This document discusses various computing ethics and security best practices. It recommends regularly updating software, using antivirus software, strong and unique passwords, and caution when downloading files or entering personal information online. It warns about phishing scams, social engineering tricks, and protecting information in public places like internet cafes. The overall message is that practicing basic online safety and being wary of potential threats can help avoid most cyber dangers.
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
These are the notes for the slideshow offered as a JCCCRA TechTalk on Thursday, November 30, 2018. See the slideshow that is also available at www.slideshare.net/jbacon
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
If you don't already have a security training program, this presentation is a great tool for a new hire orientation or company-wide meeting. It includes all of our top 10 tips, plus examples of relevant news stories to drive home the point. You can customize it to include your own tips or insert individual slides in other presentations.
Download a customizable PPT here: www.sophos.com/staysafe
Slides produced for a workshop on measures to use to protect your computer and system security. By Computer Troubleshooters, Dayton, Ohio. February 15, 2014
How to Improve Computer Security - Wikki VermaWikki Verma
In this PPT, we have discussed about the various tips to improve computer security which will be helpful to protect the data from critical attacks and unauthorized access.
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
These are the notes for the slideshow offered as a JCCCRA TechTalk on Thursday, November 30, 2018. See the slideshow that is also available at www.slideshare.net/jbacon
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
If you don't already have a security training program, this presentation is a great tool for a new hire orientation or company-wide meeting. It includes all of our top 10 tips, plus examples of relevant news stories to drive home the point. You can customize it to include your own tips or insert individual slides in other presentations.
Download a customizable PPT here: www.sophos.com/staysafe
Slides produced for a workshop on measures to use to protect your computer and system security. By Computer Troubleshooters, Dayton, Ohio. February 15, 2014
How to Improve Computer Security - Wikki VermaWikki Verma
In this PPT, we have discussed about the various tips to improve computer security which will be helpful to protect the data from critical attacks and unauthorized access.
This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
Information Technology is evolving at rapid speeds, and so are the cyber threats / hackers. SecurityRI.com created this SlideShare to help bring awareness to the end-users. Each slide helps explain the threats, and ways to avoid / reduce your exposure.
Please contact us with any questions, and be sure to follow our company account on LinkedIn for daily updates / informational tips.
Thank you!
Free ebook! Discussions around cybersecurity can be complex, but everyone must know that you should stay safe online, regardless of your technical expertise. This ebook gives you some essential tips for keeping yourself and your data secure on the internet.
ebook download link: https://zcu.io/nsTr
What else does it cover?
If you have been considering what steps you can take to protect yourself from threats, you’ll get great insights about what types of common risks exist and how you can prepare for them.
- Security Measures for General Public
- Security Measures for Remote Employees
- Common Cybersecurity Risks For Business By Employees
- Cybersecurity Career Opportunities for Tech Enthusiasts
Stay Safe in the Cyberspace!
#freeebook #ebook #cybersecurity #cybersecurityawareness #security #cybersecurity #cloudsecurity #infosec #privacy #datasecurity #cyberattack #databreach #dataprotection #digital #security #phishing #informationsecurityawareness #informationsecurity
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Hom
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Cyber Security
1. Computing Ethics
Towards Safe Computing
By: Dheeraj Mehrotra
www.computerscienceexpertise.com
computerscienceexpertise.com
Towards Quality IT Literacy
3. Ensure you have the latest
updates. Install updates and
security patches on all servers,
desktop and laptop PCs.
computerscienceexpertise.com
Towards Quality IT Literacy
4. Reduce the risk of viruses.
There are numerous things you
can do to protect your computer
and your network against viruses.
Using anti-virus software and
keeping it current is the first step,
computerscienceexpertise.com
Towards Quality IT Literacy
5. Use Windows Security Centre
to manage your settings. Get a
clear picture of the security
settings on your PC using the
single, unified view provided in
the Windows Security Centre.
computerscienceexpertise.com
Towards Quality IT Literacy
6. Download internet files from
trusted sources only. If you're
unsure if the files you want to
download are safe, consider
downloading them to a disk
separate from your hard drive,
such as a CD or floppy. Then you
can scan the files with your virus
scanner.
computerscienceexpertise.com
Towards Quality IT Literacy
7. Use password encryption to protect Office
files. Improved encryption technology has
strengthened password security in Word 2003
and Excel 2003 and extends password
encryption to PowerPoint 2003. Look under the
Tools menu in each of these three programs to
activate password protection. This is an
effective way to restrict access to confidential
business information.
computerscienceexpertise.com
Towards Quality IT Literacy
8. Clean your hard drive before you discard a
PC. If you're getting a new PC or notebook and
your old one is being discarded, be sure to
remove any sensitive business or personal
information before you let it go. This doesn't
mean simply deleting files and emptying your
Recycle Bin. Your options include reformatting
the hard drive or acquiring software that wipes it
clean.
