SlideShare a Scribd company logo
Internet Safety
Internet safety, online safety or
cyber safety means trying to be safe
on the internet. It is maximizing the
user’s personal safety and security
risks to private information and
property associated with using the
internet, including self-protection
from computer crime.
Information Security
Sensitive information, such as
personal information, identity and
passwords are often associated with
personal property and privacy and
may be present security concerns if
leaked. Unauthorized access and
usage of private information may
result in consequences such as
identity and property theft.
Common causes of security breaches:
 PHISHING-Scammers disguise as a trustworthy source
in an attempt to obtain private information, such as
passwords, credit card information, etc. through the use
of fake websites that look identical and legitimate.
 INTERNET SCAMS- These are schemes that deceive the
users in various ways in an attempt to take advantage
of them.
 Malware-It is a malicious malware disguised to collect
and transmit private information, such as password
without the user’s consent or knowledge.
Personal safety and threats
A threat, in the context of computer security, refers
to anything that has the potential to cause serious
harm to a computer system .
Cybercrime is now becoming alarming in the life of
every individual and the organization as they intend to
steal information that they can sell or trade such as
financial details, credit card information, personal
details or any other information using computer
networks.
Ways on how to ensure that computer
networks can be protected:
 Install anti-virus software
 Ensure that the anti-virus software is up-to-date
 Employ a firewall to protect networks
 Filter all email traffic
 Educate all users to be careful of suspicious e-mails
 Scan internet downloads
 Do not run programs of unknown origin
Ways on how to ensure that computer
networks can be protected:
 Implement a vulnerability management system
 Make regular backups of critical data
 Develop an information security policy
 Monitor logs and systems
 Develop an incident response plan
 Restrict end-user access to the system
CYBERBULLYING
Cyberbullying, cyber harassment or
online bullying is a form of bullying or
harassment using electronic means
usually among minors in a school
setting and has become increasingly
common especially among teenagers.
TYPES OF CYBERBULLYING:
1. INTERNET TROLLING- is a common forms of
bullying over the internet in an online community
to elicit a reaction, disruption of intentionally
provokes and offend others.
2. CYBERSTALKING- is another form of bullying or
harassment that uses electronic communication to
stalk a victim and post a credible threat to harass
him/her.
Implications of bullying in schools
Schools should initiate various anti-bullying
programs and campaigns to protect students from
being threatened or victimized by such offense. More
so, teachers should be oriented and trained in
handling bullying cases and executing teaching
strategies to address and reduce bullying cases in
class. Also schools should conduct students
empowerment activities that can be engaged by the
students, including bullies to divert their attention and
energy into something worthwhile and engagement
that they can be busy about.
CYBERCRIME
Avast defines cybercrime as
any criminal activity carried
out using computers or the
internet. Cybercrime uses tools
like phishing, viruses, spyware,
ransomware and social
engineering to break the law.

More Related Content

Similar to Internet-Safety-1.pptx

Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
cyberprosocial
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety Tips
Cyber Security Experts
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
cyberprosocial
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
yusifagalar
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 

Similar to Internet-Safety-1.pptx (20)

Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety Tips
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 

More from AnnaRicaSicang

Contemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applicationsContemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applications
AnnaRicaSicang
 
CRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and fourCRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and four
AnnaRicaSicang
 
6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt
AnnaRicaSicang
 
Learners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptxLearners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptx
AnnaRicaSicang
 
volcanoes.pptx
volcanoes.pptxvolcanoes.pptx
volcanoes.pptx
AnnaRicaSicang
 
local_media7091492881283460429.pptx
local_media7091492881283460429.pptxlocal_media7091492881283460429.pptx
local_media7091492881283460429.pptx
AnnaRicaSicang
 
ma'am Lademora report.pdf
ma'am Lademora report.pdfma'am Lademora report.pdf
ma'am Lademora report.pdf
AnnaRicaSicang
 
teachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdfteachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdf
AnnaRicaSicang
 
K-12.pptx
K-12.pptxK-12.pptx
K-12.pptx
AnnaRicaSicang
 
unit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdfunit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdf
AnnaRicaSicang
 
