unit 715 produce biscuit, cake and sponge products 1
Unit 715 produce biscuit, cake and sponge products 1Unit 715 produce biscuit, cake and sponge products 1
Unit 715 produce biscuit, cake and sponge products 1
 
Galvanic body treatment powerpoint
Galvanic body treatment powerpointGalvanic body treatment powerpoint
Galvanic body treatment powerpoint
 
Vacuum suction powerpoint
Vacuum suction powerpointVacuum suction powerpoint
Vacuum suction powerpoint
 
Vacuum suction powerpoint
Vacuum suction powerpointVacuum suction powerpoint
Vacuum suction powerpoint
 
Level 3 colour theory
Level 3 colour theoryLevel 3 colour theory
Level 3 colour theory
 
Methods of hair_removal
Methods of hair_removalMethods of hair_removal
Methods of hair_removal
 
Contra indications
Contra indicationsContra indications
Contra indications
 
Faradic Facial Treatment
Faradic Facial TreatmentFaradic Facial Treatment
Faradic Facial Treatment
 
Excess hair growth
Excess hair growthExcess hair growth
Excess hair growth
 
Gender reassignment
Gender reassignmentGender reassignment
Gender reassignment
 
Micro dermabrasion
Micro dermabrasionMicro dermabrasion
Micro dermabrasion
 

Recently uploaded

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 

Recently uploaded (20)

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 

Being online

  • 1. How can we stay safe?
  • 2. • Understand what a Computer Virus is • Know how to protect your computer from a virus • Understand Social Networking and how to stay safe online
  • 3. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • 4. • Antivirus Software - Antivirus or anti-virus software is software used to prevent, detect and remove malware, such as: computer viruses, hijackers, backdoors, rootkits, trojan horses, worms, adware and spyware. • Firewall - protect (a network or system) from unauthorized access with a firewall. • Browser Privacy Settings - Privacy settings are controls available on many social networking and other websites that allow users to limit who can access your profile and what information visitors can see. • Pop-up Blocker - Pop-up ads or pop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements. • User account control - is a technology and security infrastructure introduced with Microsoft's Windows Vista. To summarise, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it.
  • 5. Ask Jeeves states; ‘Virus protection is important because it prevents loss of data and intrusion of spyware into your computer. Having a virus in your computer will usually slow down your computer, and may make you lose control of your computer. Viruses today have also been used by hackers to get personal information from your computer such as your credit card information’.
  • 6. • Install an antivirus program • Don’t open e-mails from unfamiliar senders • Use a pop-up blocker • Keep Windows updated • Use a firewall • Use your browser’s privacy settings • Turn on User account control • Clear your Internet cache and your browsing history Click on the Windows icon for more information
  • 7. • Think about the information, do you want it kept private or made public? • Photos • Can’t take it back! • Watch the Social Media Experiment below
  • 8. produced by or involving two or more parties working together. "collaborative research Blogs - a personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis or add new material to or regularly update a blog. Click on the icon for link to the Apprenticeship Blog
  • 9. Forums - An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes visible. Click on the icon for links to the Apprenticeship Forum
  • 10. Pro’s Talk to anyone around the world at any time not just 9-5 Lots of varied opinions Cons Some sites not moderated so maybe just an opinion not fact Opinions from limited audience, only people who use IT?
  • 11. We should now  Understand what a Computer Virus is  Know how to protect your computer from a virus  Understand Social Networking and how to stay safe online