SlideShare a Scribd company logo
Computing Ethics Towards Safe Computing By:  Dheeraj  Mehrotra www.computerscienceexpertise.com
 
Ensure you have the latest updates.  Install updates and security patches on all servers, desktop and laptop PCs.
Reduce the risk of viruses.  There are numerous things you can do to protect your computer and your network against viruses. Using anti-virus software and keeping it current is the first step,
Use Windows Security Centre to manage your settings.  Get a clear picture of the security settings on your PC using the single, unified view provided in the Windows Security Centre.
Download internet files from trusted sources only.  If you're unsure if the files you want to download are safe, consider downloading them to a disk separate from your hard drive, such as a CD or floppy. Then you can scan the files with your virus scanner.
Use password encryption to protect Office files.  Improved encryption technology has strengthened password security in Word 2003 and Excel 2003 and extends password encryption to PowerPoint 2003. Look under the Tools menu in each of these three programs to activate password protection. This is an effective way to restrict access to confidential business information.
Clean your hard drive before you discard a PC.  If you're getting a new PC or notebook and your old one is being discarded, be sure to remove any sensitive business or personal information before you let it go. This doesn't mean simply deleting files and emptying your Recycle Bin. Your options include reformatting the hard drive or acquiring software that wipes it clean.
Use a firewall.  If your company uses always-on broadband to connect to the internet, install a firewall as a basic line of defence against outside intruders.
Never surf the web from a server.  As the command centre for your entire network, a server typically stores critical business information.
Be smart about passwords.  Always use strong passwords that are at least eight characters long and a combination of lower and upper case letters, numbers and symbols. Don't use the same password repeatedly and make it a point to change your passwords frequently.
Create secure, original  passwords.  Creating unique passwords is one of the easiest ways for consumers to ensure their privacy and security online.
Avoid deceptive attempts to trick you into revealing credit card numbers, bank accounts, passwords or other personal information.
To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information.
Avoid Phishing  What is phishing? Phishing means sending an e-mail that falsely claims to be from a particular enterprise (like your bank) and asking for sensitive financial information. Phishing is sending out a 'bait' in the form of a spoofed e-mail that closely mimics most bank notifications. The fraudulent mail is socially engineered to convince recipients to divulge sensitive information such as credit card numbers, PIN, social security numbers and some such information as per the experts.
Practice basic e-mail and downloading "street smarts." Most viruses are transmitted as e-mail attachments.
Avoid opening e-mail attachments that contain ".vbs," ".scr," ".exe," or ".pif" file extensions. Files that end in these extensions are most likely to contain some sort of virus.
Be wary of e-mail messages that ask for personal or financial information such as user names and passwords, credit card numbers, and other sensitive personal information, especially those that are alarming and upsetting in tone.
Do not click any links inside an e-mail that is suspected to be spoofed. Instead, go directly to the valid company's site then log on from there or call the company directly.
Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers
Knowledge is still the best protection from getting scammed. It is important to educate oneself on Internet fraud.
Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers
Visit websites by typing the URL directly into the address bar. Make sure any site you reveal information to uses encryption.
Check credit card and bank statements routinely. Notify authorities if you suspect any abuses of your personal information.
To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information.
Keep your passwords strong, and keep them in your head.
BACK UP THE HARD DRIVE REGULARLY: Backing up files will not prevent exposure or damage from a virus but it can minimize the consequences.
INSTALL ANTI VIRUS SOFTWARE: Make sure that you have antivirus software installed and that it is up to date.
Don't share your password with anyone, and don't write it down - the only secure place for your password is in your head.
USE GOOD PASSWORDS: Use Good Passwords. Do NOT allow a password to be blank or empty.
SCAN EVERY FILE DOWNLOADED FROM THE INTERNET BEFORE USING OR OPENING IT:  Another way computers are infected is from files downloaded from the internet. If you scan every file every time immediately after it is downloaded, the risk of being infected is greatly reduced
BE WARY OF PUTTING YOUR DISK INTO OTHER COMPUTERS. If you use other computers such as a colleague’s computer, these computers may not be protected. Make sure you scan any disk that has been in another computer as soon as you insert it into your computer.
 