524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf
AnnaRicaSicang
 

More from AnnaRicaSicang (11)

Contemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applicationsContemporary business mathematics with canadian applications
Contemporary business mathematics with canadian applications
 
CRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and fourCRIMINAL PROCEDURE criminology three and four
CRIMINAL PROCEDURE criminology three and four
 
6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt6.-Parts-of-Volcanoes.ppt
6.-Parts-of-Volcanoes.ppt
 
Learners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptxLearners-who-are-gifted-and-talented.pptx
Learners-who-are-gifted-and-talented.pptx
 
volcanoes.pptx
volcanoes.pptxvolcanoes.pptx
volcanoes.pptx
 
local_media7091492881283460429.pptx
local_media7091492881283460429.pptxlocal_media7091492881283460429.pptx
local_media7091492881283460429.pptx
 
ma'am Lademora report.pdf
ma'am Lademora report.pdfma'am Lademora report.pdf
ma'am Lademora report.pdf
 
teachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdfteachingtechnologyppt-copy-170425054225.pdf
teachingtechnologyppt-copy-170425054225.pdf
 
K-12.pptx
K-12.pptxK-12.pptx
K-12.pptx
 
unit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdfunit_4_questioned_doc_part_1_16.pdf
unit_4_questioned_doc_part_1_16.pdf
 
524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf524003652-BENLAC-Chapter-1-New (1).pdf
524003652-BENLAC-Chapter-1-New (1).pdf
 

Recently uploaded

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

Internet-Safety-1.pptx

  • 1. Internet Safety Internet safety, online safety or cyber safety means trying to be safe on the internet. It is maximizing the user’s personal safety and security risks to private information and property associated with using the internet, including self-protection from computer crime.
  • 2. Information Security Sensitive information, such as personal information, identity and passwords are often associated with personal property and privacy and may be present security concerns if leaked. Unauthorized access and usage of private information may result in consequences such as identity and property theft.
  • 3. Common causes of security breaches:  PHISHING-Scammers disguise as a trustworthy source in an attempt to obtain private information, such as passwords, credit card information, etc. through the use of fake websites that look identical and legitimate.  INTERNET SCAMS- These are schemes that deceive the users in various ways in an attempt to take advantage of them.  Malware-It is a malicious malware disguised to collect and transmit private information, such as password without the user’s consent or knowledge.
  • 4. Personal safety and threats A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system . Cybercrime is now becoming alarming in the life of every individual and the organization as they intend to steal information that they can sell or trade such as financial details, credit card information, personal details or any other information using computer networks.
  • 5. Ways on how to ensure that computer networks can be protected:  Install anti-virus software  Ensure that the anti-virus software is up-to-date  Employ a firewall to protect networks  Filter all email traffic  Educate all users to be careful of suspicious e-mails  Scan internet downloads  Do not run programs of unknown origin
  • 6. Ways on how to ensure that computer networks can be protected:  Implement a vulnerability management system  Make regular backups of critical data  Develop an information security policy  Monitor logs and systems  Develop an incident response plan  Restrict end-user access to the system
  • 7. CYBERBULLYING Cyberbullying, cyber harassment or online bullying is a form of bullying or harassment using electronic means usually among minors in a school setting and has become increasingly common especially among teenagers.
  • 8. TYPES OF CYBERBULLYING: 1. INTERNET TROLLING- is a common forms of bullying over the internet in an online community to elicit a reaction, disruption of intentionally provokes and offend others. 2. CYBERSTALKING- is another form of bullying or harassment that uses electronic communication to stalk a victim and post a credible threat to harass him/her.
  • 9. Implications of bullying in schools Schools should initiate various anti-bullying programs and campaigns to protect students from being threatened or victimized by such offense. More so, teachers should be oriented and trained in handling bullying cases and executing teaching strategies to address and reduce bullying cases in class. Also schools should conduct students empowerment activities that can be engaged by the students, including bullies to divert their attention and energy into something worthwhile and engagement that they can be busy about.
  • 10. CYBERCRIME Avast defines cybercrime as any criminal activity carried out using computers or the internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and social engineering to break the law.