SlideShare a Scribd company logo
1 of 19
Ms.Ambreen
Introduction to ICT
Course Code: IT-311
Date: 18-06-2020
LECTURE#09
Ms.Ambreen
Internet Security
Staying safe
online
OutLine
 Introduction.
 Internet Security: What it is, and why we need it.
 Hackers: Who is he, Classes, Hacking Phases.
 Attacks exemples.
 What should I do to be safe online ?
 Conclusion
2
Introduction:
 While the internet offers enormous advantages and opportunities, it also presents
various security risks.
 It’s where we access our banking records, credit card statements, tax returns and other
highly sensitive personal information.
 Banks take extensive steps to protect the information transmitted andprocessed
when banking online.
 But with all the good things the Internet offers us, it also opens the door toserious,
potentially devastating threats.
3
 Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection of data
sent via Internet Protocol.
 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that come with
Internet use  Safety
Internet Security:
What it is
4
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
Internet Security:
Why you need it.
-Identifies your computer
-Where it is located
Request
Response
carries with it unwanted hidden software
5
Hackers:
Who is a Hacker ?
A hacker is an
individual who uses
computer.
The term hacker
may refer to
anyone with.
technical skills, but
it often refers to a
person who uses
his or her abilities
to gain
unauthorized
access
to systems or
networks in order to
commit crimes
6
Hackers
Hacker Classes :
Black Hats BLACK HATS BLACK HATS
The term “black hat”
originated from Western
movies, where the bad guys
wore black hats and the good
guys wore white hats.[1]
They try to inflict damage by
compromising security
systems, altering functions of
websites and networks, or
shutting down systems. They
often do so to steal or gain
access to passwords,
financial information, and
other personal data.
A black-hat hacker is an
individual who attempts to
gain unauthorized entry into
a system or network to
exploit them for malicious
reasons. The black-hat
hacker does not have any
permission or authority to
compromise their targets.
7
Hackers
Hacker Classes :
Grey Hats Grey Hats Grey Hats
A grey hat hacker is
someone who may
violate ethical
standards or
principles, but
without the
malicious intent
If issues are found,
they will report them
to the owner,
sometimes
requesting a small
fee to fix the issue.
grey hat
hackers will look
for vulnerabilities in
a system without
the owner's
permission or
knowledge.
8
Hackers
Hacker Classes :
White Hats White Hats White Hats
A white hat hacker
is a computer
security specialist
white hat hackers
have permission to
employ them
against the
organization that
has hired them.
who breaks into
protected systems
and networks to
test and asses their
security.
9
Attacks exemples.
Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit card
numbers.
10
Attacks exemples.
Phishing
11
What should I do to be safe online ?.
12
What should I do to be safe online ?.
 To protect your self
 Keep you
passwords private
and create ones
too strong that are
hard to “crack”
 If you have received an
Email encounters, you
may have been the
target of a common
scam called ‘phishing’.
13
What should I do to be safe online ?.
 To protect your self
 Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.  If you make purchases
or do your banking
online, make sure you
protect your financial
information
 Use ‘https://’
14
What should I do to be safe online ?.
 To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software so
unknown people cannot
lurk on your computer and
potentially
steal your information
15
Conclusion
 Whenever using internet or an online financial system, ensure that your
system is still under your control and not a spoofed puppet.
 Protecting your self from internet threats.
 Being aware of the dangers of the internet and taking the rightsteps to
avoid them means you can enjoy the internet safely.
16
Thank you !!!
17

More Related Content

What's hot

Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatIntellipaat
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 

What's hot (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Hackers
HackersHackers
Hackers
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 

Similar to Ict lec#9

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptxhavaneb872
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 

Similar to Ict lec#9 (20)

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
techalpha07
techalpha07techalpha07
techalpha07
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from amberkhan59

More from amberkhan59 (7)

Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Sorting and Its Types
Sorting and Its TypesSorting and Its Types
Sorting and Its Types
 
Lec#04
Lec#04Lec#04
Lec#04
 
Lec#03
Lec#03Lec#03
Lec#03
 
Lec#02
Lec#02Lec#02
Lec#02
 
Lecture#1
Lecture#1Lecture#1
Lecture#1
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Ict lec#9

  • 4. OutLine  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks exemples.  What should I do to be safe online ?  Conclusion 2
  • 5. Introduction:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted andprocessed when banking online.  But with all the good things the Internet offers us, it also opens the door toserious, potentially devastating threats. 3
  • 6.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety Internet Security: What it is 4
  • 7. - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable Internet Security: Why you need it. -Identifies your computer -Where it is located Request Response carries with it unwanted hidden software 5
  • 8. Hackers: Who is a Hacker ? A hacker is an individual who uses computer. The term hacker may refer to anyone with. technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes 6
  • 9. Hackers Hacker Classes : Black Hats BLACK HATS BLACK HATS The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats.[1] They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data. A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. 7
  • 10. Hackers Hacker Classes : Grey Hats Grey Hats Grey Hats A grey hat hacker is someone who may violate ethical standards or principles, but without the malicious intent If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. 8
  • 11. Hackers Hacker Classes : White Hats White Hats White Hats A white hat hacker is a computer security specialist white hat hackers have permission to employ them against the organization that has hired them. who breaks into protected systems and networks to test and asses their security. 9
  • 12. Attacks exemples. Phishing Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. 10
  • 14. What should I do to be safe online ?. 12
  • 15. What should I do to be safe online ?.  To protect your self  Keep you passwords private and create ones too strong that are hard to “crack”  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 13
  • 16. What should I do to be safe online ?.  To protect your self  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name.  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 14
  • 17. What should I do to be safe online ?.  To protect your Computer Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially steal your information 15
  • 18. Conclusion  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the rightsteps to avoid them means you can enjoy the internet safely. 16