Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
107 views39 pages

L2 Online Safety

- The internet provides many benefits but also poses dangers like hacking, malware, and identity theft. It is important for individuals and organizations to take steps to browse safely and securely such as keeping software updated, using caution when downloading files or clicking links, and protecting private information. - There are various types of online threats like computer viruses, spyware, phishing scams, and Trojan horses that can steal data or harm devices. Using security measures like antivirus software, firewalls, and VPNs can help safeguard devices and sensitive information from these cyber threats. - When browsing the web, being aware of suspicious pop-ups and ads and verifying website URLs start with "HTTPS" can help avoid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views39 pages

L2 Online Safety

- The internet provides many benefits but also poses dangers like hacking, malware, and identity theft. It is important for individuals and organizations to take steps to browse safely and securely such as keeping software updated, using caution when downloading files or clicking links, and protecting private information. - There are various types of online threats like computer viruses, spyware, phishing scams, and Trojan horses that can steal data or harm devices. Using security measures like antivirus software, firewalls, and VPNs can help safeguard devices and sensitive information from these cyber threats. - When browsing the web, being aware of suspicious pop-ups and ads and verifying website URLs start with "HTTPS" can help avoid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

ONLINE SAFETY

AND SECURITY
ONLINE SAFETY AND SECURITY

-The Internet is a powerful tool for learning and communicating with


people. However, there are many dangers that you must out for.

-Every organization relies on the internet to some degree or another for


communications, transactions, payments, and data access. Unfortunately,
however, the internet has also become a channel of choice for criminals
to commit financial and other crimes. Your organization must take
precautions to protect itself.
HACKING

• Definition: Hacking is an attempt to exploit a computer system or a private


network inside a computer. Simply put, it is the unauthorized access to or
control over computer network security systems for some illicit purpose.
BE SAFE

• When you are reading email or browsing online, be on the lookout for
suspicious links and deceptive web pages which are major sources of
malware. Also be careful selecting browser plug in, apps or other
downloadable files since they can introduce new vulnerabilities. Here are
some suggestions to make your day-to-day online browsing more productive,
safe and secure.
HYPERTEXT TRANSFER PROTOCOL

• HTTP functions as a request–response protocol in the client–server computing


model. A web browser, for example, may be the client and an application
running on a computer hosting a website may be the server. The client submits
an HTTP request message to the server. The server, which
provides resources such as HTML files and other content, or performs other
functions on behalf of the client, returns a response message to the client. The
response contains completion status information about the request and may
also contain requested content in its message body.
HYPERTEXT MARKUP LANGUAGE (HTML)

• is the standard markup language for documents designed to be displayed in


a web browser. It can be assisted by technologies such as Cascading Style
Sheets (CSS) and scripting languages such as JavaScript.
• Web browsers receive HTML documents from a web server or from local
storage and render the documents into multimedia web pages. HTML
describes the structure of a web page semantically and originally included
cues for the appearance of the document.
HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)

• is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure


communication over a computer network, and is widely used on the Internet.[1][2] In
HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS),
or, formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore
also often referred to as HTTP over TLS,[3] or HTTP over SSL. Historically, HTTPS
connections were primarily used for payment transactions on the World Wide Web,
e-mail and for sensitive transactions in corporate information systems.[citation
needed] Since 2018,[5] HTTPS is used more often by web users than the original non-
secure HTTP, primarily to protect page authenticity on all types of websites; secure
accounts; and keep user communications, identity, and web browsing private.
KEEP YOUR BROWSER
SOFTWARE UP-TO-DATE
• Be sure to install anti-virus updates and regularly check for and install
browser plug-in Example. Adobe flash player, and java updates
• Be more secure! Make sure a URL includes HTTPS before entering any
personal information.
• When in doubt, ignore. Don't click on pop-up windows or extraneous ads.
SECURED BROWSING WITH INCOGNITO
EXAMPLES OF POP-UP ADS
KEEP YOUR PRIVATE
INFORMATION SAFE

• Use a strong, unique password or passphrase for each account and avoid
storing account information on a website. Consider using separated browsers
for sensitive log ins and general web browsing.
USE PRIVATE NETWORK FOR
SENSITIVE TRANSACTIONS

• Virtual private network (VPN). Extend of private network across a public


network, and enables users to send and receive data across shared or public
network as if their computing devices were directly connected to the private
network.
• Application running across a vpn may therefore benefit from the functionality,
security, and management of the private network. Vpn technology was
developed to allow remote users and branch offices to securely access
corporate applications and other resources.
• Go stealth when browsing. Your browser can store quite a bit information
about your online activities including caches pages and history. To ensure the
privacy of personal information online limit access by going "incognito" and
using the browser's private mode.
DIFFERENT DANGERS ON THE
INTERNET
EMAIL SPAM

