SlideShare a Scribd company logo
1 of 5
Download to read offline
Internet  safety & privacy  is an important thing to think about  because 
it can be very risky and can breached here are things to think about  

THERE ARE MANY RISKS TO USER SAFETY WHICH INCLUDES:


Abusive behaviour  > Doing profanity  or harmful  things to others. 



Cyber bullying > Being rude and showing offensive/harmful content  



Inappropriate behaviour >   Wri ng  things that make other people feel uncomfortable   



Grooming >  IS where   

 
THESE CAN APPEAR IN A VARIETY OF WAYS WHICH INCLUDES:


Chat rooms > 



Text messages  > 



E‐mail  >  Where  



Social networking sites > Where people and businesses   make a page to 
promote to the public what they do 



Instant messaging > 

 
THE RISKS TO PRIVACY INCLUDES:


Phishing > 



Spyware> 



Cookies, local shared objects (flash cookies), > 



Misuse of personal images > 



Misuse of personal communica ons > 



Iden ty the  > 
When using a computer there are many things that can cause security risks 
here are things that can cause data security risks. 
 
Malware which Includes: 


Viruses >  A  program which is designed to spread to a computer 
and a virus  checker must be updated everyday due to new 
viruses being made 



Worm > It’s a self replica ng program  which can run by itself 



Trojan horses > Can  perform one task but can actually  perform 
another  

 
Accidental damage or dele on  which includes: 


Human error > which is caused by  humans  installing the wrong 
so ware or  turning  off  



Hardware malfunc on or failure > Is when a computer gets  damaged 
by the computer ge ng turned off incorrectly   or a when a component 
such the graphic card burns out caused by dust build up or by over 
hea ng or a computer not cleaned out  

 
Deliberate damage or dele on which includes: 
 


The  of hardware 



Disgruntled  staff 
When on the internet how can you tell the informa on you read is right   
what you should think about is. 
Indicators of reliability which includes: 


The author who wrote the informa on  > People might copy the informa on  
and classify it as their own which will result in copyright infringement  or 
lawsuits  



Entertainment  > People write down  things to make people laugh for example 
Jeremy  Clarkson from Top Gear writes things on twi er which results in  
humour 



Sharing personal experience > People  describe what they have done which  
are facts  



Educa on >  If  they promote schools/college they use accurate informa on 
and not to confuse the public  with false informa on 
 
Authority of author which includes: 


Check with Other reliable sites  > where you compare websites 
together  e.g. BBC with  Wikipedia to see if it’s accurate  



Qualifica ons > The way they write the informa on out  if it’s formal 
or informal or the grammar or know what they are talking about   



A recognised name > If it’s a name that’s been  seen before   on more 
then one informa on  

 
Date which includes: 


Recent for current informa on 



A relevant date for  historical informa on 

 
Appropriate  keywords which includes: 


A website that uses keywords to describe  the topic  it’s talking 
about 



If they have  specific  keywords 
When using the internet  there are many  things that can cause risks to your computer  there are many 
ways to minimise it   


An –Malware >  Is a so ware e.g. AVG 
An virus & Spysweeper to name a few can 
prevent, detect and clean up your computer 
from malware 



System methods > Encryp on is  when code 
get scrambled around so no one can access it 
then  a key will put it back together. A 
firewall stops people ge ng into your 
computer from another computer and it 
stops your informa on ge ng out of your 
computer. 



 
 
 
 

 

Avoiding risky web sites > There are many 
things on websites that are risky. Blacklists 
are ways of blocking certain websites. 
Content advisors such as parental  control  
are so ware that can allow  view certain 
content and block appropriate  content  

 
 
 
 
 
 
 
 
 
 
When using your computer you must make sure that when you install and go on different so ware  that it doesn’t 
effect the  performance  and integrity of your PC. 
 




Adware >  Are adver sements  that 
pop up to persuade you to buy  a 
product that a company has made. 



 

Malware > Malicious so ware that’s 
designed to damage computer 
so ware and they are viruses, worm 
and a Trojan horse. 

Internet based a acks > When a WiFi  is open any one can get into the 
Wi-Fi  when hackers uses it  and  
download anything they want. When 
a Bluetooth point is ac vated   there 
can be many risks  

More Related Content

What's hot

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
geneveve_
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

What's hot (19)

Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 

Viewers also liked

How to make pancakes
How to make pancakesHow to make pancakes
How to make pancakes
Brooke Comer
 
OPTiiM Company Brief 20-04-2016nf
OPTiiM Company Brief 20-04-2016nfOPTiiM Company Brief 20-04-2016nf
OPTiiM Company Brief 20-04-2016nf
Daniel Lorer
 

Viewers also liked (14)

Objects seen in the sky
Objects seen in the skyObjects seen in the sky
Objects seen in the sky
 
How to make pancakes
How to make pancakesHow to make pancakes
How to make pancakes
 
Worcester Cathedral News Spring 2014
Worcester Cathedral News Spring 2014Worcester Cathedral News Spring 2014
Worcester Cathedral News Spring 2014
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
OPTiiM Company Brief 20-04-2016nf
OPTiiM Company Brief 20-04-2016nfOPTiiM Company Brief 20-04-2016nf
OPTiiM Company Brief 20-04-2016nf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Distributed system - Student book
Distributed system - Student bookDistributed system - Student book
Distributed system - Student book
 
Muzy_project
Muzy_projectMuzy_project
Muzy_project
 
See Beyond Yourself Magazine Media Kit 2014
See Beyond Yourself Magazine Media Kit 2014See Beyond Yourself Magazine Media Kit 2014
See Beyond Yourself Magazine Media Kit 2014
 
Pandiwa
PandiwaPandiwa
Pandiwa
 
Simple Present Tense IPP-Lesson PLan
Simple Present Tense IPP-Lesson PLanSimple Present Tense IPP-Lesson PLan
Simple Present Tense IPP-Lesson PLan
 
Trio Digital Agency Company Profile 2014
Trio Digital Agency Company Profile 2014Trio Digital Agency Company Profile 2014
Trio Digital Agency Company Profile 2014
 
Mga tungkulin ng mamamayang pilipino
Mga tungkulin ng mamamayang pilipinoMga tungkulin ng mamamayang pilipino
Mga tungkulin ng mamamayang pilipino
 

Similar to Internet safety

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 

Similar to Internet safety (20)

cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Internet-Safety-1.pptx
Internet-Safety-1.pptxInternet-Safety-1.pptx
Internet-Safety-1.pptx
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

Recently uploaded

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Internet safety