Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethical, Safety and other issues when using the Internet 10.1.5Displays a knowledge of networking in terms of user- access. 10.2.4Demonstrates responsible.

Similar presentations


Presentation on theme: "Ethical, Safety and other issues when using the Internet 10.1.5Displays a knowledge of networking in terms of user- access. 10.2.4Demonstrates responsible."— Presentation transcript:

1 Ethical, Safety and other issues when using the Internet 10.1.5Displays a knowledge of networking in terms of user- access. 10.2.4Demonstrates responsible communication styles. 10.3.11Explains the responsible use, purpose and significance of any new computer developments. Textbook: Module 2.4

2 Spam Spam is e-mail that you did not request and it contains advertising – usually quick ways to make money, sell cheap software, etc. How to minimise receiving spam  Contact your ISP and ask them to filter spam  Do not give your e-mail address out to everyone  Use antivirus software that has spam filtering

3 Hoaxes Often e-mail messages that you receive are hoaxes and contain untruths. Most are not meant to be malicious. Often they encourage you to send them on otherwise “bad” things will happen to you.

4 How to protect yourself from hoaxes Never accept things at face value Learn to recognise an urban legend If you recognise a message to be a hoax, delete it and end a message back to the sender warning them Never delete files from your computer when you have been told to do so in an e-mail message Check the validity of suspect messages on sites that are available on the Internet

5 Phishing Phishing is the sending of an e-mail message claiming to be from a legitimate organisation such as a bank. In the e-mail they request that you give personal information such as your passwords and PIN as they are “checking” your information.

6 Phishing How to protect yourself  Never give out personal information using e-mail  Always check with a bank if they are actually asking for information

7 Spyware Spyware is software that is installed on a user’s computer without their knowledge. It is used to obtain information and personal details about the person. Consider installing anti- spyware software to protect your computer.

8 Cookies A computer cookie is a small text file that is automatically saved on your computer by a website. Cookies are given out by sites that you logon to often to make the logon process simpler. This is not always a good idea. Many sites want to know what your interests are and what types of pages you visit so they can target there advertising accordingly. Cookies are not dangerous and will not harm your computer.

9 Viruses A virus is a program that is written intentionally to disrupt the normal functioning of a person’s computer without the person’s permission or knowledge. Your computer can get infected in the following ways:  By infected attachments in an e-mail  Downloading infected files from the Internet  From a file stored on a stiffy disk or other media

10 How to protect your computer against viruses Make sure you have a reliable antivirus software package installed and that you update the virus definitions regularly. Examples of antivirus software include Norton’s AntiVirus, PC-Cillin, Avast and McAfee. Never open e-mail from people you do not know. Set your anti-virus software to scan incoming and outgoing e-mail. Be careful when opening an e-mail attachment. Rather scan it before you open it. Avoid pirated software. Scan files stored on portable media such as stiffies, flash drives and CDs before using them.

11 Netiquette Netiquette (Internet + Etiquette) is the use of good manners when communicating using the Internet. There are various rules that you need to follow so that you do not offend anyone.

12 User-access Issues Restrictions on access to data/information  Different rights are given to users in a network so that access to the data is restricted for people who should not have access Access controls  Every user should be given a user name and a password

13 The role of networking software The network software controls the access to information When a user logs on, the software authenticates the user against the data base and lets valid users logon


Download ppt "Ethical, Safety and other issues when using the Internet 10.1.5Displays a knowledge of networking in terms of user- access. 10.2.4Demonstrates responsible."

Similar presentations


Ads by Google