SCAN YOUR HARD DISK REGULARLY FOR VIRUSES.
Get anti-virus software. Use it. Keep it up to date.
If you can't trust the source you're downloading from, you can't trust the file.
Don't leave a computer you're logged into unattended or unprotected.
[object Object]
Oath by kids: I will not give out any personal information online without my parents' permission. This includes my name, phone number, address, e-mail, location of my school, my parents' work address/ telephone numbers and credit card numbers, and my picture. This goes for anywhere on the Internet, including e-mail, chat rooms, newsgroups - even Web sites that promise me free stuff or prizes, or on Web pages that I make myself.
When using the Internet, I will always use a pretend name or nickname that doesn't reveal whether I'm a boy or a girl.  Oath by kids:
When creating a password, I will make one up that is hard to guess but easy for me to remember. To avoid having it stolen, I will never reveal it to anyone (except my parents) - not even my best friend. Oath by kids :
I will not respond to any message that makes me uncomfortable. I will show an adult right away. Oath by kids:
I will arrange to meet a friend I have made on the Internet ONLY if one of my parents has been informed and will be present. Oath by kids:
I will not send an insulting or rude message to anyone online. This is called "flaming" and it is not good Netiquette.  Oath by kids:
I will not open e-mail, files, links, pictures or games from people that I don't know or trust. I will always ask an adult first.  Oath by kids:
What you need to worry about: Email frauds :  Emails that cheat you of huge sums of money by offering fantastic overseas financial schemes and promising great returns  nasty or obscene emails  People hacking into your account  People publishing your personal details (name, photograph, telephone numbers) on dating or pornographic sites without your consent  Identity theft: When people steal your personal information
THINGS YOU NEED TO WORRY ABOUT: Social engineering : When people trick you into revealing your password  Downloading files or attachments that may have  Trojans  (destructive programs that masquerade as benign applications)  Clicking on links that can pick up your personal details.  Losing money while shopping online
Precautions you can take: Email security: Be careful where you post/submit your email id on public forums. Share it only with known people.  Do not download attachments or files received through emails sent by unknown persons.
At a cyber café: Never surf from a cyber café if you are keying in any sensitive data. The computer may have a program running in the background that is storing all your information.  Be careful of inquisitive surfers around.  Always logout of all your messengers and any mailbox you have open, before you leave.
At home: Most companies regularly  release patches  for security holes in their software products. Always keep your operating systems and software you regularly use (like browsers, instant messengers, email programs, media players) updated by downloading these patches.  Never click on links that say, 'download software' unless you are absolutely sure of the content.  Never click on pop-ups that say, 'Click here for more information'
Better safe than sorry If you stick to the above principle, you can avoid most of the online dangers.
[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
Cyber safety
Cyber safetyCyber safety
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Phishing
PhishingPhishing
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
Rishab garg
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Phishing
PhishingPhishing
Phishing
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 

Viewers also liked

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
Rebecca Jones
 
Computer application in content areas
Computer application in content areasComputer application in content areas
Computer application in content areas
zulfiqaralibehan
 
Intro to Computers
Intro to ComputersIntro to Computers
Intro to Computers
Chole Resl
 
Computer application
Computer applicationComputer application
Computer application
Rahayatul Rahim
 
Digital professionalism
Digital professionalismDigital professionalism
Digital professionalism
Christopher Pell
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
b5thom
 
Ethics Presentation
Ethics PresentationEthics Presentation
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
fauzihayob
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
Lakshan Bamunusinghe
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
David Ramirez
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
Ei-Dyei Diata
 
Week 1 lesson 4 for Intro to tech class
Week 1 lesson 4 for Intro to tech classWeek 1 lesson 4 for Intro to tech class
Week 1 lesson 4 for Intro to tech class
rdubroy
 
1. intro to computers
1. intro to computers1. intro to computers
1. intro to computers
Rana Waqar
 
An intro to computers
An intro to computersAn intro to computers
An intro to computers
Vellalar College of Nursing
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
OLADIMEJI ADEKUNLE
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
aleeya91
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
poonam.rwalia
 

Viewers also liked (20)

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
Computer application in content areas
Computer application in content areasComputer application in content areas
Computer application in content areas
 
Intro to Computers
Intro to ComputersIntro to Computers
Intro to Computers
 
Computer application
Computer applicationComputer application
Computer application
 
Digital professionalism
Digital professionalismDigital professionalism
Digital professionalism
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Ethics Presentation
Ethics PresentationEthics Presentation
Ethics Presentation
 
