SlideShare a Scribd company logo
Cyber Safety
Keeping Our Computers Safe
Overview
Computer Protection
 Key Terms:
 Firewall – Blocks outside access to a computer
 Antivirus – Prevents most destructive programs (viruses) from accessing a computer
 Cookies – Stores and transmits information
to parent websites
 Passwords – Allows access to online accounts
Working Of A Fire Wall
Computer Protection
 Online:
 Connected to the Internet
 Disconnect when not in use
 Firewall:
 Limits the information sent to and from your computer
 Barrier from the internet
 Examples of firewall programs:
• Zonealarm
• Comodo
• Norton
Computer Protection
 Antivirus Protection:
 Prevents viruses from effecting your computer
 Can only prevent what it recognizes
 Examples of antivirus programs:
• McAfee
• Norton
• AVG Anti-virus
Computer Protection
 Cookies
 Allow companies to store information on your machine
 Collect information on your use
 Set computer to accept different level of cookies I’ve been to
this site!
Computer Protection
 Keep Your Password Safe!
 Passwords are key to your personal information.
 Increase password security by using:
• Capital letters, lowercase letters,
symbols, and numbers
• Abbreviations not whole words
Example: s0uth*ern ILL-in0is
Change your password frequently
Identity Theft
 Key Terms:
 Email – Messages sent
via the internet
 Websites - Locations on
the Internet
Identity Theft
Scamming: Tricking or
deceiving a person
or group of people to
obtain information
 Phishing Email -
 A common avenue for virtual scam artist. False
email can appear obvious or subtle.
 Phishing Website -
 Another common venue for virtual scam artist.
Attempt to gather personal information
What are the world of
warcraft scammers looking
for ???
Email Scam: Clear
Example
Email Scam: Subtle
Example
Southern Illinois Bank
Email
 Follow these guidelines
when using email:
 Sent messages are
uncontrollable.
 Do not open emails
from email addresses
you do not recognize!
 Treat online situations
the same way you would
personal situations.
Identity Theft: Websites
 Check out the legitimacy of a
website
 Key icons and web addresses
 Well-known site
 Check for misspellings
 Do not give out personal
information
 Set information to private if possible
 If you are unsure just remember
to:
Stop… Look… Call!
Communicating Online

Information you may want to consider before
sharing with others online:
Spending And Saving Online

Consider the following before buying anything online:

Do you know the store from the brick mortar world?

What is the site’s reputation?

Is the website secure?

Is the offer too good to be true?

Does the merchant collect more information than is needed to
complete the sale?

Use a payment service or credit card for payment.

Review the company's shipping method.
Spending and Saving Online

Protect yourself when banking or paying bills online:
Computing On The Go

Using public computers safely

Using mobile phones
Bullying On Line

What to do if you are “cyber-bullied.”

Safety tips to avoid or deal with online bullying.

Keep personal information private.

Use technology tools to block inappropriate or threatening behavior.

Do not answer phone calls or read messages, e-mails or comments
from “cyber-bullies.” Set them aside in case they are needed by
authorities for evidence.
When Being bullied.....
Buying Prescriptions On Line

Know your source to make sure it’s safe

Make sure a website is a state-licensed pharmacy located in the
United States.

Find a list at http://www.nabp.net and http://www.vipps.info.

Look for websites with practices that protect you.

Be sure your privacy is protected.

If you are suspicious or have complaints about a service or
transaction, report the website!
Electronic Medical Records

The advantages of Electronic Medical Records

Recommended online storage services for
Electronic Medical Records.
Socializing Online

Blogging

Social Networking

Chat discussion boards and forums

Online quizzes and surveys
Sharing Photos, Images & Video

Sharing Photos Safely

Image copyright infringement

Sharing videos online

Using webcams
Defensive Computing

Browsing and searching

Ads on search engines and sponsored search results.

Identifying secure/trusted websites

Understand the risks in sharing information.

