PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

PORTFOLIO.  TYPE OF INTERNET TRANSACTION 1. ONLINE BANKING 2. ONLINE SHOPPING.
A guide in becoming a “Netizen” e-Access It is about understanding privilege of using electronic information as well as the right in having fair, safe.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY FOR STUDENTS
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
Company LOGO Internet Safety A Community Approach.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
E-ACCESS  An example of technology use in e- Access are : 1.Laptop 2.Tablet 3.handphone.
PREPARED BY : NURUL SHUHADA BINTI ASAT  E-commerce or online shopping means buying and selling of products or services over electronic system such as.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
1 citizen portfolio Presented by: Lim Xin Hui – SA11040 Hew Xin Lin – SB11019 Trainer: Encik Mohd Tarmizi Session: april 2012.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Ethical and Morality of Digital in 1 Malaysia WELCOME TO.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
E - ENTERPRISE PUAN NORIDAH BINTI ABU BAKAR CSC 434 SITI NADHRAH BINTI OTHMAN SPORT SCIENCE AND RECREATION /SR223 E – Enterprise is about business conducted.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
Technology..technology e-Access 1 Ni hao..friends.,I want to know. How can I find about Malaysia country?? 2 Ayoyo..so easy just read book la… 3 Book?oh,
GROUP : MOMENT SA’AD BIN SABAR FB MOHD NORSHAFIQ BIN MOHD PAUZI FB POSITIVE VALUES IN USING TECHNOLOGY.
E- Enterpris e. What is e- Enterprise??? Business conducted online using any Internet based application. Designed to educate on appropriate online buying.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
You. are at risk for the fastest growing crimes crime.
Internet Dangers Technology Communication Tools E-Literate.
E-Literate Muhammad Naimullah b. Badrulhisam
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
D IGITAL C ITIZENSHIP By Raquel Laliberty. Digital access is the equal ability for people in different countries and societies to access digital technology.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Digital $$ Quiz Test your knowledge.
Communicating in the IT Industry
Presentation transcript:

PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA 11025

E-ACCESS E-access is about understanding th eprivilege of using electronic device as well as the right to having equal, secure and reliable access. Several ways of gaining access to Internet: ◦Modem ◦Public Internet services ◦Open and paid Wi-Fi Wireless Internet Access ◦Cellular phones and PDAs

E-ACCESS Instilling the right attitude ◦Appreciate the digital facilities ◦Being responsible when sharing knowledge and information Equal opportunities for the disabled ◦Motor impairments – use keyboard commands instead of the mouse ◦Visual impairments – enlarge or enhance the area of focus ◦Language and cognitive disabilities – design layouts in the most simple and straightforward way possible. ◦Hearing impairments – include the visual forms in all auditory information

E-LITERATE E-literate is the ability to use technology ang knowing when, when not and how to use it appropriately. Digital literacy applications ◦Web 2.0 ◦Instant messanging (IM) ◦Online application

E-LITERATE How to tell if a web page is secure ◦If a website begins its URLs with “https”, which means that the website provides a secure connection for users. ◦All secure websites have a “lock” icon somewhere on the screen.

E-RULE E-rule defines as governing communication and technology use including respect for ownership and authorship. Cyber crimes ◦Internet banking fraud ◦Harassment ◦Intellectual property infringement ◦Intrusion ◦Offenses

E-RULE Reasons for cyber crime ◦For pursuit of fame and to gain reputation for intelligence or brilliance ◦Purely out of mischief ◦For financial means ◦To get revenge ◦To signal some form of protest ◦Purely to pursue criminal activities ◦To steal identity ◦To forge documents and messages

E-RULE Effects of cyber crime ◦Loss of revenue/profits ◦Waste of valuable time ◦Damaged reputations ◦Reduced productivity Property infringements and legal rights ◦Software piracy ◦Freeware and shareware

E-SAFETY E-safety is about measures and best practices for Netizens to guard their personal safety and the security of their networks. Internet dangers ◦Internet threats can come in various forms ◦The Internet can create the illusion that strangers are actually “friends” ◦The Internet can damage your reputation

E-SAFETY Common forms of digital security breach ◦Identity theft ◦Phishing s ◦Hacker and cracker ◦Cyber stalking ◦Cyber bullying ◦Internet predator Shared resources & Dedicated resources ◦Shared resources refer to devices or information on a computer that can be shared or accessed by many users ◦Dedicated resources refer to a direct connection between a terminal and a service, network, or computer to the specific use of a particular user.

E-SAFETY How to permanently erase the data from your old computer? ◦Dismantle the computer or laptop ◦Take out hard drive ◦Physically destroy the hard drive

E-ENTERPRISE E-enterprise is about business conducted online using any Internet-based application. Types of Internet Transactions ◦E-commerce/Online shopping ◦Online banking The issues when conducting Transactions over the Internet ◦Credit card fraud ◦Impulse buying

E-ENTERPRISE Tips to online shopping ◦Shop around. There might be another great deal somewhere else ◦Make sure you know the trader’s full details. Those details can be used as backup information if you need to lodge a fraud report. ◦Look for websites that provide a secure payment ◦Double-check whether the company has a privacy statement that tells you what they will do with your personal information ◦Protect your privacy. Do not simply disclose your personal details

E-ENTERPRISE Tips to ensure a secure online transaction ◦Keep your passwords, personal identification number (PIN) and card numbers confidential ◦Look for the lock icon ◦Use a firewall ◦Install security updates

E-ENTERPRISE Tips to avoid credit card fraud ◦Keep your credit cards safe ◦Shred all documents with your credit card details on it ◦Don’t sign blank credit card receipts ◦Avoid giving out your credit card information ◦Be cautious when using your credit card online ◦Immediately report lost or stolen credit cards ◦Never leave your credit card to someone else ◦Check your credit card statement thoroughly before making payment

E-ENTERPRISE Tips to avoid becoming an impulsive buyer ◦Be aware of how much money you spend ◦Think twice before making a purchase ◦Set your objectives each time you go for online shopping

REFERENCE 1 CITIZEN MODULE ◦STUDENT QUICK REFERENCE