SlideShare a Scribd company logo
Most of us are ‘connected’ via our
laptops, mobile phones, tablets or
personal computer. The potential for the
internet to be a valuable and a fun
resource for entertainment, making
friends, keeping in touch and learning is
huge.
But if you use the internet, you could be
at risk of illegal activity or abuse - be it
bullying, fraud or something more
serious. Unlike seeing someone face to
face, on the net, people aren't always
what they first seem.
Cyber crime- a crime committed or a
assisted through the use of the Internet
Privacy Policy/Terms of Services- tells
the user how the website will handle its
data
Malware- stands for malicious software
Virus- a malicious program designed
to transfer from one computer to
another in any means possible
Worms- a malicious program
designed to replicate itself and
transfer from one file folder to
another and also transfer to other
computers.
Trojan- a malicious program
designed that is disguised as a
useful program but once
downloaded or installed
leaves your PC unprotected
and allows hacker to get your
information.
Spyware- a program that runs in the
background without you knowing it.
Adware- a program designed to send
you advertisement, mostly pop-ups.
Spam- unwanted email mostly from
bots or advertisers.
Copyright- a part of law, wherein you
have the rights to work, anyone who
uses it without your consent is
punishable by law.
Hacker- s a person skilled
in information technology who uses
their technical knowledge to achieve a
goal or overcome an obstacle, within a
computerized system
Phishing- acquires sensitive
personal information like
passwords and credit card details.
Pharming- a more complicated
way of phishing where it exploits
the DNS system
 Don't give out personal information such as
your address or phone number.
 Don’t send pictures of yourself to anyone,
especially indecent pictures.
 Don't open emails or attachments from
people you don't know.
Don't become online ‘friends’ with people
you don't know.
 Never arrange to meet someone in
person who you've met online.
 If anything you see or read online
worries you, tell someone about it.
Make sure you're old enough to join.
 Maybe use a made up name or
nickname on your profile.
 Never give out personal information.
 Do not make friends you don't already
know personally.
Maybe use an email address that does not
include your name.
 Always use a ‘strong’ password. That is, don't
use any names or words that someone might
guess, like the name of your dog or your favorite
singer. Use random letters or numbers and
change your password regularly.
Be very careful about sharing content online -
especially if it isn't yours to share. Illegal
downloads are definitely best avoided.
 Never meet up with anyone you have met
online.
 Make sure you know about the safety
features on any networking site. Some, for
example, have a ‘panic button’ which you can
press if you see something that shouldn't be
there.
lesson-2.pptx

More Related Content

Similar to lesson-2.pptx

Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
MarkAnthonyAurellano
 
Heads up!
Heads up!Heads up!
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
sirchriss
 
Online Safety
Online Safety Online Safety
Online Safety
Janetta Garton
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
jhonmarraguindin179
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
Pentucket Regional High School
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
HeideYlanan1
 
Internet safety
Internet safetyInternet safety
Internet safety
jonathancallcott-efc
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 

Similar to lesson-2.pptx (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Online Safety
Online Safety Online Safety
Online Safety
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 

Recently uploaded

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 

Recently uploaded (20)

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 

lesson-2.pptx

  • 1.
  • 2. Most of us are ‘connected’ via our laptops, mobile phones, tablets or personal computer. The potential for the internet to be a valuable and a fun resource for entertainment, making friends, keeping in touch and learning is huge.
  • 3. But if you use the internet, you could be at risk of illegal activity or abuse - be it bullying, fraud or something more serious. Unlike seeing someone face to face, on the net, people aren't always what they first seem.
  • 4. Cyber crime- a crime committed or a assisted through the use of the Internet Privacy Policy/Terms of Services- tells the user how the website will handle its data Malware- stands for malicious software
  • 5. Virus- a malicious program designed to transfer from one computer to another in any means possible Worms- a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
  • 6. Trojan- a malicious program designed that is disguised as a useful program but once downloaded or installed leaves your PC unprotected and allows hacker to get your information.
  • 7. Spyware- a program that runs in the background without you knowing it. Adware- a program designed to send you advertisement, mostly pop-ups. Spam- unwanted email mostly from bots or advertisers.
  • 8. Copyright- a part of law, wherein you have the rights to work, anyone who uses it without your consent is punishable by law. Hacker- s a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system
  • 9. Phishing- acquires sensitive personal information like passwords and credit card details. Pharming- a more complicated way of phishing where it exploits the DNS system
  • 10.  Don't give out personal information such as your address or phone number.  Don’t send pictures of yourself to anyone, especially indecent pictures.  Don't open emails or attachments from people you don't know.
  • 11. Don't become online ‘friends’ with people you don't know.  Never arrange to meet someone in person who you've met online.  If anything you see or read online worries you, tell someone about it.
  • 12. Make sure you're old enough to join.  Maybe use a made up name or nickname on your profile.  Never give out personal information.  Do not make friends you don't already know personally.
  • 13. Maybe use an email address that does not include your name.  Always use a ‘strong’ password. That is, don't use any names or words that someone might guess, like the name of your dog or your favorite singer. Use random letters or numbers and change your password regularly.
  • 14. Be very careful about sharing content online - especially if it isn't yours to share. Illegal downloads are definitely best avoided.  Never meet up with anyone you have met online.  Make sure you know about the safety features on any networking site. Some, for example, have a ‘panic button’ which you can press if you see something that shouldn't be there.