SlideShare a Scribd company logo
The more you use the Internet, the more important it is to be
sure that you are able to manage your security online. The
UK loses billions every year to e-criminals. The following are
some key points to note:
Anti-Virus/ Anti-Spyware
Everyone using the Internet, whether on their iPad,
smart phone or pc needs to have good anti-virus
and anti-spyware programmes or apps. Keep these
updated!. Believe it or not, it is possible to get
viruses on smart phones, tablet pcs and jail-broken
iPhones too! A good firewall will help too.
Fraping and Identity Theft
Fraping is when a friend or family member pretends to be you and uses your Facebook
account to posts funny updates! To prevent fraping, or someone hacking your identity,
always log off after using services like email, Pinterest, Amazon, Facebook, Twitter,
Foursquare etc. Also use hard to guess passwords, and never share these with
your friends.
Dodgy Files and Downloads
Never open emails with strange subject lines or from people you do not know. Similarly
never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger
programmes, Skype, email or similar services. Some malware also gets bundled with
software you download, so always read the fine print, before clicking ‘Agree’, and only
download programmes from trusted websites for example
Wireless Network Security
If you have a wireless network, password protect it, make it invisible, change the default
router password, and use ‘machine level’ filtering to limit access to your wireless
network to specific devices. These settings can be customised by logging onto your
router. Whilst not foolproof, these steps will reduce the possibility of misuse.
Update your Operating System and Software
Your pc or smart phone comes with an operating system. Over time, developers make
changes to this and will offer security and other updates, which you should always carry
out. Keep any apps/ programmes you install updated too! For updates to the Windows
operating system, see:
Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0
http://www.tucows.com
http://windowsupdate.microsoft.com
e-Securitye-Security
http://creativecommons.org/licenses/by-nd/3.0/
www.wisekids.org.uk
Backup
Using a good external hard disk, or an online 'cloud-based' storage service (examples:
Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com,
SpiderOak: http://www.spideroak.com), always backup your data – this could be
coursework, emails, photos, videos or any content which you have created.

More Related Content

What's hot

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Leelet1121
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus
VirusVirus
Virus
CHITRA S
 
spyware
spyware spyware
spyware
maaza mohammed
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
Naval OPSEC
 

What's hot (19)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
spyware
spyware spyware
spyware
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Computer security
Computer securityComputer security
Computer security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 

Similar to WISE KIDS Leaflet: eSecurity

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
Khalil Jubran
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Devku45
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
Safe Computing
Safe ComputingSafe Computing
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Nicholas Davis
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
4Freedom Mobile
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
ARUN REDDY M
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 

Similar to WISE KIDS Leaflet: eSecurity (20)

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
M
MM
M
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Secure End User
Secure End UserSecure End User
Secure End User
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 

More from WISE KIDS

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and Safety
WISE KIDS
 

More from WISE KIDS (14)

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright Matters
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and Safety
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 

WISE KIDS Leaflet: eSecurity

  • 1. The more you use the Internet, the more important it is to be sure that you are able to manage your security online. The UK loses billions every year to e-criminals. The following are some key points to note: Anti-Virus/ Anti-Spyware Everyone using the Internet, whether on their iPad, smart phone or pc needs to have good anti-virus and anti-spyware programmes or apps. Keep these updated!. Believe it or not, it is possible to get viruses on smart phones, tablet pcs and jail-broken iPhones too! A good firewall will help too. Fraping and Identity Theft Fraping is when a friend or family member pretends to be you and uses your Facebook account to posts funny updates! To prevent fraping, or someone hacking your identity, always log off after using services like email, Pinterest, Amazon, Facebook, Twitter, Foursquare etc. Also use hard to guess passwords, and never share these with your friends. Dodgy Files and Downloads Never open emails with strange subject lines or from people you do not know. Similarly never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger programmes, Skype, email or similar services. Some malware also gets bundled with software you download, so always read the fine print, before clicking ‘Agree’, and only download programmes from trusted websites for example Wireless Network Security If you have a wireless network, password protect it, make it invisible, change the default router password, and use ‘machine level’ filtering to limit access to your wireless network to specific devices. These settings can be customised by logging onto your router. Whilst not foolproof, these steps will reduce the possibility of misuse. Update your Operating System and Software Your pc or smart phone comes with an operating system. Over time, developers make changes to this and will offer security and other updates, which you should always carry out. Keep any apps/ programmes you install updated too! For updates to the Windows operating system, see: Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0 http://www.tucows.com http://windowsupdate.microsoft.com e-Securitye-Security http://creativecommons.org/licenses/by-nd/3.0/ www.wisekids.org.uk Backup Using a good external hard disk, or an online 'cloud-based' storage service (examples: Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com, SpiderOak: http://www.spideroak.com), always backup your data – this could be coursework, emails, photos, videos or any content which you have created.