SlideShare a Scribd company logo
1 of 36
Online Safety and
Security
Grayzon L. Gonzales
Online Safety And Security
The internet, Truly is a powerful tool. It can be used to
promote your business, gain new friends and stay in
touch with the old one’s.
It is also a source of entertainment through games,
online communities and everything in between. But like
most things in this world, there is always “other side of
the coin “
Internet is one of the most dangerous places, especially
if you do not know what you are doing with it.
Type Of Information:
First Name
Risk
There is a risk in sharing your first name.
Chances are, a hacker may already know plenty
of stuff about you even if you only give out your
first name.
Likewise you cannot just walk in a room and
start introducing yourself to everyone. You do
not know whom you can come across with.
Type of information:
Last Name
Risk
If sharing your first name is a small risk, having
both your first and last name is more risky.
You will be vulnerable to being searched for
using search engines, w/c include image search.
Matching a name w/ a face is a modus to several
cybercrimes like identity theft.
Type of Information:
Middle Name
Risk
Sharing your middle name alone is probably not
the most risky of these shared information, but
sharing your full name would be.
Type of Information:
Current and Previous School(s)
Risk
Most people who steal identities study their
subject they can use this information for
verification purposes.
Type of Information:
Your Cellphone Number
Risk
Your cellphone number should never be posted
over the internet. Internet is a public places.it
is the same as posting your number on a
billboard. You would not want random
strangers to text you or call you, or worse,
pretend that they are someone else.
Type of Information:
Name of your mother & father
Risk
Risky, yet risky as posting their full names,
especially your mother’s maiden name. In,
fact you may have already encountered many
websites that require your mother’s maiden
name as an answer to a secret question
whenever you lose your password.
Type of Information:
Name of your Sibling’s
Risk
Disclosing this is a huge risk. Strangers may pretend
or use their identity to dupe you.
Type of Information:
Address
Risk
Hopefully, you answer “no” to this one. Giving the
internet your number is one thing; giving them to
your address is a whole other level. It would much
easier for criminals to find you.
Type of information:
Your Home Phone Number
Risk
This shared information is more risky than
sharing your personal phone number. Scams
usually use this information to deceive you,
one of which is when a stranger pretends to
know your Parents or pretends to be you.
Type Of Information:
Your Birthday
Risk
Letting people know your birthday is
probably a must if you want to get as
many gifts as possible. But having it in
your profile makes you vulnerable to
identity theft.
Internet
 Is defined as the information highway this
means that anyone has access to this highway,
can place information, and can grab that
information. And this is why social networking
sites like facebook continue to improve their
security features.
The threat of cybercrime is very real. While you
may not experience the threat now, whatever
information we share today could be affect our
future.
“Tips to Stay
Safe Online”
The internet is a public place and it is
up to you to protect yourself. here are
some tips to help you stay safe when
using the internet.
1. Be mindful of what you share online
and what site you share it to.
This Photo by Unknown Author is licensed under CC BY-SA-NC
“Tips to Stay
Safe Online”
2. Do not just accept
terms and conditions:
read it.
This Photo by Unknown Author is licensed under CC BY-SA
“Tips to Stay Safe
Online”
3. Check out the privacy
policy page of website to
learn how the websites
handles the information you
share.
This Photo by Unknown Author is licensed under CC BY-NC-ND
“Tips to Stay
Safe Online”
4. Know the security
features of the social
networking site you use. By
keeping your profile on
search engines will not
able to scan your profile.
“Tips to Stay
Safe Online”
5. Do not share
your password
with anyone.
This Photo by Unknown Author is licensed under CC BY-NC-ND
“Tips to Stay
Safe Online”
6. Avoid Logging In to
Public networks/WiFi
Browsing in “Incognito (or
private) mode” a feature of
the browser will not
protect you from hackers.
This Photo by Unknown Author is licensed under CC BY-SA
“Tips to Stay Safe
Online”
7. Do not talk to
strangers whether
online or face-face.
This Photo by Unknown Author is licensed under CC BY-NC-ND
“Tips to Stay
Safe Online”
8. Never post anything
about a future
vacation. It is similar to
posting “Rob my house
at this date”.
“Tips to Stay Safe Online”
9. Add friends you know in real life.
“Tips to Stay Safe Online”
10. Avoid visiting untrusted
websites.
“Tips to Stay Safe Online”
11. Install and update an
anti-virus software on
your computer. Use only
one anti-virus software to
avoid conflicts.
This Photo by Unknown Author is licensed under CC BY-SA
“Tips to Stay Safe Online”
12. If you have a Wi-Fi at home,
make it private network by
adding password.
“Tips to Stay Safe Online”
13. Avoid downloading anything from
untrusted websites. You are most
vulnerable in peer to peer downloads
(torrents) as the download is most
likely not monitored by the website
owner.
“Tips to Stay Safe
Online”
14.Buy the software; Do
not use pirated ones.
This Photo by Unknown Author is licensed under CC BY
“Tips to Stay Safe Online”
15.Do not reply or
click links from
suspicious email and
chats messages.
Insert this video
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx

More Related Content

What's hot

Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and EtiquetteTeodoro Llanes II
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfEidene Joy Manuel
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentLany Lyn Magdaraog
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptxRyanRojasRicablanca
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
Empowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image ManipulationEmpowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image ManipulationLany Lyn Magdaraog
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Jesus Rances
 

What's hot (20)

Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
2 Online Safety, Security, Ethics, and Etiquette
2 Online Safety,  Security, Ethics, and Etiquette2 Online Safety,  Security, Ethics, and Etiquette
2 Online Safety, Security, Ethics, and Etiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdfPlanning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
Planning-and-Conceptualizing-an-ICT-for-Social-Change (1).pdf
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2EMPOWERMENT TECHNOLOGIES - LESSON 2
EMPOWERMENT TECHNOLOGIES - LESSON 2
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
6. Applied Productivity Tools with Advanced Application Techniques PPT.pptx
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3EMPOWERMENT TECHNOLOGIES - LESSON 3
EMPOWERMENT TECHNOLOGIES - LESSON 3
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
Empowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image ManipulationEmpowerment Technologies - Principles and Basic Techniques of Image Manipulation
Empowerment Technologies - Principles and Basic Techniques of Image Manipulation
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
Empowerment Technologies - Module 4
Empowerment Technologies - Module 4Empowerment Technologies - Module 4
Empowerment Technologies - Module 4
 

Similar to Lesson 2.2 Online Safety And Security.pptx

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
EM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxEM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxOliverSasutana2
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxlesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxAlleahGevero
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 

Similar to Lesson 2.2 Online Safety And Security.pptx (20)

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
EM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptxEM TECH_Online Safety and security .pptx
EM TECH_Online Safety and security .pptx
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxlesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
 
Users guide
Users guideUsers guide
Users guide
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Protect Your Identity During Social Networking
Protect Your Identity During Social NetworkingProtect Your Identity During Social Networking
Protect Your Identity During Social Networking
 

More from Grayzon Gonzales, LPT

Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure Grayzon Gonzales, LPT
 
HTML5 - create hyperlinks and anchors
HTML5 - create hyperlinks and anchorsHTML5 - create hyperlinks and anchors
HTML5 - create hyperlinks and anchorsGrayzon Gonzales, LPT
 
HTML5- Create divisions in a web page
HTML5- Create divisions in a web pageHTML5- Create divisions in a web page
HTML5- Create divisions in a web pageGrayzon Gonzales, LPT
 
HTML5 - Insert images and Apply page backgrounds
HTML5 - Insert images and Apply page backgroundsHTML5 - Insert images and Apply page backgrounds
HTML5 - Insert images and Apply page backgroundsGrayzon Gonzales, LPT
 
HTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLHTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLGrayzon Gonzales, LPT
 
Adobe Photoshop and its role in society ( Introduction)
Adobe Photoshop and its role in society ( Introduction) Adobe Photoshop and its role in society ( Introduction)
Adobe Photoshop and its role in society ( Introduction) Grayzon Gonzales, LPT
 

More from Grayzon Gonzales, LPT (13)

Lesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptxLesson 2.1 Rules of Netiquette.pptx
Lesson 2.1 Rules of Netiquette.pptx
 
Lesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptxLesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptx
 
ICT as a Platform for Change
ICT as a Platform for Change ICT as a Platform for Change
ICT as a Platform for Change
 
Computer hardware servicing practice occupational health and safety procedure
Computer hardware servicing   practice occupational health and safety procedure Computer hardware servicing   practice occupational health and safety procedure
Computer hardware servicing practice occupational health and safety procedure
 
Small Basic - Branching and Loop
Small Basic - Branching and LoopSmall Basic - Branching and Loop
Small Basic - Branching and Loop
 
HTML5 - create hyperlinks and anchors
HTML5 - create hyperlinks and anchorsHTML5 - create hyperlinks and anchors
HTML5 - create hyperlinks and anchors
 
HTML5- Create divisions in a web page
HTML5- Create divisions in a web pageHTML5- Create divisions in a web page
HTML5- Create divisions in a web page
 
HTML5 - Insert images and Apply page backgrounds
HTML5 - Insert images and Apply page backgroundsHTML5 - Insert images and Apply page backgrounds
HTML5 - Insert images and Apply page backgrounds
 
HTML5 - My First Webpage
HTML5 - My First Webpage HTML5 - My First Webpage
HTML5 - My First Webpage
 
HTML Tags
HTML Tags HTML Tags
HTML Tags
 
HTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLHTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTML
 
Adobe Photoshop - Brush tool
Adobe Photoshop - Brush toolAdobe Photoshop - Brush tool
Adobe Photoshop - Brush tool
 
