SlideShare a Scribd company logo
• The internet is
forever
• Do not post personal
information
• Smartphone safety
• Hacking advices
• If you post anything on
the internet even your
grandchilds will be able
to search for it.
• Everything that is on the
internet will last forever!
• You must be careful and
decide what you want to
upload using your head.
• Do not post personal
information such as
phone numbers or
email addresses on
the internet.
• This leaves you
unprotected against
cyber bullies.
• Do not accept
phonecalls from
unknown people.
• Either messages!
• No matter how safety
is something, there
still are chances to be
hacked.
• Once you’ve been
hacked, there are
some advices you can
follow to escape from
the hack.
• This one must be
more secure than
the hacked one.
• There are some
websites that can
determinate the
strenght level of
your password.
• Go and check if you
are able to use this.
• This consists of a
secondary question
which you can
increase your
security with.
• Go and check your
email to know if you
have some spam or
phishing links.
• You must download
an antivirus if this
happens.
• If you are having a virus
inside your computer, go
and make a backing to
your files.
• Perhaps you can lose
them.
• Keep them into an
external hard drive to
not lose them!
• With the latest
patches, and use a
less-targeted
browser such as
Chrome or Firefox.
• If your login
credentials are ever
grabbed by a hacker,
the attacker will
have inadvertently
gained access to
your entire digital
world.
• We live in a digital
age in which we can
download just about
anything we want to
watch, listen to or
use… and have
access to it almost
immediately.
• Internet is not a
world of care bears!
You received a gift,
an invitation, found
a USB stick or are
asked to perform a
specific action to
your computer.

More Related Content

What's hot

Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
Ilm Gah Foundation
 
Spam, security
Spam, securitySpam, security
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
Pratimesh Pathak
 
Browser Security
Browser SecurityBrowser Security
Browser Security
Roberto Suggi Liverani
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
ssuser98b1f71
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Internet Security
Internet SecurityInternet Security
Internet Security
Mitesh Gupta
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
The internet and www 2
The internet and www 2The internet and www 2
The internet and www 2
Iddrisu Issah
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
Sanjiv Arora
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Botnets
BotnetsBotnets
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 

What's hot (20)

Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Spam, security
Spam, securitySpam, security
Spam, security
 
Internet working
Internet workingInternet working
Internet working
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
The internet and www 2
The internet and www 2The internet and www 2
The internet and www 2
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Botnets
BotnetsBotnets
Botnets
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network security
Network securityNetwork security
Network security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 

Viewers also liked

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
 
Internet safety
Internet safetyInternet safety
Internet safety
Sofia Cennini Zezere
 
Internet more secure (1)
Internet more secure (1)Internet more secure (1)
Internet more secure (1)
mario ansotegui
 
Security tips
Security tipsSecurity tips
Security tips
Alba Gómez Arozamena
 
Security tips
Security tipsSecurity tips
Security tips
Diana López Pérez
 
Processos de separação de misturas
Processos de separação de misturasProcessos de separação de misturas
Processos de separação de misturas
Hugo Cruz Rangel
 
Approaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccinesApproaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccines
shikha singh
 
Internet safety
Internet safetyInternet safety
Internet safety
Andrea Alvarez Mendoza
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Óscar Ortiz Belén
 
Tic(1)
Tic(1)Tic(1)
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Pedro Castro
 
How to improve performance
How to improve performanceHow to improve performance
How to improve performance
Atsuko Fukui
 
3Com 3C13889A
3Com 3C13889A3Com 3C13889A
3Com 3C13889A
savomir
 
274
274274
Factors affected 20th century novel
Factors affected  20th century novelFactors affected  20th century novel
Factors affected 20th century novel
ٍسارة أحمد
 
Presentacion plan de empresa
Presentacion plan de empresaPresentacion plan de empresa
Presentacion plan de empresa
Santi Arjona
 
Casuísticas planificación curricular aguaytía
Casuísticas planificación curricular  aguaytíaCasuísticas planificación curricular  aguaytía
Casuísticas planificación curricular aguaytía
LUIS RIVAS PACHERREZ
 
Preshow
PreshowPreshow

Viewers also liked (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet more secure (1)
Internet more secure (1)Internet more secure (1)
Internet more secure (1)
 
Security tips
Security tipsSecurity tips
Security tips
 
Security tips
Security tipsSecurity tips
Security tips
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Processos de separação de misturas
Processos de separação de misturasProcessos de separação de misturas
Processos de separação de misturas
 
Approaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccinesApproaches for delivery of protein, peptides & vaccines
Approaches for delivery of protein, peptides & vaccines
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Tic(1)
Tic(1)Tic(1)
Tic(1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to improve performance
How to improve performanceHow to improve performance
How to improve performance
 
3Com 3C13889A
3Com 3C13889A3Com 3C13889A
3Com 3C13889A
 
274
274274
274
 
Factors affected 20th century novel
Factors affected  20th century novelFactors affected  20th century novel
Factors affected 20th century novel
 
Presentacion plan de empresa
Presentacion plan de empresaPresentacion plan de empresa
Presentacion plan de empresa
 
Casuísticas planificación curricular aguaytía
Casuísticas planificación curricular  aguaytíaCasuísticas planificación curricular  aguaytía
Casuísticas planificación curricular aguaytía
 
Preshow
PreshowPreshow
Preshow
 

Similar to Internet security

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
saththiyans1
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
Andrew Schwabe
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
Imtiaz Khan - netbrix.net [LION]
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
AlvinDawod1
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
VipanAulakh2
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
chimwemweshaba1
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
SiddharthD8
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
robert83603
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
ahad55
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
oneill74
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
Amit Pal Singh
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 

Similar to Internet security (20)

Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

Internet security

  • 1.
  • 2. • The internet is forever • Do not post personal information • Smartphone safety • Hacking advices
  • 3. • If you post anything on the internet even your grandchilds will be able to search for it. • Everything that is on the internet will last forever! • You must be careful and decide what you want to upload using your head.
  • 4. • Do not post personal information such as phone numbers or email addresses on the internet. • This leaves you unprotected against cyber bullies.
  • 5. • Do not accept phonecalls from unknown people. • Either messages!
  • 6. • No matter how safety is something, there still are chances to be hacked. • Once you’ve been hacked, there are some advices you can follow to escape from the hack.
  • 7. • This one must be more secure than the hacked one. • There are some websites that can determinate the strenght level of your password.
  • 8. • Go and check if you are able to use this. • This consists of a secondary question which you can increase your security with.
  • 9. • Go and check your email to know if you have some spam or phishing links. • You must download an antivirus if this happens.
  • 10. • If you are having a virus inside your computer, go and make a backing to your files. • Perhaps you can lose them. • Keep them into an external hard drive to not lose them!
  • 11.
  • 12. • With the latest patches, and use a less-targeted browser such as Chrome or Firefox.
  • 13. • If your login credentials are ever grabbed by a hacker, the attacker will have inadvertently gained access to your entire digital world.
  • 14. • We live in a digital age in which we can download just about anything we want to watch, listen to or use… and have access to it almost immediately.
  • 15. • Internet is not a world of care bears! You received a gift, an invitation, found a USB stick or are asked to perform a specific action to your computer.