• Also known as junk email, it is usually unsolicited commercial email sent from
one source with identical message sent to multiple recipients. Although some of
them are not harmful, deleting them one by one will eat up your time and can
clog your email. Dangerous spams carry virus like Trojan horse and other
malicious software (malware). Spammer is the term used to refer to a person
who creates electronic spam. Spamming is projected to continue because it is
a cheap means of advertising. In addition, many countries do not have laws to
punish spammers.
EMAIL SPOOFING

• This refers to deceitful email practice in which the sender address is changed,
so that it would appear to have come from a different source usually someone
you know. Usually, the reply to address is the source of the email, and when
you unknowingly reply to it to you would be replying to the one who spoofed
you. Email spoofing is usually used by spammers to hide the origin of the
spam.
PHISHING

• This is a deceitful practice of trying to get confidential information such as


passwords and usernames, and credit card details by making it appears as if
it comes from a trustworthy source. Phishing is usually done by email or other
similar means using a popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions to lure you to their website. Internet users
would think that they are accessing a genuine website and through this way, a
phisher would be able to gather insensitive information from internet account
user.
PHARMING

• This is a dangerous hacker attack on a website which directs all traffic to that
web site to another fictitious website. The main object of pharming is to obtain
username and passwords, as well as credit card and financial information,
and use these to steal their money electronically or use the credit card of the
victims. Pharming is a major concern of many onlne banking and electronic
commerce transactions, which would compromise many of their clients accounts
as well as the business. Antivirus and anti-spyware software cannot prevent
and protect one from pharming.
SPYWARE

• This is a computer program that is installed covertly on a personal computer to


collect information or even take control over the computer without knowledge
of the user. A spyware program would be able to monitor and collect
information about the user and his internet habits and practice. It is known that
spyware programs also affect the performance and settings of the computer.
Major antivirus companies have incorporated in their products anti-spyware
programs for a fee, and some are free. But you must be careful which one to
use to ensure protection.
COMPUTER WORM

• This is a dangerous computer program that replicates itself through a network. Some
worms delete files, others disrupt the network function and still, others send junk mail
from infected computer. Computer worm usually spreads by exploiting weaknesses in
operating system, and manufacturers of this spyware regularly send free updates to
clients to prevent the spread of the worms. They usually spread on their own without
attaching to a program or file. Users should not run attachments or open emails from
unknown or suspicious sources, delete them immediately. Anti-virus, anti-spyware, and
use of firewall helps to prevent worm attacks, but it must be updated regularly to
ensure current prevention and control.
ANTI-WORM

• (sometimes helpful worm) is a computer worm designed to do something that its


author feels is helpful, though not necessarily with the permission of the executing
computer's owner. The concept of the "anti-worm", or "helpful worm", is a proactive
method of dealing with virus and computer worm outbreaks. This type of worm
delivers its payload by doing helpful actions instead of malicious actions. Just like
malicious computer worms, anti-worms reach computers by scanning IP ranges and
placing a copy of themselves on vulnerable hosts. The anti-worm then patches the
computer's vulnerability and uses the affected computer to find other vulnerable
hosts. Anti-worms have the ability to spread just as fast as regular computer worms,
utilizing the same "scan, infect, repeat" model that malicious computer worms use.
TROJAN HORSE

• This is a form of malicious software (malware) fronting to perform a good


task, but covertly performs undesirable function with the intention of entering
the computer without the users consent. Once the malware is installed in the
computer, the Trojan Horse can disable the computers defenses opening it to
unauthorized entry. It can erase data, can allow access of the victims
computer, can corrupt files, and can be used in phishing for bank accounts.
Regularly updated antivirus and anti-spyware programs can detect Trojan
Horse and can delete them.
COMPUTER VIRUS

• This is a program that duplicates itself and then infects the computer. It spreads like
the real biological virus, wherein it attaches itself to a host program and infect other
computers if it received by a computer through the internet. The virus can also be
transferred by the use of removable storage media such as diskette, CD, flashdrives,
memory cards and others. Damage by the computer virus may be mild to severe.
Data loss and crippled functionality of the computer have created specialist to
combat deadly computer viruses. Many antivirus programs are effective against the
threats, but should be regularly updated to remain successful in prevention and fight
against these computer viruses.
HACKER

• This is a person who is able to enter and control other people’s computer
without authorization. A hacker is able to enters another computer, usually
vandalizes the victims website, steals personal information, obtains intellectual
property, and performs credit card fraud. Firewall are able to prevent entry
by hackers.
WINDOWS SECURITY

• It is sometimes necessary to protect important work and personal information


stored in the computer. There are also situations that you want to prevent
other people from using your computer. Imagine if you have worked on a
project for a several hours and days, and then one day, you found out that it
was deleted by someone else by accident. Microsoft Windows has security
features that determine who can use and have access to your computer.
CHANGING AND ADDING USER ACCOUNTS

