SlideShare a Scribd company logo
1 of 20
How to Surf the web safely
Information about the Internet
• Definition and
background
• Why do you use the
internet?
• Where does the
internet come from?
• Facts about the
internet
Uses of the Internet
The Bad Side of the Internet
• Identity theft
• Strangers
• Viruses
• Incorrect information
• Harmful ideas
• Bullying
• Distraction
• Inappropriate websites
Identity Theft
• How do you get
your identity
stolen?
• Internet has made
identity theft much
easier
• Protect yourself,
don’t give out any
personal
information
Viruses
• What’s the
easiest way to
get a virus on
your
computer?
• Use anti-virus
software
• Save and
back-up your
work
Incorrect Information
• It is often very difficult to tell between real
and bogus information
Harmful Ideas
• People can
spread ideas for
destructive
purposes
• How can we
prevent this from
happening?
Cyber-Bullying
• The internet and cell phones
make it easier for people to say
mean things they wouldn’t usually
say in person
• Report any inappropriate actions
online by others to your teacher or
parents
• Cyber-bullying is a serious threat
– “Sticks and Stones”
Distraction
• Online games
• Waste time
• Internet
addiction
• You can
become very
unhealthy
Benefits of the Internet
• Educational
Purposes
• Asking questions
• Connecting people
• Increasing business
• Saving time
Educational Purposes
• Infinite
resources to
answer
questions
• Get answers
fast
• No need for
library
Asking Questions
• You can get
almost any
question
answered on
the internet
• Very diverse
audience
• Discussion
boards
Connecting People
• Skype
• Facebook
• Twitter
• Email
• Instant messenger
Save Time
• Find recipes
online
• Buy things
online
• Communicatio
n
• Pay bills online
Things to Know When Surfing
• Never give out
personal
information
• Stay away from
untrusted
websites
• Don’t accept
email from people
you don’t know
• Know which sites
are legitimate
Password Selection
• Strength of password
depends on length, use
of many characters.
– Weak: “harrypotter”
– Strong: “ek95*.DS0P?
2593”
• Occasionally change
passwords
• Never tell anyone your
password
• http://strongpasswordgen
erator.com
Parental controls software
• Parental Control Software like NetNanny
to control when your kids can go online
and what they are allowed to see.
• ALERTS & REPORTING
• TIME CONTROLS
• PROFANITY MASKING
• MONITORING IM CLIENTS
• http://netnanny.in
Communication
• There are workarounds for everything.
Your best bet is to get buy in. Talk to them,
talk to them frequently.
• Explain why you’re telling them what
you’re telling them
• The screen should be facing the room.
Q&A
• Please feel free to ask any questions you
may have.
• All the material used for building this
presentation is available online. Google is
your friend.

More Related Content

What's hot

Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 

What's hot (20)

Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 
Installation open erp
Installation open erpInstallation open erp
Installation open erp
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
Rapport de stage développement informatique
Rapport de stage développement informatique Rapport de stage développement informatique
Rapport de stage développement informatique
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
Offre De Service Sup Modeleur
Offre De Service Sup ModeleurOffre De Service Sup Modeleur
Offre De Service Sup Modeleur
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
Réseaux sociaux et recherche d’emploi
Réseaux sociaux et recherche d’emploiRéseaux sociaux et recherche d’emploi
Réseaux sociaux et recherche d’emploi
 
Stratégies de recherche d'emploi
Stratégies de recherche d'emploiStratégies de recherche d'emploi
Stratégies de recherche d'emploi
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
Présentation du compte rendu de stage d'observation de 14 jours
Présentation du compte rendu de stage d'observation de 14 joursPrésentation du compte rendu de stage d'observation de 14 jours
Présentation du compte rendu de stage d'observation de 14 jours
 
Présentation10
Présentation10Présentation10
Présentation10
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
556ef78d93c3b
556ef78d93c3b556ef78d93c3b
556ef78d93c3b
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 

Similar to Internet safety presentation sv

Internet safety
Internet safetyInternet safety
Internet safety
myasinpak
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
ahad55
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
benlangley-efc
 

Similar to Internet safety presentation sv (20)

Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Internet safety
Internet safetyInternet safety
Internet safety
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Internet safety presentation sv

  • 1. How to Surf the web safely
  • 2. Information about the Internet • Definition and background • Why do you use the internet? • Where does the internet come from? • Facts about the internet
  • 3. Uses of the Internet
  • 4. The Bad Side of the Internet • Identity theft • Strangers • Viruses • Incorrect information • Harmful ideas • Bullying • Distraction • Inappropriate websites
  • 5. Identity Theft • How do you get your identity stolen? • Internet has made identity theft much easier • Protect yourself, don’t give out any personal information
  • 6. Viruses • What’s the easiest way to get a virus on your computer? • Use anti-virus software • Save and back-up your work
  • 7. Incorrect Information • It is often very difficult to tell between real and bogus information
  • 8. Harmful Ideas • People can spread ideas for destructive purposes • How can we prevent this from happening?
  • 9. Cyber-Bullying • The internet and cell phones make it easier for people to say mean things they wouldn’t usually say in person • Report any inappropriate actions online by others to your teacher or parents • Cyber-bullying is a serious threat – “Sticks and Stones”
  • 10. Distraction • Online games • Waste time • Internet addiction • You can become very unhealthy
  • 11. Benefits of the Internet • Educational Purposes • Asking questions • Connecting people • Increasing business • Saving time
  • 12. Educational Purposes • Infinite resources to answer questions • Get answers fast • No need for library
  • 13. Asking Questions • You can get almost any question answered on the internet • Very diverse audience • Discussion boards
  • 14. Connecting People • Skype • Facebook • Twitter • Email • Instant messenger
  • 15. Save Time • Find recipes online • Buy things online • Communicatio n • Pay bills online
  • 16. Things to Know When Surfing • Never give out personal information • Stay away from untrusted websites • Don’t accept email from people you don’t know • Know which sites are legitimate
  • 17. Password Selection • Strength of password depends on length, use of many characters. – Weak: “harrypotter” – Strong: “ek95*.DS0P? 2593” • Occasionally change passwords • Never tell anyone your password • http://strongpasswordgen erator.com
  • 18. Parental controls software • Parental Control Software like NetNanny to control when your kids can go online and what they are allowed to see. • ALERTS & REPORTING • TIME CONTROLS • PROFANITY MASKING • MONITORING IM CLIENTS • http://netnanny.in
  • 19. Communication • There are workarounds for everything. Your best bet is to get buy in. Talk to them, talk to them frequently. • Explain why you’re telling them what you’re telling them • The screen should be facing the room.
  • 20. Q&A • Please feel free to ask any questions you may have. • All the material used for building this presentation is available online. Google is your friend.