This document contains a lesson on safe and responsible use of information and communication technology. It discusses factors to consider when using computers and the internet like viruses, inappropriate content, identity theft. It also covers personal safety tips when working with computers like wearing protective shoes and avoiding eating near devices. Examples of common malware like viruses, worms, Trojan horses are provided along with symptoms of malware infections and recommendations for prevention and removal like using anti-malware software and updating operating systems.
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Hom
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
These are the notes for the slideshow offered as a JCCCRA TechTalk on Thursday, November 30, 2018. See the slideshow that is also available at www.slideshare.net/jbacon
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Hom
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
These are the notes for the slideshow offered as a JCCCRA TechTalk on Thursday, November 30, 2018. See the slideshow that is also available at www.slideshare.net/jbacon
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2. SLIDESMANIA.COM
slidesmania.com
At the end of the lesson, you should be able to …
LEARNING OUTCOMES
You can type something here…
LESSON 2
Identify factors to
consider in using a
computer, the
internet, and an e-
mail
Provide examples
and advantages of
anti-malware or
anti-virus software
Value the
importance of
personal safety
while working with
a computer
3. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
4. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
5. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
6. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
7. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs ACTIVITY
You can type something here…
Type “YES” if you should do this and “NO” if you should
not do this to computer or at the front of computer
8. SLIDESMANIA.COM
SLIDESMANIA.COM
FACTORS TO CONSIDER IN USING
A COMPUTER, THE INTERNET AND AN E-MAIL
Home Recent Tabs LESSON
You can type something here…
1. Viruses, Adware, and
Spyware – computer can get
a virus while using internet
which can damage the files
and memory of the computer
and even affect its funtions.
2. Exposure to inappropriate
contents – these are those
materials which are not meant
for the age and level of
maturity of users specially
children.
4. Identity theft or fraud –
The user must be aware that
identity can be stolen without
his/her knowledge. Some bad
people do this intentionally to
create crimes or unlawful
acts.
3. Harassment and
cyberbullying – A user must
be aware that not all people
online are trustworthy.
9. SLIDESMANIA.COM
SLIDESMANIA.COM
1. Always wear shoes or slippers with
nonconductive rubber soles. This will
reduce the chances of being shocked or
seriously injured in an electrical accident
2. Do not touch the metallic parts of the
components which are plugged into a
power source
3. Turn off the extension cord when
removing from a compute
4. Avoid eating and drinking near the
computer
5.Before using the computer, be sure that
you fully understand the computer
software
Home Recent Tabs LESSON
You can type something here…
6. Avoid trailing the wire of a computer
across or around the room, because people
might trip on it.
7. Avoid overloading electrical sockets
8. Use a work desk which is strong enough
to support computers and equipment
9. When installing software in your
computer such as antivirus and
antispyware, ask for assistance from a
knowledgeable elder
10. Before touching any hardware, make
sure that the electricity is off.
PERSONAL SAFETY WHILE WORKING WITH A COMPUTER
10. SLIDESMANIA.COM
SLIDESMANIA.COM
Home Recent Tabs LESSON
You can type something here…
A shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.
11. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
The computer worms
spread over the computer
networks by exploiting the
computer system
vulnerabilities. They have
the ability to self-replicate
and spread independently.
Often, they are spread
through mass e-mails with
infected attachments to
users’ contacts
WORMS
This is a malware which is
capable of copying itself
and spreading to other
computers. They can steal
information, harm host
computers and networks,
steal money, render
advertisements, and do
other ways to cause
damages.
VIRUS
12. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is also known as “Trojan”.
To trick the users to
download or install the
malware, it disguises itself
as a normal file or program
TROJAN
HORSE It is a flaw that produces
undesired outcomes which
are usually results of
human error usually exists
in the source code of
compilers of a program.
These can be prevented
with developer education,
code analysis tools, and
quality education
BUG
13. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
It is a short form of
advertising-supported
software. It delivers
advertisements
automatically such as pop-
up ads on websites and
applications which offer
free versions
ADWARE
It holds the computer system
captive while demanding a
ransom. It encrypts the user’s
access to the computer by
encrypting files to the hard
drive or locking down the
system. Then, it will display a
display message forcing the
user to pay the malware
creator to remove restriction
as well as to regain access
RANSOMWARE
14. SLIDESMANIA.COM
SLIDESMANIA.COM
COMMON TYPES OF MALWARE
Home Recent Tabs LESSON
You can type something here…
This is designed to
remotely access or control
a computer wherein the
users or even the security
programs cannot detect. It
cannot be removed easily
because it keeps hiding
itself.
ROOTKIT
It functions by spying the
user’s activity without their
knowledge. It spreads by
exploiting software
vulnerabilities
SPYWARE
15. SLIDESMANIA.COM
SLIDESMANIA.COM
1. The computer or the web browser speed becomes slower
2. The files are modified or deleted
3. The CPU usage increases
4. There is a problem when connecting to a network
5. It is freezing or crashing
6. The running programs turn off themselves
7. The computer behavior becomes strange
8. The e-mails and messages are being sent automatically without the user’s knowledge
9. Strange files, programs, or desktop icons appear.
Home Recent Tabs LESSON
You can type something here…
MALWARE SYMPTOMS
16. SLIDESMANIA.COM
SLIDESMANIA.COM
1. An anti-malware and firewall software must be installed. Choose a software that
offers tools for defecting, quarantining, and removing multiple types of malwares.
Scan your computer regularly
2. The software and the operating system should be updated to the current
vulnerability patches. These patches are used to patch bugs or other security
flaws that could be exploited by attackers.
3. Be watchful when downloading files, programs, attachments, and other. Most
often, a download that looks strange or come from an unfamiliar source contains
a malware
Home Recent Tabs LESSON
You can type something here…
RECOMMENDATIONS ON HOW TO PREVENT
AND REMOVE MALWARE
17. SLIDESMANIA.COM
slidesmania.com
Prepared By: Mr. Benandro A. Palor
LESSON 2
Reference: Dynamic Series in Home Economics and Livelihood Education 4 by: Gee E. Velasquez and Cynthia Bulayo-Banzon
THANK YOU !!!!
Twitter Facebook Instagram SlidesMania