computerscienceexpertise.com
Towards Quality IT Literacy
9. Use a firewall. If your company
uses always-on broadband to
connect to the internet, install a
firewall as a basic line of defence
against outside intruders.
computerscienceexpertise.com
Towards Quality IT Literacy
10. Never surf the web from a
server. As the command centre
for your entire network, a server
typically stores critical business
information.
computerscienceexpertise.com
Towards Quality IT Literacy
11. Be smart about passwords.
Always use strong passwords
that are at least eight characters
long and a combination of lower
and upper case letters, numbers
and symbols. Don't use the same
password repeatedly and make it
a point to change your
passwords frequently.
computerscienceexpertise.com
Towards Quality IT Literacy
12. Create secure, original
passwords. Creating unique
passwords is one of the easiest
ways for consumers to ensure
their privacy and security online.
computerscienceexpertise.com
Towards Quality IT Literacy
13. Avoid deceptive attempts to trick
you into revealing credit card
numbers, bank accounts,
passwords or other personal
information.
computerscienceexpertise.com
Towards Quality IT Literacy
14. To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
any doubt, call the institution
claiming to need the information.
computerscienceexpertise.com
Towards Quality IT Literacy
15. Avoid Phishing
What is phishing?
Phishing means sending an e-mail that falsely claims to
be from a particular enterprise (like your bank) and
asking for sensitive financial information.
Phishing is sending out a 'bait' in the form of a spoofed
e-mail that closely mimics most bank notifications.
The fraudulent mail is socially engineered to convince
recipients to divulge sensitive information such as credit
card numbers, PIN, social security numbers and some
such information as per the experts.
computerscienceexpertise.com
Towards Quality IT Literacy
16. Practice basic e-mail and
downloading quot;street smarts.quot;
Most viruses are transmitted as
e-mail attachments.
computerscienceexpertise.com
Towards Quality IT Literacy
17. Avoid opening e-mail
attachments that contain quot;.vbs,quot;
quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file
extensions. Files that end in
these extensions are most likely
to contain some sort of virus.
computerscienceexpertise.com
Towards Quality IT Literacy
18. Be wary of e-mail messages that
ask for personal or financial
information such as user names
and passwords, credit card
numbers, and other sensitive
personal information, especially
those that are alarming and
upsetting in tone.
computerscienceexpertise.com
Towards Quality IT Literacy
19. Do not click any links inside an e-
mail that is suspected to be
spoofed. Instead, go directly to
the valid company's site then log
on from there or call the company
directly.
computerscienceexpertise.com
Towards Quality IT Literacy
20. Ensure that any Web site visited
is secure when submitting
sensitive information such as
credit card numbers
computerscienceexpertise.com
Towards Quality IT Literacy
21. Knowledge is still the best
protection from getting scammed.
It is important to educate oneself
on Internet fraud.
computerscienceexpertise.com
Towards Quality IT Literacy
22. Ensure that any Web site visited
is secure when submitting
sensitive information such as
credit card numbers
computerscienceexpertise.com
Towards Quality IT Literacy
23. Visit websites by typing the URL
directly into the address bar.
Make sure any site you reveal
information to uses encryption.
computerscienceexpertise.com
Towards Quality IT Literacy
24. Check credit card and bank
statements routinely. Notify
authorities if you suspect any
abuses of your personal
information.
computerscienceexpertise.com
Towards Quality IT Literacy
25. To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
any doubt, call the institution
claiming to need the information.
computerscienceexpertise.com
Towards Quality IT Literacy
26. Keep your passwords strong,
and keep them in your head.
computerscienceexpertise.com
Towards Quality IT Literacy
27. BACK UP THE HARD DRIVE
REGULARLY: Backing up files
will not prevent exposure or
damage from a virus but it can
minimize the consequences.
computerscienceexpertise.com
Towards Quality IT Literacy
28. INSTALL ANTI VIRUS
SOFTWARE: Make sure that you
have antivirus software installed
and that it is up to date.
computerscienceexpertise.com
Towards Quality IT Literacy
29. Don't share your password
with anyone, and don't write it
down - the only secure place
for your password is in your
head.
computerscienceexpertise.com
Towards Quality IT Literacy
30. USE GOOD PASSWORDS: Use
Good Passwords. Do NOT allow
a password to be blank or empty.
computerscienceexpertise.com
Towards Quality IT Literacy
31. SCAN EVERY FILE DOWNLOADED
FROM THE INTERNET BEFORE
USING OR OPENING IT: Another
way computers are infected is from
files downloaded from the internet. If
you scan every file every
time immediately after it is
downloaded, the risk of being
infected is greatly reduced
computerscienceexpertise.com
Towards Quality IT Literacy
32. BE WARY OF PUTTING YOUR
DISK INTO OTHER
COMPUTERS. If you use other
computers such as a colleague’s
computer, these computers may
not be protected. Make sure you
scan any disk that has been
in another computer as soon as
you insert it into your computer.
