Presentation on theme: "STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA EMAIL LINKS 2.NEVER REVEAL YOUR PIN."— Presentation transcript:
SAFE ONLINE BUYING. 1. Look for signs that the business is legitimate Buy from reputable stores and sellers. Here are some ways to check: Find out what other shoppers say. Sites like Epinions.com or BizRate have customer evaluations which can help you determine a company's legitimacy.Epinions.comBizRate Look for third-party seals of approval. Companies can put these seals on their sites if they abide by a set of rigorous standards such as how personal information can be used. Two seals to look for:
2.LOOK FOR SIGNS THAT THE WEBSITE PROTECTS YOUR DATA On the web page where you enter your credit card or other personal information, look for an "s" after http in the web address of that page (as shown below). (Encryption is a security measure that scrambles data as it traverses the Internet.) Also make sure there is a tiny closed padlock in the address bar, or on the lower right corner of the window.
3.USE A FILTER THAT WARNS YOU OF SUSPICIOUS WEBSITES Browser filters warn you about reported phishing sites and block you from visiting them. For example, two browser filters are the Smart Screen Filter in Internet Explorer 8 and the Phishing Filter in Internet Explorer 7.
Common Forms of Digital Security Breach. 1.Identity Theft 3.Hacker and Cracker 4. Cyber Stalking 5.Cyber Bullying 6.Internet Predator 2.Phishing Emails
Conclusion As a conclusion, internet may become good or bad to users. Precaution and general knowledge in internet is very important to stay safe while surfing.
The End Credit to: http://jan-gephardt.blogspot.com/2011/12/are-we-on-digital-overload.html http://jan-gephardt.blogspot.com/2011/12/are-we-on-digital-overload.html http://www.thepunch.com.au/tags/bullying/ http://www.thepunch.com.au/tags/bullying/ http://sushantskoltey.wordpress.com/2010/02/22/system-hack-crack/ http://sushantskoltey.wordpress.com/2010/02/22/system-hack-crack/ http://financialideas-problems-solutions.blogspot.com/2010/12/avoid-identity-theft.html http://financialideas-problems-solutions.blogspot.com/2010/12/avoid-identity-theft.html http://www.social-engineer.org/social-engineering/cyber-stalking-and-smart-phones- making-social-engineering-easier/attachment/stalkingsign/ http://www.social-engineer.org/social-engineering/cyber-stalking-and-smart-phones- making-social-engineering-easier/attachment/stalkingsign/ http://blog.malaysiaonlinestore.com/index.php/8-tips-for-safe-online-shopping/ http://blog.malaysiaonlinestore.com/index.php/8-tips-for-safe-online-shopping/ http://www.thecolor.com/category/coloring/great%20inventions.aspx http://www.thecolor.com/category/coloring/great%20inventions.aspx