• Windows operating system provides user accounts in your operating system to


determine and manage the different kinds of users in one computer. This is to ensure
the security and privacy of each user who will use the computer.
• To open the user accounts:
• Go to Control panel.
• Look for “User Accounts”
• In the User Accounts window you will see tasks that you can do with your account.
• To edit your account:
• Open user accounts in the control panel.
• In the Pick a task, select change an account.
• Pick an account to change.
• You may find the different kinds of accounts as, follows:
• Computer Administrator – controls all the contents and users of the computer,
installs programs, adds and deleted users.
• Limited Account – has limited control and only have access to his and her
particular account.
• Guest – accounts created for transient users and do not have access to the
other computer accounts and their content.
• Once you are in the account, you can pick any change that you like:
• Change my account name – If you want to change your name displayed in
your account.
• 2. Create a password – provides security to new accounts or accounts without
existing password
• 3. Change my password – gives security to your account by changing a
previously created password.
• 4. Remove my password – you may remove an existing password if you
decide to do so.
• 5. Change my picture – you can change your picture displayed beside your
name.
• 6. Change my account type – you can set an account either as computer
administrator or limited.
CREATING A NEW PASSWORD

• Creating a new password requires you to have a user name first. Once that is
created, click on Create a Password and a dialog box will appear and will
require you to type in a new a password and retype it to confirm on the next
line. You will be asked to type a word or phrase to help you remember your
password in case you forget it later on. When creating a password, be aware
that it is a case sensitive, this means that the letter are capital or small must be
typed as they are when you enter them first time. Otherwise, you will not be
able to open the computer using your account name.
CREATING A SECURE PASSWORD

• The password that you create should at least eight characters which could be
a combination of uppercase and lowercase letters, symbols and numbers. A
secure password ideally should not be a real word that anyone can easily
guess. Make sure to remember the password by writing it and keeping it in a
safe place or creating a password hint.
SCREEN SAVER SECURITY

• Most operating system has a feature that allows you to lock the computer
even when the computer is in a screen saver mode. This means that, even if
your computer is open, no one will be able to access your computer account
from a screen saver mode.
SECURITY CENTER

• The Security center of Windows is the place where you can set an additional protection from
threat to your computer, especially when using the internet.There are three important security
settings available; Firewall, Automatic Updates and Virus Protection
• 1. Firewall – helps in protecting your computer from unauthorized entries, viruses, or worms
from the internet or network. It is recommended that you keep this settings turn on. Windows
Firewall, however, allows some exception to programs and services that helps some
application programs to work better, as well as sites that you trust. A selection box which says
Don’t allow exceptions is available. When this box is checked, all incoming programs will be
blocked. This is important when you are connected on a public WIFI Internet connection where
security is less secure.
• 2. Automatic Updates – is another feature of windows which when turned on
will automatically download updates from Microsoft Windows website. Many
of the updates coming from Microsoft are usually meant to update some
windows features, secure areas of vulnerability, fix any bugs in operating
system and others.
• 3. Virus Protection – is usually about the current anti virus software installed in
your computer; this option is recommended to be turned on always. Antivirus
software meant to locate, find and remove virus threats that are already in
your computer. It also prevents other malware (malicious software) gaining
entry into your computer. Anti Virus program should ne constantly updated to
ensure that its Anti virus definition
• When you open the anti virus program, you will see settings and prompts that
you can adjust activate and fix. In the antivirus window below, you will find the
length of subscription, protection status, last date it was updated and the last
time the computer was scanned. There is also summary reports or logsd for all
security activities. If you are always using internet, it is recommended that you
install the Anti virus with internet security; it has lot of PC protection aside
from Anti Virus packed into it.
ONLINE ETHICS AND ETIQUETTE

• Guidelines and rules are needed in the appropriate use of computer technology.
There are both advantages and disadvantages in the use of computers. The Ten
Commandments of Computer Ehtics is meant as guide to the right attitude when using
the computer. The Ten Commandments of Computer Ethics was written by Dr. Ramon
C. Barquin in 1992 for the Computer Ethics Institute. He wrote a paper entitled “In
Pursuit of a Ten Commandement for Computer Ethics”., Ramon C. Barquin stated that
it is a means to create a set of standards to guide and instruct people on the ethical
use of computers. The Ten Commandments of Computer Ethics copies the style of the
Ten Commandments from Bible which use “thou shalt” and “thou shall not” style of
writing.
The Commandments for Computer Ethics
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people computer work.
3. Thou shall not snoop around in other peoples files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false.
6. Thou shall not use or copy software which you have not paid.
7. Thou shall not use other people’s computer resources without authorization.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program you write.
10.Thou shall use a computer in ways that show consideration and respect.
END OF PRESENTATION!!!

You might also like