SlideShare a Scribd company logo
1 of 25
THE ONLINE WORLD IS INCREASINGLY
INTEGRATED INTO OUR DAILY LIVES.
THE INTERNET LIKE THE PHYSICAL
WORLD, MAYBE SAFE OR UNSAFE
DEPENDING ON OUR HABITS.
Sometimes, we do not pay
much attention about the
information that we share.
Being safe and secured online depends
on how we protect ourselves.
Analyze the following statements
Guess the correct answer by giving a
thumbs-up if You agree and thumbs –
down if not.
Without worries,
download anything
from untrusted
websites.
It is fine to log-in to a public networks/Wi-Fi
Install and update
an antivirus
software on your
computer.
Reply or click links from suspicious e-mail
Be mindful of what
you share in the
internet and what
site you share it to.
Visit website that are
in your most interest
without checking its
privacy polices.
Buy the software; do not
use pirated ones
Do not talk to strangers whether online or face-to-face
The internet is define as
the information
superhighway. This
means that anyone has
access to this highway,
can place information and
can grab that Information.
The more information you share online the higher the
risks such as:
Identity theft
phishing Malware
infections
The threats in the internet is real. After all, it become a public
place especially billions of people have an excess of
knowledge about internet.
Malicious software
It is a malicious program that
usually transfer from one device
to another with the aid of the
local networks, but commonly
through data storage such as
flash drives and hard drive.
This Malware replicates
itself and can transfer by
any type of means, but
more often through
computer network.
This malicious
program disguise as a
useful program,
however left your
device unprotected
and became
vulnerable to other
malwares once you
accessed or download.
A malicious program
that monitors the
device, and the actions
of the users without its
knowledge.
Keyloggers
Used to record the
keystroke done by the
users. This is done to steal
their password or any
information.
A program designed to send you advertisements
mostly popups
VIRUS WORM TROJAN SPYWARE ADWARE
MALWARES
What are the different internet
threats?
• Identity Theft
• Phishing
• Malware Infections
What are the 5 types of malwares?
• VIRUS
• WORM
• TROJAN
• SPYWARE
• ADWARE
This Malware
replicates itself and
can transfer by any
type of means, but
more often through
computer network.
Is uploading and
downloading of
software in the
internet are safe?
Why?

More Related Content

Similar to Online Safety, Security, Ethics and Etiquette Standards.pptx

Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptKeerthikaaThiyagaraj
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.pptJacobJose37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSASASASA93
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...BUSHRASHAIKH804312
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt1A245MohitTitarmare
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.ECoyShastriBhawan
 
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.pptCyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.pptAjitGouda4
 
Cyber security by vinod sencha for education
Cyber security by vinod sencha for educationCyber security by vinod sencha for education
Cyber security by vinod sencha for educationKanakKumarKanak1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser46d915
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptFarhanQuraishi4
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAshaVijay11
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHbhaimeresuresh
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptUmeshBansal18
 

Similar to Online Safety, Security, Ethics and Etiquette Standards.pptx (20)

Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.pptCyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
 
Cyber security by vinod sencha for education
Cyber security by vinod sencha for educationCyber security by vinod sencha for education
Cyber security by vinod sencha for education
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

More from Michael Montarde

FILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editingFILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editingMichael Montarde
 
How-to-Install-Windows7.pptx
How-to-Install-Windows7.pptxHow-to-Install-Windows7.pptx
How-to-Install-Windows7.pptxMichael Montarde
 
DEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptxDEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptxMichael Montarde
 
A GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdfA GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdfMichael Montarde
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptxMichael Montarde
 
ICT 2nd QUARTER summative.pptx
ICT  2nd QUARTER summative.pptxICT  2nd QUARTER summative.pptx
ICT 2nd QUARTER summative.pptxMichael Montarde
 
Empowerment_Q2_module1.docx
Empowerment_Q2_module1.docxEmpowerment_Q2_module1.docx
Empowerment_Q2_module1.docxMichael Montarde
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfMichael Montarde
 

More from Michael Montarde (9)

FILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editingFILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editing
 
How-to-Install-Windows7.pptx
How-to-Install-Windows7.pptxHow-to-Install-Windows7.pptx
How-to-Install-Windows7.pptx
 
DEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptxDEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptx
 
A GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdfA GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdf
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
 
network printer.ppt
network printer.pptnetwork printer.ppt
network printer.ppt
 
ICT 2nd QUARTER summative.pptx
ICT  2nd QUARTER summative.pptxICT  2nd QUARTER summative.pptx
ICT 2nd QUARTER summative.pptx
 
Empowerment_Q2_module1.docx
Empowerment_Q2_module1.docxEmpowerment_Q2_module1.docx
Empowerment_Q2_module1.docx
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 

Recently uploaded

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

Online Safety, Security, Ethics and Etiquette Standards.pptx

  • 1.
  • 2. THE ONLINE WORLD IS INCREASINGLY INTEGRATED INTO OUR DAILY LIVES. THE INTERNET LIKE THE PHYSICAL WORLD, MAYBE SAFE OR UNSAFE DEPENDING ON OUR HABITS.
  • 3. Sometimes, we do not pay much attention about the information that we share.
  • 4.
  • 5. Being safe and secured online depends on how we protect ourselves. Analyze the following statements Guess the correct answer by giving a thumbs-up if You agree and thumbs – down if not.
  • 7. It is fine to log-in to a public networks/Wi-Fi
  • 8. Install and update an antivirus software on your computer.
  • 9. Reply or click links from suspicious e-mail
  • 10. Be mindful of what you share in the internet and what site you share it to.
  • 11. Visit website that are in your most interest without checking its privacy polices.
  • 12. Buy the software; do not use pirated ones
  • 13. Do not talk to strangers whether online or face-to-face
  • 14. The internet is define as the information superhighway. This means that anyone has access to this highway, can place information and can grab that Information.
  • 15. The more information you share online the higher the risks such as:
  • 17. The threats in the internet is real. After all, it become a public place especially billions of people have an excess of knowledge about internet.
  • 18. Malicious software It is a malicious program that usually transfer from one device to another with the aid of the local networks, but commonly through data storage such as flash drives and hard drive.
  • 19. This Malware replicates itself and can transfer by any type of means, but more often through computer network. This malicious program disguise as a useful program, however left your device unprotected and became vulnerable to other malwares once you accessed or download. A malicious program that monitors the device, and the actions of the users without its knowledge.
  • 20. Keyloggers Used to record the keystroke done by the users. This is done to steal their password or any information.
  • 21. A program designed to send you advertisements mostly popups VIRUS WORM TROJAN SPYWARE ADWARE MALWARES
  • 22. What are the different internet threats? • Identity Theft • Phishing • Malware Infections
  • 23. What are the 5 types of malwares? • VIRUS • WORM • TROJAN • SPYWARE • ADWARE
  • 24. This Malware replicates itself and can transfer by any type of means, but more often through computer network.
  • 25. Is uploading and downloading of software in the internet are safe? Why?