Ethical, Safety and other issues when using the Internet 10.1.5Displays a knowledge of networking in terms of user- access. 10.2.4Demonstrates responsible.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Introduction to Student Name Student Class.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Policies and Security for Internet Access
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Managing Windows Security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Stay Safe While Using The Internet
Computer Security.
9 ways to avoid viruses and spyware
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible communication styles Explains the responsible use, purpose and significance of any new computer developments. Textbook: Module 2.4

Spam Spam is that you did not request and it contains advertising – usually quick ways to make money, sell cheap software, etc. How to minimise receiving spam  Contact your ISP and ask them to filter spam  Do not give your address out to everyone  Use antivirus software that has spam filtering

Hoaxes Often messages that you receive are hoaxes and contain untruths. Most are not meant to be malicious. Often they encourage you to send them on otherwise “bad” things will happen to you.

How to protect yourself from hoaxes Never accept things at face value Learn to recognise an urban legend If you recognise a message to be a hoax, delete it and end a message back to the sender warning them Never delete files from your computer when you have been told to do so in an message Check the validity of suspect messages on sites that are available on the Internet

Phishing Phishing is the sending of an message claiming to be from a legitimate organisation such as a bank. In the they request that you give personal information such as your passwords and PIN as they are “checking” your information.

Phishing How to protect yourself  Never give out personal information using  Always check with a bank if they are actually asking for information

Spyware Spyware is software that is installed on a user’s computer without their knowledge. It is used to obtain information and personal details about the person. Consider installing anti- spyware software to protect your computer.

Cookies A computer cookie is a small text file that is automatically saved on your computer by a website. Cookies are given out by sites that you logon to often to make the logon process simpler. This is not always a good idea. Many sites want to know what your interests are and what types of pages you visit so they can target there advertising accordingly. Cookies are not dangerous and will not harm your computer.

Viruses A virus is a program that is written intentionally to disrupt the normal functioning of a person’s computer without the person’s permission or knowledge. Your computer can get infected in the following ways:  By infected attachments in an  Downloading infected files from the Internet  From a file stored on a stiffy disk or other media

How to protect your computer against viruses Make sure you have a reliable antivirus software package installed and that you update the virus definitions regularly. Examples of antivirus software include Norton’s AntiVirus, PC-Cillin, Avast and McAfee. Never open from people you do not know. Set your anti-virus software to scan incoming and outgoing . Be careful when opening an attachment. Rather scan it before you open it. Avoid pirated software. Scan files stored on portable media such as stiffies, flash drives and CDs before using them.

Netiquette Netiquette (Internet + Etiquette) is the use of good manners when communicating using the Internet. There are various rules that you need to follow so that you do not offend anyone.

User-access Issues Restrictions on access to data/information  Different rights are given to users in a network so that access to the data is restricted for people who should not have access Access controls  Every user should be given a user name and a password

The role of networking software The network software controls the access to information When a user logs on, the software authenticates the user against the data base and lets valid users logon