computerscienceexpertise.com
Towards Quality IT Literacy
34. SCAN YOUR HARD DISK
REGULARLY FOR VIRUSES.
computerscienceexpertise.com
Towards Quality IT Literacy
35. Get anti-virus software. Use it.
Keep it up to date.
computerscienceexpertise.com
Towards Quality IT Literacy
36. If you can't trust the source
you're downloading from, you
can't trust the file.
computerscienceexpertise.com
Towards Quality IT Literacy
37. Don't leave a computer you're
logged into unattended or
unprotected.
computerscienceexpertise.com
Towards Quality IT Literacy
38. 3. When considering what services should
be running on your system, here are a few
easy rules of thumb:
If you don't know what it is or what it does,
don't turn it on. In most every case, if you
find out later that you need it, you can go
back and turn it on.
If it's on, and you don't need it, turn it off.
If it's off, and you don't need it, don't turn
it on.
computerscienceexpertise.com
Towards Quality IT Literacy
39. Oath by kids:
I will not give out any personal information
online without my parents' permission. This
includes my name, phone number, address, e-
mail, location of my school, my parents' work
address/ telephone numbers and credit card
numbers, and my picture. This goes for
anywhere on the Internet, including e-mail, chat
rooms, newsgroups - even Web sites that
promise me free stuff or prizes, or on Web
pages that I make myself.
computerscienceexpertise.com
Towards Quality IT Literacy
40. Oath by kids:
When using the Internet, I will
always use a pretend name or
nickname that doesn't reveal
whether I'm a boy or a girl.
computerscienceexpertise.com
Towards Quality IT Literacy
41. Oath by kids:
When creating a password, I will
make one up that is hard to
guess but easy for me to
remember. To avoid having it
stolen, I will never reveal it to
anyone (except my parents) - not
even my best friend.
computerscienceexpertise.com
Towards Quality IT Literacy
42. Oath by kids:
I will not respond to any message
that makes me uncomfortable. I
will show an adult right away.
computerscienceexpertise.com
Towards Quality IT Literacy
43. Oath by kids:
I will arrange to meet a friend I
have made on the Internet ONLY
if one of my parents has been
informed and will be present.
computerscienceexpertise.com
Towards Quality IT Literacy
44. Oath by kids:
I will not send an insulting or rude
message to anyone online. This
is called quot;flamingquot; and it is not
good Netiquette.
computerscienceexpertise.com
Towards Quality IT Literacy
45. Oath by kids:
I will not open e-mail, files, links,
pictures or games from people
that I don't know or trust. I will
always ask an adult first.
computerscienceexpertise.com
Towards Quality IT Literacy
46. What you need to worry about:
Email frauds:
Emails that cheat you of huge sums of money by
offering fantastic overseas financial schemes and
promising great returns
nasty or obscene emails
People hacking into your account
People publishing your personal details (name,
photograph, telephone numbers) on dating or
pornographic sites without your consent
Identity theft: When people steal your personal
information
computerscienceexpertise.com
Towards Quality IT Literacy
47. THINGS YOU NEED TO WORRY
ABOUT:
Social engineering: When people trick you
into revealing your password
Downloading files or attachments that
may have Trojans (destructive programs
that masquerade as benign applications)
Clicking on links that can pick up your
personal details.
Losing money while shopping online
computerscienceexpertise.com
Towards Quality IT Literacy
48. Precautions you can take:
Email security:
Be careful where you post/submit
your email id on public forums.
Share it only with known people.
Do not download attachments or
files received through emails sent
by unknown persons.
computerscienceexpertise.com
Towards Quality IT Literacy
49. At a cyber café:
Never surf from a cyber café if you are keying in
any sensitive data. The computer may have a
program running in the background that is
storing all your information.
Be careful of inquisitive surfers around.
Always logout of all your messengers and any
mailbox you have open, before you leave.
computerscienceexpertise.com
Towards Quality IT Literacy
50. At home:
Most companies regularly release patches for security
holes in their software products. Always keep your
operating systems and software you regularly use (like
browsers, instant messengers, email programs, media
players) updated by downloading these patches.
Never click on links that say, 'download software' unless
you are absolutely sure of the content.
Never click on pop-ups that say, 'Click here for more
information'
computerscienceexpertise.com
Towards Quality IT Literacy
51. Better safe than sorry
If you stick to the above principle,
you can avoid most of the online
dangers.
computerscienceexpertise.com
Towards Quality IT Literacy
52. • An Initiative by:
– Dheeraj Mehrotra
• www.computerscienceexpertise.com
• (TOWARDS QUALITY IT LITERACY FOR ALL)
computerscienceexpertise.com
Towards Quality IT Literacy
53. •
Read a BLOG on QUALITY IN
EDUCATION:
http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/
Visit: www.computerscienceexpertise.com
The Quality IT learning Portal for All
computerscienceexpertise.com
Towards Quality IT Literacy