3.0 computer ethic
3.0 computer ethic3.0 computer ethic
3.0 computer ethic
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Week 1 lesson 4 for Intro to tech class
Week 1 lesson 4 for Intro to tech classWeek 1 lesson 4 for Intro to tech class
Week 1 lesson 4 for Intro to tech class
 
1. intro to computers
1. intro to computers1. intro to computers
1. intro to computers
 
An intro to computers
An intro to computersAn intro to computers
An intro to computers
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation Computer Studies, Uses, Computer application and appreciation
Computer Studies, Uses, Computer application and appreciation
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Similar to Safe Computing

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
Tapan Khilar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Internet safety
Internet safetyInternet safety
Internet safety
jonathancallcott-efc
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
 
Cyber Security
Cyber SecurityCyber Security
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Do's and Dont's
 Do's and Dont's Do's and Dont's
Do's and Dont's
Prashant Gokhale
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
ITecksolutionsLLC
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
Jeannine Hamilton
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 

Similar to Safe Computing (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Do's and Dont's
 Do's and Dont's Do's and Dont's
Do's and Dont's
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 

More from Dr. Dheeraj Mehrotra (National Awardee)

200 wow teaching ideas
200 wow teaching ideas200 wow teaching ideas
Green School Initiatives
Green School InitiativesGreen School Initiatives
Green School Initiatives
Dr. Dheeraj Mehrotra (National Awardee)
 
Ai session for teachers- A must attend.
Ai session for teachers- A must attend.Ai session for teachers- A must attend.
Ai session for teachers- A must attend.
Dr. Dheeraj Mehrotra (National Awardee)
 
Ten ways to secure zoom
Ten ways to secure zoomTen ways to secure zoom
Social distancing in schools
Social distancing in schoolsSocial distancing in schools
Social distancing in schools
Dr. Dheeraj Mehrotra (National Awardee)
 
Learn wow models of strategic thinking
Learn wow models of strategic thinkingLearn wow models of strategic thinking
Learn wow models of strategic thinking
Dr. Dheeraj Mehrotra (National Awardee)
 
Learn about students quality circles
Learn about students quality circlesLearn about students quality circles
Learn about students quality circles
Dr. Dheeraj Mehrotra (National Awardee)
 
Tackling distractions within classrooms
Tackling distractions within classroomsTackling distractions within classrooms
Tackling distractions within classrooms
Dr. Dheeraj Mehrotra (National Awardee)
 
Digital skills for teachers
Digital skills for teachersDigital skills for teachers
Digital skills for teachers
Dr. Dheeraj Mehrotra (National Awardee)
 
How to be a rockstar teacher
How to be a rockstar teacherHow to be a rockstar teacher
How to be a rockstar teacher
Dr. Dheeraj Mehrotra (National Awardee)
 
Learn periodic table of happiness
Learn periodic table of happinessLearn periodic table of happiness
Learn periodic table of happiness
Dr. Dheeraj Mehrotra (National Awardee)
 
Life skills Session
Life skills SessionLife skills Session
Nlp for teachers
Nlp for teachersNlp for teachers
20 teaching ideas
20 teaching ideas 20 teaching ideas
21st century educator
21st century educator21st century educator
Enhancing Creativity in the classrooms
Enhancing Creativity in the classroomsEnhancing Creativity in the classrooms
Enhancing Creativity in the classrooms
Dr. Dheeraj Mehrotra (National Awardee)
 
Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !
Dr. Dheeraj Mehrotra (National Awardee)
 
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in AcademicsCCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
Dr. Dheeraj Mehrotra (National Awardee)
 
The schooling of the 21st century
The schooling of the 21st centuryThe schooling of the 21st century
The schooling of the 21st century
Dr. Dheeraj Mehrotra (National Awardee)
 
Top 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their studentsTop 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their students
Dr. Dheeraj Mehrotra (National Awardee)
 

More from Dr. Dheeraj Mehrotra (National Awardee) (20)

200 wow teaching ideas
200 wow teaching ideas200 wow teaching ideas
200 wow teaching ideas
 
Green School Initiatives
Green School InitiativesGreen School Initiatives
Green School Initiatives
 
Ai session for teachers- A must attend.
Ai session for teachers- A must attend.Ai session for teachers- A must attend.
Ai session for teachers- A must attend.
 
