SlideShare a Scribd company logo
ONLINE SAFETY AND SECURITY
Each individual when accessing the World Wide Web is
concerned with the safety of his or her terminal or
computer and information that will be transmitted or
received.
SPAM
This refers to the transmission
of unsolicited messages from various
origins using electronic messaging
systems such as e-mail and chat
messengers. Usually the attackers use
spam as a tool for advertisement. E-
mail spam is the most common form
which also known as unsolicited bulk e-
mail (UBE)
Here are a number of threats that can be acquired
from connecting to the WWW.
PHISHING
This is defines as a software
or program used by an attacker to
obtain personal information.
Attackers commonly target user
passwords to hack and take control
of a user account. Furthermore,
credit card numbers are also
targeted by phishing.
Here are a number of threats that can be acquired
from connecting to the WWW.
MALWARE
This is the short tem for Malicious Software,
which is a computer software sent by attackers to inflict
chaos on a computer’s operation and processes.
Malware are used to spy upon the activity of the
computer and steal information.
Here are a number of threats that can be acquired
from connecting to the WWW.
A very effective way of avoiding these threats is verifying and
authenticity of information from the World Wide Web.
1. Was your security ever compromised?
2. What were the threats that victimized you?
3. How do you think did you acquire these threats?
What Have I Learned So Far?

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
vimal kumar arora
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
Ppt
PptPpt
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
jubke
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
Tannistho Ghosh
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
Zoro18
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
FrancisJuanson1
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Ppt
PptPpt
Ppt
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
 

Similar to Online safety and security

INTERNET THREAT
INTERNET THREATINTERNET THREAT
INTERNET THREAT
Ladyleyladyley
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
AariyaRathi
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
awderdlfy
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
c_s_halabja
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
akkharbabu
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
faadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
HArshMangasuli
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
HeroZero12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 

Similar to Online safety and security (20)

INTERNET THREAT
INTERNET THREATINTERNET THREAT
INTERNET THREAT
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 

More from EILLEN IVY PORTUGUEZ

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
EILLEN IVY PORTUGUEZ
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
EILLEN IVY PORTUGUEZ
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
EILLEN IVY PORTUGUEZ
 
Network Security
Network SecurityNetwork Security
Network Security
EILLEN IVY PORTUGUEZ
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
EILLEN IVY PORTUGUEZ
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
EILLEN IVY PORTUGUEZ
 
Web design principles
Web design principlesWeb design principles
Web design principles
EILLEN IVY PORTUGUEZ
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
EILLEN IVY PORTUGUEZ
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
EILLEN IVY PORTUGUEZ
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
EILLEN IVY PORTUGUEZ
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
EILLEN IVY PORTUGUEZ
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
EILLEN IVY PORTUGUEZ
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
EILLEN IVY PORTUGUEZ
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
EILLEN IVY PORTUGUEZ
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
EILLEN IVY PORTUGUEZ
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
EILLEN IVY PORTUGUEZ
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
EILLEN IVY PORTUGUEZ
 
Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
EILLEN IVY PORTUGUEZ
 

More from EILLEN IVY PORTUGUEZ (20)

SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Visual Information and Media
Visual Information and MediaVisual Information and Media
Visual Information and Media
 
The Power of Media and Information
The Power of Media and InformationThe Power of Media and Information
The Power of Media and Information
 
Network Security
Network SecurityNetwork Security
Network Security
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
Web design principles
Web design principlesWeb design principles
Web design principles
 
Understanding the computer system
Understanding the  computer systemUnderstanding the  computer system
Understanding the computer system
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Technology empowerment
Technology empowermentTechnology empowerment
Technology empowerment
 
Search engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenetSearch engines & advantage and disadvantage of intenet
Search engines & advantage and disadvantage of intenet
 
Productivity tools
Productivity toolsProductivity tools
Productivity tools
 
Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)Personal entrepreneurial competencies (pecs)
Personal entrepreneurial competencies (pecs)
 
Online presentation tools
Online presentation toolsOnline presentation tools
Online presentation tools
 
Online platforms and applications
Online platforms and applicationsOnline platforms and applications
Online platforms and applications
 
Mapping applications
Mapping applicationsMapping applications
Mapping applications
 
Key concepts of selecting a business idea
Key concepts of selecting a business ideaKey concepts of selecting a business idea
Key concepts of selecting a business idea
 
Internet and online ethics & etiquette
Internet and online ethics & etiquetteInternet and online ethics & etiquette
Internet and online ethics & etiquette
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Online safety and security

  • 1. ONLINE SAFETY AND SECURITY Each individual when accessing the World Wide Web is concerned with the safety of his or her terminal or computer and information that will be transmitted or received.
  • 2.
  • 3. SPAM This refers to the transmission of unsolicited messages from various origins using electronic messaging systems such as e-mail and chat messengers. Usually the attackers use spam as a tool for advertisement. E- mail spam is the most common form which also known as unsolicited bulk e- mail (UBE) Here are a number of threats that can be acquired from connecting to the WWW.
  • 4. PHISHING This is defines as a software or program used by an attacker to obtain personal information. Attackers commonly target user passwords to hack and take control of a user account. Furthermore, credit card numbers are also targeted by phishing. Here are a number of threats that can be acquired from connecting to the WWW.
  • 5. MALWARE This is the short tem for Malicious Software, which is a computer software sent by attackers to inflict chaos on a computer’s operation and processes. Malware are used to spy upon the activity of the computer and steal information. Here are a number of threats that can be acquired from connecting to the WWW.
  • 6. A very effective way of avoiding these threats is verifying and authenticity of information from the World Wide Web.
  • 7. 1. Was your security ever compromised? 2. What were the threats that victimized you? 3. How do you think did you acquire these threats? What Have I Learned So Far?