SlideShare a Scribd company logo
INTERNET SECURITY
THE IMPORTANCE OF INTERNET SECURITY AND HOW TO SECURE IT
By:
WHAT IS INTERNET SECURITY?
• Involving the security for all data transaction made over the internet.
• Browser security (e.g. Chrome, Firefox) also under internet security.
INTERNET IS NOT A SAFE PLACE
• “Man in the middle attack” by hackers during browsing the internet.
• The spreading of digital virus and malware.
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)
User browsing website like usual.
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)
Hacker gathering information from the user by capturing “network packets” from the data transferred between the user and website.
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)
Hackers can get any private information from the captured data if the data is not encrypted.
HOW TO SECURE YOUR INFORMATION
STEPS TO BE TAKEN TO ENSURE THAT YOUR DATA AND PRIVACY STAY SAFE FROM
UNAUTHORIZED ACCESS
BE SMART WHEN USING INTERNET
• Make your private picture and video can only be view by people you trust
• Install security software or applications in your devices
FOR AN EXAMPLE
Edited picture Original picture
END OF SLIDE

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Debaroy1995
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
Md. Sarowar Alam Saidi
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer security
Abhishek Pansuriya
 
Hacking
HackingHacking
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
kanika sharma
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
Venkasys Technologies Pvt. Ltd.
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
MeeraNairJ
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Network security
Network securityNetwork security
Network security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer security
 
Hacking
HackingHacking
Hacking
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
 
Cyber security[1118]
Cyber security[1118]Cyber security[1118]
Cyber security[1118]
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 

Viewers also liked

Targeting and positioning
Targeting and positioningTargeting and positioning
Targeting and positioning
Sharen Andrews
 
Job description
Job descriptionJob description
Job description
Sharen Andrews
 
This test is made up of 72 question1 (3)
This test is made up of 72 question1 (3)This test is made up of 72 question1 (3)
This test is made up of 72 question1 (3)glorias52
 
Atendimento pré hospitalar
Atendimento pré hospitalarAtendimento pré hospitalar
Atendimento pré hospitalar
Mauricio Cesar Soares
 
สวยงามและความสมดุล
สวยงามและความสมดุลสวยงามและความสมดุล
สวยงามและความสมดุล
ทิดโอ๊ต คนหลุดโลก
 
Eyo theresa presentation
Eyo theresa presentationEyo theresa presentation
Eyo theresa presentation
Balogun Opeyemi
 
Proteção combate incendio
Proteção combate incendioProteção combate incendio
Proteção combate incendio
Mauricio Cesar Soares
 
Segurança do trabalho
Segurança do trabalhoSegurança do trabalho
Segurança do trabalho
Mauricio Cesar Soares
 
Idongesit
IdongesitIdongesit
Idongesit
Balogun Opeyemi
 
Ukpong blessing
Ukpong blessingUkpong blessing
Ukpong blessing
Balogun Opeyemi
 
Nsendino presentation
Nsendino presentationNsendino presentation
Nsendino presentation
Balogun Opeyemi
 
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
Prashant Inamdar
 
Máquinas e equipamentos
Máquinas e equipamentosMáquinas e equipamentos
Máquinas e equipamentos
Mauricio Cesar Soares
 

Viewers also liked (17)

Targeting and positioning
Targeting and positioningTargeting and positioning
Targeting and positioning
 
Job description
Job descriptionJob description
Job description
 
1.2
1.21.2
1.2
 
1.1
1.11.1
1.1
 
This test is made up of 72 question1 (3)
This test is made up of 72 question1 (3)This test is made up of 72 question1 (3)
This test is made up of 72 question1 (3)
 
Atendimento pré hospitalar
Atendimento pré hospitalarAtendimento pré hospitalar
Atendimento pré hospitalar
 
สวยงามและความสมดุล
สวยงามและความสมดุลสวยงามและความสมดุล
สวยงามและความสมดุล
 
Eyo theresa presentation
Eyo theresa presentationEyo theresa presentation
Eyo theresa presentation
 
Proteção combate incendio
Proteção combate incendioProteção combate incendio
Proteção combate incendio
 
Pu3
Pu3Pu3
Pu3
 
Segurança do trabalho
Segurança do trabalhoSegurança do trabalho
Segurança do trabalho
 
Idongesit
IdongesitIdongesit
Idongesit
 
Biodiversity
BiodiversityBiodiversity
Biodiversity
 
Ukpong blessing
Ukpong blessingUkpong blessing
Ukpong blessing
 
Nsendino presentation
Nsendino presentationNsendino presentation
Nsendino presentation
 
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
Pune Metro plan & 4 FSI proposal - Presentation on Issues & Impacts (Sept 201...
 
Máquinas e equipamentos
Máquinas e equipamentosMáquinas e equipamentos
Máquinas e equipamentos
 

Similar to Internet security

cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
priya785691
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
SultanaShaikh7
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
Sandhi Shivanya
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
Gryffin EJ
 
Computer security
Computer securityComputer security
Computer security
abdulrehman1673
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
Om Prakash Mishra
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
Deepak Khari
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
Lohith Haravu Chandrashekar
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
Summerpair77
 
Senior Education
Senior EducationSenior Education
Senior Education
Summerpair77
 

Similar to Internet security (20)

cyber security
cyber security cyber security
cyber security
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Computer security
Computer securityComputer security
Computer security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 

Recently uploaded

一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 

Recently uploaded (20)

一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 

Internet security

  • 1. INTERNET SECURITY THE IMPORTANCE OF INTERNET SECURITY AND HOW TO SECURE IT By:
  • 2. WHAT IS INTERNET SECURITY? • Involving the security for all data transaction made over the internet. • Browser security (e.g. Chrome, Firefox) also under internet security.
  • 3. INTERNET IS NOT A SAFE PLACE • “Man in the middle attack” by hackers during browsing the internet. • The spreading of digital virus and malware.
  • 4. MAN IN THE MIDDLE ATTACK (DEMONSTRATION) User browsing website like usual.
  • 5. MAN IN THE MIDDLE ATTACK (DEMONSTRATION) Hacker gathering information from the user by capturing “network packets” from the data transferred between the user and website.
  • 6. MAN IN THE MIDDLE ATTACK (DEMONSTRATION) Hackers can get any private information from the captured data if the data is not encrypted.
  • 7. HOW TO SECURE YOUR INFORMATION STEPS TO BE TAKEN TO ENSURE THAT YOUR DATA AND PRIVACY STAY SAFE FROM UNAUTHORIZED ACCESS
  • 8. BE SMART WHEN USING INTERNET • Make your private picture and video can only be view by people you trust • Install security software or applications in your devices
  • 9. FOR AN EXAMPLE Edited picture Original picture