SlideShare a Scribd company logo
1 of 23
Empowerment Technology
Mr. Michael D. Atienza
• Decide on the appropriate online
safety and security in online
transactions;
• Determine acceptable ethics and
etiquette online; and
• Develop an ethical and safety
habits in using online resources.
Online Security refers to the rules
that are followed and actions that
are taken to make sure that online
users and data privacy aren't
compromised by criminals.
Causes a system
component to perform a
function or service that is
detrimental to system
security.
• is a person who attempts to gain unauthorized access to
a system, to damage that system, or to disturb data on
that system.
• ´in summary, this person attempts to violate Security by interfering
with system Availability, Data Integrity or Data Confidentiality
The result of an illegal act
using the computer and
the internet.
a type of computer
program that, when
executed, replicates itself
by modifying other
computer programs and
inserting its own code
• Infection mechanism (also
called 'infection vector) – is
how the virus spreads or
propagates.
• The trigger – which is also
known as a logic bomb
• The "payload" – is the actual
body or data that performs the
actual malicious purpose of the
virus.
• Flaming
• Harassment
• Denigration
• Impersonation
• Outing
• Trickery
• Exclusion
• Cyberstalking
• Inform a trusted person
• Try not to instigate
• Block connection with a
bully
• Log out from your online
account
• Be not a bully too.
• Select a secure browser
• Establish a multilayer e-
mail protection
• Apply multifactor
authenticity in your online
accounts
• Install a firewall
•
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx

More Related Content

Similar to Online Safety, Security and Rules of Netiquette.pptx

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 

Similar to Online Safety, Security and Rules of Netiquette.pptx (20)

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf20210629_104540Information Security L1.pdf
20210629_104540Information Security L1.pdf
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
security of information systems
 security of information systems security of information systems
security of information systems
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 

Online Safety, Security and Rules of Netiquette.pptx

  • 2. • Decide on the appropriate online safety and security in online transactions; • Determine acceptable ethics and etiquette online; and • Develop an ethical and safety habits in using online resources.
  • 3. Online Security refers to the rules that are followed and actions that are taken to make sure that online users and data privacy aren't compromised by criminals.
  • 4.
  • 5. Causes a system component to perform a function or service that is detrimental to system security.
  • 6. • is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. • ´in summary, this person attempts to violate Security by interfering with system Availability, Data Integrity or Data Confidentiality
  • 7.
  • 8.
  • 9.
  • 10. The result of an illegal act using the computer and the internet.
  • 11.
  • 12.
  • 13. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  • 14. • Infection mechanism (also called 'infection vector) – is how the virus spreads or propagates. • The trigger – which is also known as a logic bomb • The "payload" – is the actual body or data that performs the actual malicious purpose of the virus.
  • 15.
  • 16. • Flaming • Harassment • Denigration • Impersonation • Outing • Trickery • Exclusion • Cyberstalking
  • 17. • Inform a trusted person • Try not to instigate • Block connection with a bully • Log out from your online account • Be not a bully too.
  • 18. • Select a secure browser • Establish a multilayer e- mail protection • Apply multifactor authenticity in your online accounts • Install a firewall
  • 19.