SlideShare a Scribd company logo
COMPUTER RESOURCES
   NICKO Sapnu
   It involves the right or mandate of personal
    privacy concerning the
    storing, repurposing, providing to third-
    parties, and displaying of information
    pertaining to oneself via the Internet.
   The first is that privacy helps individuals
    maintain their autonomy and individuality.
   Because of its functional benefits.
   attempting to acquire information.
   such as usernames, passwords, and credit card
    details by masquerading as a trustworthy
    entity in an electronic communication.
   Is a way to trick computer and Internet users
    into revealing personal and financial
    information through a fraudulent email or
    website.
   Phishing is typically carried out by e-mail
    spoofing or instant messaging.
    Phishing emails may contain links to websites
    that are infected with malware.
   an example of social engineering techniques
    used to deceive users,
   Phishing -a way of attempting to acquire
    information such as usernames, passwords,
    and credit card details by masquerading as a
    trustworthy entity in an electronic
    communication.
   Clone Phishing- A type of phishing attack
    whereby a legitimate, and previously
    delivered, email containing an attachment or
    link has had its content and recipient
    address(es) taken and used to create an almost
    identical or cloned email.
• Whaling- Several recent phishing
  attacks have been directed specifically at
  senior executives and other high profile
  targets within businesses, and the term
  whaling has been coined for these kinds
  of attacks.
• Spear Phishing- Attackers may gather
  personal information about their target
  to increase their probability of success.
   A Fake Facebook Login Page
   An Exploit Kit in a Fraudulent Facebook Page
   A Fraudulent Online Pharmacy Website
   A Fraudster's Order Page
   A Fraudulent YouTube E-mail
   A Fake Virus Scanner
   Disclosure of private information by either
    yourself or friends/contacts.
   Bullying.
   Cyber-stalking.
   Access to age-inappropriate content
   Online grooming and child abuse.
   People hacking into or hijacking your account
    or page.
• Friends’, other people’s and
  companies' posts encouraging you
  to link to fraudulent or
  inappropriate websites.
• People hacking into or hijacking
  your account or page.
• Viruses or spyware contained
  within message attachments or
  photographs.
   Be wary of publishing any identifying
    information about yourself – either in your
    profile or in your posts – such as phone
    numbers, pictures of your home, workplace or
    school, your address or birthday.
   Pick a user name that does not include any
    personal information. For example,
    “joe_glasgow” or “jane_liverpool” would be
    bad choices.
• Set up a separate email account to register and
  receive mail from the site. That way if you want
  to close down your account/page, you can
  simply stop using that mail account. Setting up a
  new email account is very simple and quick to
  do using such providers as Hotmail, Yahoo!
  Mail or gmail.
• Keep your profile closed and allow only your
  friends to view your profile.
• What goes online stays online. Do not say
  anything or publish pictures that might later
  cause you or someone else embarrassment.
• Be aware of what friends post about you, or
  reply to your posts, particularly about your
  personal details and activities.
• Remember that many companies routinely view
  current or prospective employees’ social
  networking pages, so be careful about what you
  say, what pictures you post and your profile.
• Learn how to use the site properly. Use the
  privacy features to restrict strangers’ access to
  your profile. Be guarded about who you let join
  your network.
• Be on your guard against phishing scams.
• Ensure you have effective and updated
  antivirus/antispyware software and firewall
  running before you go online.
   Allows you to browse the Internet without
    saving any information about which sites and
    pages you’ve visited.
   To put Firefox into a temporary state where no
    information about the user's browsing session
    is stored locally.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Start Private Browsing.
   When you turn on Private Browsing, Firefox
    alerts you that it will save your current
    windows and tabs for after you finish using
    Private Browsing. Click Start Private Browsing
    to continue.
   Check the box next to "Do not show this
    message again" if you don't want to receive this
    alert when you turn on Private Browsing.
   The Private Browsing information screen
    appears to confirm that you're in Private
    Browsing mode.
   When browsing in Private Browsing mode, the
    Firefox button will be purple (for Windows XP
    the window title will say (Private Browsing)
    instead) during your session.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Stop Private Browsing.




The windows and tabs you were using when you enabled Private
Browsing will appear, and you can use Firefox normally. The Firefox
button will turn orange again (for Windows XP the Firefox window title
will no longer say (Private Browsing)) when Private Browsing is off.
   It is safe for your computer data security.
   No one can track your data when you use
    secure browsing or private browsing.
   this is the safe and secure way for online
    banking .
   it clear the history and passwords when you
    close the browser.