Browser settings and filtering software.
Safe Practices
 Remember these helpful tips when using a computer for
“web surfing” or online transactions:
 Treat your computer
like your home.
 Never give out
personal information!
 Talk to your kids about
Internet safety.
 If it sounds too good
to be true… it usually is!
The First Question
When I’m on line I should never give out:
A. My last name
B. The names of my pets
C. The names of my favorite book or TV shows
Answer 1
 Option A - My last name
Question 2
 Before I buy something online or access a site
requiring payment I should:
A. First make sure I really want it
B. Check with my parents
C. Check out store prices first.
Answer 2
 Option B - Check with my parents
Question 3
 You are in a very high post in a company. You have to
complete a project with your Senior. As you are going
on a vacation your senior asks your Email ID and
Password so that he can access files. It is an
important work. Should you give it ??
A. Give your password as it is important
B. Do not give your password as you do not care about
the work.
C. Do not give him and request your boss for some
more time
Answer 3
 Option C - Do not give him and request your
boss for some more time
Question 4
 If someone I meet online gives me his phone
number I should:
A. Call him as he is your friend and has given his
number too
B. Give him your number and request him to call
after sometime
C. Ask your Parents and check the number
Answer 4
 Option C - Ask your Parents and check the
number
Question 5
 What is Netiquette?
A. Treat others as badly as they treat you.
B. Be polite online and others will do the same
C. Call people names when they do something
you don't like.
D. Repeat messages over an over so others
don't get a chance to talk.
E. No Answer
Answer 5
 Option B - Be polite online and others will do
the same
Question 6
 Which is these is a good way to keep from being
bullied?
A.Delete messages from people you don't know, or from
those people who seem angry or mean.
B.When something doesn't seem right, stay in the site,
chat anyway and give out personal information.
C.Post all your school pictures online along with your
address, email, and phone number.
D.Send messages when you are angry and haven't had
time to think about the situation.
Answer 6
 Option A - Delete messages from people you don't
know, or from those people who seem angry or mean.
Question 7
As I travel through "Cyberspace," I should
never..
A.Take a break and have a snack.
B.Use the Internet to help me with my
homework.
C.Agree to meet someone in person who I have
met online.
Answer 7
 Option C - Agree to meet someone in person
who I have met online.
Question 8
 If someone I meet online asks me to keep a
secret from my parents I should....
A.Keep the secret because they are my "cyber
friend."
B.Tell all of my friends, because it's hard for me
to keep a secret.
C.Tell my parents, because no one should ever
ask me to keep secrets from my parents.
Answer 8
 Option C - Tell my parents, because no one
should ever ask me to keep secrets from my
parents.
Question 9
 Which of these is NOT a good way to keep from
being bullied?
A.Get back at the bullies by doing the same things they
did to you.
B.Don't give out private information .
C.Don't exchange pictures or give out email addresses to
people you meet on the Internet.
D.Don't send a message when you are angry.
Answer 9
 Option A - Get back at the bullies by doing the
same things they did to you.
Question 10
 Someone is on my E-mail "buddy list," "friend
list," or "contact list" and I only know that
person online, he or she is
A. My friend and someone I can trust
B. The Person he or she claims to be
C. Someone I should be cautious about,
because I don't know him or her well.
Answer 10
 Option C - Someone I should be cautious
about, because I don't know him or her well.
Internet safety

More Related Content

What's hot

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 

What's hot (20)

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Similar to Internet safety

online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
guestde489f
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
Samir Deutsch
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
Antglynn
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Gamecynthia.warner
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 

Similar to Internet safety (20)

online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
10things
10things10things
10things
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

More from bhavya mohindru

India - My Motherland, My Country
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Country
bhavya mohindru
 
William Shakespeare - To be or not to be
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to be
bhavya mohindru
 
Global warming - Let's save our Earth
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earth
bhavya mohindru
 
Air Around Us Edited
Air Around Us EditedAir Around Us Edited
Air Around Us Edited
bhavya mohindru
 
Fun With Magnets
Fun With MagnetsFun With Magnets
Fun With Magnets
bhavya mohindru
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cloud computing
Cloud computingCloud computing
Cloud computing
bhavya mohindru
 
Air Around Us
Air Around UsAir Around Us
Air Around Us
bhavya mohindru
 
Earthquakes - It's Causes And Effects
Earthquakes - It's Causes And EffectsEarthquakes - It's Causes And Effects
Earthquakes - It's Causes And Effects
bhavya mohindru
 
Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru
bhavya mohindru
 
Lamborghini
Lamborghini Lamborghini
Lamborghini
bhavya mohindru
 
Lamborghini 10 best cars
Lamborghini 10 best carsLamborghini 10 best cars
Lamborghini 10 best cars
bhavya mohindru
 

More from bhavya mohindru (12)

India - My Motherland, My Country
India - My Motherland, My CountryIndia - My Motherland, My Country
India - My Motherland, My Country
 
William Shakespeare - To be or not to be
William Shakespeare - To be or not to beWilliam Shakespeare - To be or not to be
William Shakespeare - To be or not to be
 
Global warming - Let's save our Earth
Global warming - Let's save our EarthGlobal warming - Let's save our Earth
Global warming - Let's save our Earth
 
Air Around Us Edited
Air Around Us EditedAir Around Us Edited
Air Around Us Edited
 
Fun With Magnets
Fun With MagnetsFun With Magnets
Fun With Magnets
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Air Around Us
Air Around UsAir Around Us
Air Around Us
 
Earthquakes - It's Causes And Effects
Earthquakes - It's Causes And EffectsEarthquakes - It's Causes And Effects
Earthquakes - It's Causes And Effects
 
Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru Health and hygiene with Bhavya Mohindru
Health and hygiene with Bhavya Mohindru
 
Lamborghini
Lamborghini Lamborghini
Lamborghini
 
Lamborghini 10 best cars
Lamborghini 10 best carsLamborghini 10 best cars
Lamborghini 10 best cars
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 