Ten ways to secure zoom
Ten ways to secure zoomTen ways to secure zoom
Ten ways to secure zoom
 
Social distancing in schools
Social distancing in schoolsSocial distancing in schools
Social distancing in schools
 
Learn wow models of strategic thinking
Learn wow models of strategic thinkingLearn wow models of strategic thinking
Learn wow models of strategic thinking
 
Learn about students quality circles
Learn about students quality circlesLearn about students quality circles
Learn about students quality circles
 
Tackling distractions within classrooms
Tackling distractions within classroomsTackling distractions within classrooms
Tackling distractions within classrooms
 
Digital skills for teachers
Digital skills for teachersDigital skills for teachers
Digital skills for teachers
 
How to be a rockstar teacher
How to be a rockstar teacherHow to be a rockstar teacher
How to be a rockstar teacher
 
Learn periodic table of happiness
Learn periodic table of happinessLearn periodic table of happiness
Learn periodic table of happiness
 
Life skills Session
Life skills SessionLife skills Session
Life skills Session
 
Nlp for teachers
Nlp for teachersNlp for teachers
Nlp for teachers
 
20 teaching ideas
20 teaching ideas 20 teaching ideas
20 teaching ideas
 
21st century educator
21st century educator21st century educator
21st century educator
 
Enhancing Creativity in the classrooms
Enhancing Creativity in the classroomsEnhancing Creativity in the classrooms
Enhancing Creativity in the classrooms
 
Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !
 
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in AcademicsCCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
 
The schooling of the 21st century
The schooling of the 21st centuryThe schooling of the 21st century
The schooling of the 21st century
 
Top 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their studentsTop 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their students
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Safe Computing