Adobe Photoshop and its role in society ( Introduction)
Adobe Photoshop and its role in society ( Introduction) Adobe Photoshop and its role in society ( Introduction)
Adobe Photoshop and its role in society ( Introduction)
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Lesson 2.2 Online Safety And Security.pptx

  • 2.
  • 3. Online Safety And Security The internet, Truly is a powerful tool. It can be used to promote your business, gain new friends and stay in touch with the old one’s. It is also a source of entertainment through games, online communities and everything in between. But like most things in this world, there is always “other side of the coin “ Internet is one of the most dangerous places, especially if you do not know what you are doing with it.
  • 4. Type Of Information: First Name Risk There is a risk in sharing your first name. Chances are, a hacker may already know plenty of stuff about you even if you only give out your first name. Likewise you cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across with.
  • 5. Type of information: Last Name Risk If sharing your first name is a small risk, having both your first and last name is more risky. You will be vulnerable to being searched for using search engines, w/c include image search. Matching a name w/ a face is a modus to several cybercrimes like identity theft.
  • 6. Type of Information: Middle Name Risk Sharing your middle name alone is probably not the most risky of these shared information, but sharing your full name would be.
  • 7. Type of Information: Current and Previous School(s) Risk Most people who steal identities study their subject they can use this information for verification purposes.
  • 8. Type of Information: Your Cellphone Number Risk Your cellphone number should never be posted over the internet. Internet is a public places.it is the same as posting your number on a billboard. You would not want random strangers to text you or call you, or worse, pretend that they are someone else.
  • 9. Type of Information: Name of your mother & father Risk Risky, yet risky as posting their full names, especially your mother’s maiden name. In, fact you may have already encountered many websites that require your mother’s maiden name as an answer to a secret question whenever you lose your password.
  • 10. Type of Information: Name of your Sibling’s Risk Disclosing this is a huge risk. Strangers may pretend or use their identity to dupe you.
  • 11. Type of Information: Address Risk Hopefully, you answer “no” to this one. Giving the internet your number is one thing; giving them to your address is a whole other level. It would much easier for criminals to find you.
  • 12. Type of information: Your Home Phone Number Risk This shared information is more risky than sharing your personal phone number. Scams usually use this information to deceive you, one of which is when a stranger pretends to know your Parents or pretends to be you.
  • 13. Type Of Information: Your Birthday Risk Letting people know your birthday is probably a must if you want to get as many gifts as possible. But having it in your profile makes you vulnerable to identity theft.
  • 14. Internet  Is defined as the information highway this means that anyone has access to this highway, can place information, and can grab that information. And this is why social networking sites like facebook continue to improve their security features. The threat of cybercrime is very real. While you may not experience the threat now, whatever information we share today could be affect our future.
  • 15. “Tips to Stay Safe Online” The internet is a public place and it is up to you to protect yourself. here are some tips to help you stay safe when using the internet. 1. Be mindful of what you share online and what site you share it to. This Photo by Unknown Author is licensed under CC BY-SA-NC
  • 16. “Tips to Stay Safe Online” 2. Do not just accept terms and conditions: read it. This Photo by Unknown Author is licensed under CC BY-SA
  • 17. “Tips to Stay Safe Online” 3. Check out the privacy policy page of website to learn how the websites handles the information you share. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 18. “Tips to Stay Safe Online” 4. Know the security features of the social networking site you use. By keeping your profile on search engines will not able to scan your profile.
  • 19. “Tips to Stay Safe Online” 5. Do not share your password with anyone. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 20. “Tips to Stay Safe Online” 6. Avoid Logging In to Public networks/WiFi Browsing in “Incognito (or private) mode” a feature of the browser will not protect you from hackers. This Photo by Unknown Author is licensed under CC BY-SA
  • 21. “Tips to Stay Safe Online” 7. Do not talk to strangers whether online or face-face. This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 22. “Tips to Stay Safe Online” 8. Never post anything about a future vacation. It is similar to posting “Rob my house at this date”.
  • 23. “Tips to Stay Safe Online” 9. Add friends you know in real life.
  • 24. “Tips to Stay Safe Online” 10. Avoid visiting untrusted websites.
  • 25. “Tips to Stay Safe Online” 11. Install and update an anti-virus software on your computer. Use only one anti-virus software to avoid conflicts. This Photo by Unknown Author is licensed under CC BY-SA
  • 26. “Tips to Stay Safe Online” 12. If you have a Wi-Fi at home, make it private network by adding password.
  • 27. “Tips to Stay Safe Online” 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer to peer downloads (torrents) as the download is most likely not monitored by the website owner.
  • 28. “Tips to Stay Safe Online” 14.Buy the software; Do not use pirated ones. This Photo by Unknown Author is licensed under CC BY
  • 29. “Tips to Stay Safe Online” 15.Do not reply or click links from suspicious email and chats messages.
  • 30.