Internet safety

  • 1. Cyber Safety Keeping Our Computers Safe
  • 3. Computer Protection  Key Terms:  Firewall – Blocks outside access to a computer  Antivirus – Prevents most destructive programs (viruses) from accessing a computer  Cookies – Stores and transmits information to parent websites  Passwords – Allows access to online accounts
  • 4. Working Of A Fire Wall
  • 5. Computer Protection  Online:  Connected to the Internet  Disconnect when not in use  Firewall:  Limits the information sent to and from your computer  Barrier from the internet  Examples of firewall programs: • Zonealarm • Comodo • Norton
  • 6. Computer Protection  Antivirus Protection:  Prevents viruses from effecting your computer  Can only prevent what it recognizes  Examples of antivirus programs: • McAfee • Norton • AVG Anti-virus
  • 7. Computer Protection  Cookies  Allow companies to store information on your machine  Collect information on your use  Set computer to accept different level of cookies I’ve been to this site!
  • 8. Computer Protection  Keep Your Password Safe!  Passwords are key to your personal information.  Increase password security by using: • Capital letters, lowercase letters, symbols, and numbers • Abbreviations not whole words Example: s0uth*ern ILL-in0is Change your password frequently
  • 9. Identity Theft  Key Terms:  Email – Messages sent via the internet  Websites - Locations on the Internet
  • 10. Identity Theft Scamming: Tricking or deceiving a person or group of people to obtain information  Phishing Email -  A common avenue for virtual scam artist. False email can appear obvious or subtle.  Phishing Website -  Another common venue for virtual scam artist. Attempt to gather personal information
  • 11. What are the world of warcraft scammers looking for ???
  • 15. Email  Follow these guidelines when using email:  Sent messages are uncontrollable.  Do not open emails from email addresses you do not recognize!  Treat online situations the same way you would personal situations.
  • 16. Identity Theft: Websites  Check out the legitimacy of a website  Key icons and web addresses  Well-known site  Check for misspellings  Do not give out personal information  Set information to private if possible  If you are unsure just remember to: Stop… Look… Call!
  • 17. Communicating Online  Information you may want to consider before sharing with others online:
  • 18. Spending And Saving Online  Consider the following before buying anything online:  Do you know the store from the brick mortar world?  What is the site’s reputation?  Is the website secure?  Is the offer too good to be true?  Does the merchant collect more information than is needed to complete the sale?  Use a payment service or credit card for payment.  Review the company's shipping method.
  • 19. Spending and Saving Online  Protect yourself when banking or paying bills online:
  • 20. Computing On The Go  Using public computers safely  Using mobile phones
  • 21. Bullying On Line  What to do if you are “cyber-bullied.”  Safety tips to avoid or deal with online bullying.  Keep personal information private.  Use technology tools to block inappropriate or threatening behavior.  Do not answer phone calls or read messages, e-mails or comments from “cyber-bullies.” Set them aside in case they are needed by authorities for evidence.
  • 23. Buying Prescriptions On Line  Know your source to make sure it’s safe  Make sure a website is a state-licensed pharmacy located in the United States.  Find a list at http://www.nabp.net and http://www.vipps.info.  Look for websites with practices that protect you.  Be sure your privacy is protected.  If you are suspicious or have complaints about a service or transaction, report the website!
  • 24. Electronic Medical Records  The advantages of Electronic Medical Records  Recommended online storage services for Electronic Medical Records.
  • 25. Socializing Online  Blogging  Social Networking  Chat discussion boards and forums  Online quizzes and surveys
  • 26. Sharing Photos, Images & Video  Sharing Photos Safely  Image copyright infringement  Sharing videos online  Using webcams
  • 27. Defensive Computing  Browsing and searching  Ads on search engines and sponsored search results.  Identifying secure/trusted websites  Understand the risks in sharing information.  Browser settings and filtering software.
  • 28. Safe Practices  Remember these helpful tips when using a computer for “web surfing” or online transactions:  Treat your computer like your home.  Never give out personal information!  Talk to your kids about Internet safety.  If it sounds too good to be true… it usually is!
  • 29.
  • 30. The First Question When I’m on line I should never give out: A. My last name B. The names of my pets C. The names of my favorite book or TV shows
  • 31. Answer 1  Option A - My last name
  • 32. Question 2  Before I buy something online or access a site requiring payment I should: A. First make sure I really want it B. Check with my parents C. Check out store prices first.
  • 33. Answer 2  Option B - Check with my parents
  • 34. Question 3  You are in a very high post in a company. You have to complete a project with your Senior. As you are going on a vacation your senior asks your Email ID and Password so that he can access files. It is an important work. Should you give it ?? A. Give your password as it is important B. Do not give your password as you do not care about the work. C. Do not give him and request your boss for some more time
  • 35. Answer 3  Option C - Do not give him and request your boss for some more time
  • 36. Question 4  If someone I meet online gives me his phone number I should: A. Call him as he is your friend and has given his number too B. Give him your number and request him to call after sometime C. Ask your Parents and check the number
  • 37. Answer 4  Option C - Ask your Parents and check the number
  • 38. Question 5  What is Netiquette? A. Treat others as badly as they treat you. B. Be polite online and others will do the same C. Call people names when they do something you don't like. D. Repeat messages over an over so others don't get a chance to talk. E. No Answer
  • 39. Answer 5  Option B - Be polite online and others will do the same
  • 40. Question 6  Which is these is a good way to keep from being bullied? A.Delete messages from people you don't know, or from those people who seem angry or mean. B.When something doesn't seem right, stay in the site, chat anyway and give out personal information. C.Post all your school pictures online along with your address, email, and phone number. D.Send messages when you are angry and haven't had time to think about the situation.
  • 41. Answer 6  Option A - Delete messages from people you don't know, or from those people who seem angry or mean.
  • 42. Question 7 As I travel through "Cyberspace," I should never.. A.Take a break and have a snack. B.Use the Internet to help me with my homework. C.Agree to meet someone in person who I have met online.
  • 43. Answer 7  Option C - Agree to meet someone in person who I have met online.
  • 44. Question 8  If someone I meet online asks me to keep a secret from my parents I should.... A.Keep the secret because they are my "cyber friend." B.Tell all of my friends, because it's hard for me to keep a secret. C.Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 45. Answer 8  Option C - Tell my parents, because no one should ever ask me to keep secrets from my parents.
  • 46. Question 9  Which of these is NOT a good way to keep from being bullied? A.Get back at the bullies by doing the same things they did to you. B.Don't give out private information . C.Don't exchange pictures or give out email addresses to people you meet on the Internet. D.Don't send a message when you are angry.
  • 47. Answer 9  Option A - Get back at the bullies by doing the same things they did to you.
  • 48. Question 10  Someone is on my E-mail "buddy list," "friend list," or "contact list" and I only know that person online, he or she is A. My friend and someone I can trust B. The Person he or she claims to be C. Someone I should be cautious about, because I don't know him or her well.
  • 49. Answer 10  Option C - Someone I should be cautious about, because I don't know him or her well.