More Related Content

What's hot

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
thaash95
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
Abhishek Gupta
 
6 online identity
6 online identity6 online identity
6 online identity
COMP 113
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
Naval OPSEC
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Phishing
PhishingPhishing
Phishing
oitaoming
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
Naval OPSEC
 
Phishing
PhishingPhishing
Phishing
Syahida
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
computers 11
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
Edureka!
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
Naval OPSEC
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
Naval OPSEC
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
ConnectYourCommunity
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 

What's hot (19)

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
6 online identity
6 online identity6 online identity
6 online identity
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Phishing
PhishingPhishing
Phishing
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Phishing
PhishingPhishing
Phishing
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Phishing
PhishingPhishing
Phishing
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 

Viewers also liked

Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
CESSDA Training
 
Steve Purser
Steve Purser Steve Purser
Steve Purser
globalforum11
 
Online privacy
Online privacy Online privacy
Online privacy
Nicko Sapnu
 
Online privacy
Online privacyOnline privacy
Online privacy
megg16
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
Roopanshi Virang
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 

Viewers also liked (8)

Online privacy
Online privacyOnline privacy
Online privacy
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
 
Steve Purser
Steve Purser Steve Purser
Steve Purser
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to Online privacy

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Internet safety
Internet safetyInternet safety
Internet safety
jonathancallcott-efc
 
Safe Computing
Safe ComputingSafe Computing
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
Apostolos Syropoulos
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
PriyanshuPatel363793
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
Department of Defense
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
Rozell Sneede
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
Monash Public Library Service
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
guadalinfoyunquera
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 

Similar to Online privacy (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Online privacy

  • 1. COMPUTER RESOURCES NICKO Sapnu
  • 2. It involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third- parties, and displaying of information pertaining to oneself via the Internet.
  • 3. The first is that privacy helps individuals maintain their autonomy and individuality.  Because of its functional benefits.
  • 4.
  • 5. attempting to acquire information.  such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Is a way to trick computer and Internet users into revealing personal and financial information through a fraudulent email or website.
  • 6. Phishing is typically carried out by e-mail spoofing or instant messaging.  Phishing emails may contain links to websites that are infected with malware.  an example of social engineering techniques used to deceive users,
  • 7. Phishing -a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Clone Phishing- A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
  • 8. • Whaling- Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks. • Spear Phishing- Attackers may gather personal information about their target to increase their probability of success.
  • 9. A Fake Facebook Login Page  An Exploit Kit in a Fraudulent Facebook Page  A Fraudulent Online Pharmacy Website  A Fraudster's Order Page  A Fraudulent YouTube E-mail  A Fake Virus Scanner
  • 10. Disclosure of private information by either yourself or friends/contacts.  Bullying.  Cyber-stalking.  Access to age-inappropriate content  Online grooming and child abuse.  People hacking into or hijacking your account or page.
  • 11. • Friends’, other people’s and companies' posts encouraging you to link to fraudulent or inappropriate websites. • People hacking into or hijacking your account or page. • Viruses or spyware contained within message attachments or photographs.
  • 12.
  • 13. Be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday.  Pick a user name that does not include any personal information. For example, “joe_glasgow” or “jane_liverpool” would be bad choices.
  • 14. • Set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as Hotmail, Yahoo! Mail or gmail. • Keep your profile closed and allow only your friends to view your profile. • What goes online stays online. Do not say anything or publish pictures that might later cause you or someone else embarrassment.
  • 15. • Be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities. • Remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile. • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network. • Be on your guard against phishing scams. • Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.
  • 16. Allows you to browse the Internet without saving any information about which sites and pages you’ve visited.  To put Firefox into a temporary state where no information about the user's browsing session is stored locally.
  • 17. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Start Private Browsing.
  • 18. When you turn on Private Browsing, Firefox alerts you that it will save your current windows and tabs for after you finish using Private Browsing. Click Start Private Browsing to continue.  Check the box next to "Do not show this message again" if you don't want to receive this alert when you turn on Private Browsing.
  • 19. The Private Browsing information screen appears to confirm that you're in Private Browsing mode.  When browsing in Private Browsing mode, the Firefox button will be purple (for Windows XP the window title will say (Private Browsing) instead) during your session.
  • 20. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Stop Private Browsing. The windows and tabs you were using when you enabled Private Browsing will appear, and you can use Firefox normally. The Firefox button will turn orange again (for Windows XP the Firefox window title will no longer say (Private Browsing)) when Private Browsing is off.
  • 21. It is safe for your computer data security.  No one can track your data when you use secure browsing or private browsing.  this is the safe and secure way for online banking .  it clear the history and passwords when you close the browser.