  • 1. Computing Ethics Towards Safe Computing By: Dheeraj Mehrotra www.computerscienceexpertise.com
  • 2.  
  • 3. Ensure you have the latest updates. Install updates and security patches on all servers, desktop and laptop PCs.
  • 4. Reduce the risk of viruses. There are numerous things you can do to protect your computer and your network against viruses. Using anti-virus software and keeping it current is the first step,
  • 5. Use Windows Security Centre to manage your settings. Get a clear picture of the security settings on your PC using the single, unified view provided in the Windows Security Centre.
  • 6. Download internet files from trusted sources only. If you're unsure if the files you want to download are safe, consider downloading them to a disk separate from your hard drive, such as a CD or floppy. Then you can scan the files with your virus scanner.
  • 7. Use password encryption to protect Office files. Improved encryption technology has strengthened password security in Word 2003 and Excel 2003 and extends password encryption to PowerPoint 2003. Look under the Tools menu in each of these three programs to activate password protection. This is an effective way to restrict access to confidential business information.
  • 8. Clean your hard drive before you discard a PC. If you're getting a new PC or notebook and your old one is being discarded, be sure to remove any sensitive business or personal information before you let it go. This doesn't mean simply deleting files and emptying your Recycle Bin. Your options include reformatting the hard drive or acquiring software that wipes it clean.
  • 9. Use a firewall. If your company uses always-on broadband to connect to the internet, install a firewall as a basic line of defence against outside intruders.
  • 10. Never surf the web from a server. As the command centre for your entire network, a server typically stores critical business information.
  • 11. Be smart about passwords. Always use strong passwords that are at least eight characters long and a combination of lower and upper case letters, numbers and symbols. Don't use the same password repeatedly and make it a point to change your passwords frequently.
  • 12. Create secure, original passwords. Creating unique passwords is one of the easiest ways for consumers to ensure their privacy and security online.
  • 13. Avoid deceptive attempts to trick you into revealing credit card numbers, bank accounts, passwords or other personal information.
  • 14. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information.
  • 15. Avoid Phishing What is phishing? Phishing means sending an e-mail that falsely claims to be from a particular enterprise (like your bank) and asking for sensitive financial information. Phishing is sending out a 'bait' in the form of a spoofed e-mail that closely mimics most bank notifications. The fraudulent mail is socially engineered to convince recipients to divulge sensitive information such as credit card numbers, PIN, social security numbers and some such information as per the experts.
  • 16. Practice basic e-mail and downloading "street smarts." Most viruses are transmitted as e-mail attachments.
  • 17. Avoid opening e-mail attachments that contain ".vbs," ".scr," ".exe," or ".pif" file extensions. Files that end in these extensions are most likely to contain some sort of virus.
  • 18. Be wary of e-mail messages that ask for personal or financial information such as user names and passwords, credit card numbers, and other sensitive personal information, especially those that are alarming and upsetting in tone.
  • 19. Do not click any links inside an e-mail that is suspected to be spoofed. Instead, go directly to the valid company's site then log on from there or call the company directly.
  • 20. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers
  • 21. Knowledge is still the best protection from getting scammed. It is important to educate oneself on Internet fraud.
  • 22. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers
  • 23. Visit websites by typing the URL directly into the address bar. Make sure any site you reveal information to uses encryption.
  • 24. Check credit card and bank statements routinely. Notify authorities if you suspect any abuses of your personal information.
  • 25. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information.
  • 26. Keep your passwords strong, and keep them in your head.
  • 27. BACK UP THE HARD DRIVE REGULARLY: Backing up files will not prevent exposure or damage from a virus but it can minimize the consequences.
  • 28. INSTALL ANTI VIRUS SOFTWARE: Make sure that you have antivirus software installed and that it is up to date.
  • 29. Don't share your password with anyone, and don't write it down - the only secure place for your password is in your head.
  • 30. USE GOOD PASSWORDS: Use Good Passwords. Do NOT allow a password to be blank or empty.
  • 31. SCAN EVERY FILE DOWNLOADED FROM THE INTERNET BEFORE USING OR OPENING IT:  Another way computers are infected is from files downloaded from the internet. If you scan every file every time immediately after it is downloaded, the risk of being infected is greatly reduced
  • 32. BE WARY OF PUTTING YOUR DISK INTO OTHER COMPUTERS. If you use other computers such as a colleague’s computer, these computers may not be protected. Make sure you scan any disk that has been in another computer as soon as you insert it into your computer.
  • 33.  
  • 34. SCAN YOUR HARD DISK REGULARLY FOR VIRUSES.
  • 35. Get anti-virus software. Use it. Keep it up to date.
  • 36. If you can't trust the source you're downloading from, you can't trust the file.
  • 37. Don't leave a computer you're logged into unattended or unprotected.
  • 38.
  • 39. Oath by kids: I will not give out any personal information online without my parents' permission. This includes my name, phone number, address, e-mail, location of my school, my parents' work address/ telephone numbers and credit card numbers, and my picture. This goes for anywhere on the Internet, including e-mail, chat rooms, newsgroups - even Web sites that promise me free stuff or prizes, or on Web pages that I make myself.
  • 40. When using the Internet, I will always use a pretend name or nickname that doesn't reveal whether I'm a boy or a girl. Oath by kids:
  • 41. When creating a password, I will make one up that is hard to guess but easy for me to remember. To avoid having it stolen, I will never reveal it to anyone (except my parents) - not even my best friend. Oath by kids :
  • 42. I will not respond to any message that makes me uncomfortable. I will show an adult right away. Oath by kids:
  • 43. I will arrange to meet a friend I have made on the Internet ONLY if one of my parents has been informed and will be present. Oath by kids:
  • 44. I will not send an insulting or rude message to anyone online. This is called "flaming" and it is not good Netiquette. Oath by kids:
  • 45. I will not open e-mail, files, links, pictures or games from people that I don't know or trust. I will always ask an adult first. Oath by kids:
  • 46. What you need to worry about: Email frauds : Emails that cheat you of huge sums of money by offering fantastic overseas financial schemes and promising great returns nasty or obscene emails People hacking into your account People publishing your personal details (name, photograph, telephone numbers) on dating or pornographic sites without your consent Identity theft: When people steal your personal information
  • 47. THINGS YOU NEED TO WORRY ABOUT: Social engineering : When people trick you into revealing your password Downloading files or attachments that may have Trojans (destructive programs that masquerade as benign applications) Clicking on links that can pick up your personal details. Losing money while shopping online
  • 48. Precautions you can take: Email security: Be careful where you post/submit your email id on public forums. Share it only with known people. Do not download attachments or files received through emails sent by unknown persons.
  • 49. At a cyber café: Never surf from a cyber café if you are keying in any sensitive data. The computer may have a program running in the background that is storing all your information. Be careful of inquisitive surfers around. Always logout of all your messengers and any mailbox you have open, before you leave.
  • 50. At home: Most companies regularly release patches for security holes in their software products. Always keep your operating systems and software you regularly use (like browsers, instant messengers, email programs, media players) updated by downloading these patches. Never click on links that say, 'download software' unless you are absolutely sure of the content. Never click on pop-ups that say, 'Click here for more information'
  • 51. Better safe than sorry If you stick to the above principle, you can avoid most of the online dangers.
  • 52.
  • 53.