This document discusses online safety and security. It begins with an introduction stating that when accessing the internet, individuals and organizations are concerned with protecting their computers and information from threats. It then discusses common online threats like spam, phishing, and malware. It explains that spam refers to unsolicited messages, phishing involves stealing personal information, and malware is malicious software that can damage computers. The document also outlines some Philippine laws that aim to protect individuals from online threats such as identity theft, scams, and bullying. It discusses the Anti-Bullying Act and Cybercrime Prevention Act and some offenses they cover.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
It provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. Introduced by Pramod Mahajan, Minister of
Communications and Information Technology.
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
It provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. Introduced by Pramod Mahajan, Minister of
Communications and Information Technology.
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
Students, the Internet & COVID-19 by Ayush Chopra
To Google your name is to know your legacy and always remember that your Digital Footprint is your new resume.
MAKE IT WORTH READING !!
-Ayush Chopra
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. Hello!
I’m Joseph, Paul, Jerot, JM & Lennard!
We are here because we will report the topic about Online
Safety & Security
2
3. Introduction
Each individual when accessing the
World Wide Web is concerned with the safety
of his or her terminal or computer and the
information that will be transmitted or
received.
Every organisation relies on the
internet to some degree or another for
communications, transactions, payments and
data access. Unfortunately, however, the
internet has also become a channel of choice
for criminals to commit financial and other
crimes. Your organisation must take
precautions to protect itself.
3
5. “▫ Refers to the transmission of
unsolicited messages from
various origins using electronic
messaging systems such as e-
mail and chat messengers
▫ A tool for advertisement
▫ Unsolicited bulk e-mail (UBE)
5
8. “▫ Defined as a software or a
program used by an attacker to
obtain personal information
▫ Commonly target user passwords
to hack and take control of a user
account
8
11. “▫ Short term for malicious software
▫ A computer software sent by
attackers to inflict chaos on a
computer’s operation and
processes
11
12. How to avoid these
threats?
There are provisions & laws that our country
implements to avoid these threats.
12
13. The Philippine government ensures the welfare
of its people in their ICT experience by enacting
various laws and regulations. There are incidents
of theft, scam, phishing and other activities that
victimize Filipino people.
13
14. What is Bullying?
Defined as “severe or repeated
use by one or more students of a
written, verbal or electronic
expression, or a physical gesture, or
any combination thereof, directed to
another student that has the effect of
actually causing or placing the latter
in reasonable fear of physical or
emotional harm or damage to his
property.”
Republic
Act 10627
or Anti-
Bullying
Act of
2013
14
15. This law includes protection of individuals from
bullying through electronic means. Bullying
invades an individual’s privacy by using photos
and other information meant to disgrace that
individual.
15
17. Acquisition of passwords and other vital
information from an individual • Computer
forgery • Libel
17
Cybercime offenses
include, but are not limited
to: • Integrity and
availability of data • Illegal
access of computers
through remote means
without permission •
Interception of one’s
information from a private
conversation or
correspondence •
19. Credits
Special thanks to these articles and links
▫ https://www.slideshare.net/ArahLouiseApostol19/online-safety-and-security
▫ https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-
online
▫ https://www.getsafeonline.org/online-safety-and-security/
19