Download presentation
Presentation is loading. Please wait.
Published byNicholas Ashley Houston Modified over 8 years ago
1
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
2
Learning Objectives The objectives of this module are to: To know how what a cyber attack is To know what can happen in a cyber attack To know how to protect yourself from cyber attacks To understand what shared and dedicated resources are
3
Learning Outcome By the end of the module, you are able to: Conditions where digital security breaches & attacks can happen Understand the effects of various kind of security breaches & attacks. Ways to get protect from security breaches & attacks. Important to safe guard digital safety and security. Shared Resources VS Dedicated Resources
4
What is Cyber Safety / E-Safety? Cyber safety or Electronic safety is being safe online. It is being careful about what you say and what you and about how other people or internet sites interact with you.
5
What is Cyber crime This is crimes committed by using a computer. Crimes committed by using technology. More and more crime is happening by using computers.
6
Digital Dangers When on the internet, we have to be careful of the following dangers; 1.Identity Theft - 2.Phishing e-mails 3.Hacker & Crackers 4.Cyber stalking 5.Cyber bully 6.Internet Predator and Pornography
7
Identity Theft The use of someone’s personal information without their permission. Damages not limited to just financial problems. It can leave a person feeling violated. Can cause emotional struggles. Damage your name. Result in illegal activities being associated with you.
8
Phishing Emails Junk or Spam Emails sent to email accounts. They are informing of important information. They are requesting personal information. Bank details, Addresses and username and logins. Opening such emails is very dangerous. Spyware gets installed which takes your personal information.
9
Hackers and Crackers Someone who can access your computer They get into your computer through WiFi or through a network. They can steal, your information, money, identity and personal data which can be lost forever.
10
Malware and Spyware Any technology that aids in gathering information about a person or organization without their knowledge. Sometimes occasionally installed just by visiting a Web site Drive by download Effects; Read your emails 1.Record your key strokes 2.Change your homepage 3.Read cookies 4.Install other software
11
Examples
14
Stolen Equipment Stolen of laptop, external hard disk, thumb drive, hand phone Old equipment still contained important information how to dispose them?
15
Protection 1.Online Banking – Access your account from a safe connection. Don't use public computers. Delete cache and cookies. Just do it at home. 2.Identity Theft – Never give out personal information, and make sure you know who you are giving your information to. Destroy documents with important information properly. 3.Phishing – Never give out information about your banking into an email. Your bank will ask you for your bank details. Never give your details over MSN or through the internet, only if you know it is safe.
16
Security breaches or Attacks 1. Firewall – always have it switched on and inform your programs 2. Anti-virus – Always have it installed and to protect you from worms. 3. Anti-spyware – Will protect you from pop ups and unwanted messages 4. Parental Control – You can set low to high control, it is used to filter out websites and bad words on Messenger sites. 5. Regular updates – This makes sure that you have the most up to date software installed. 6. Browser - Turn off scripting, pop-ups and ads in browser to block unwanted and possibly armful scripts. 7. Backup - If you regularly make backup copies of your files and keep them in a separate place, you can get some, if not all, of your information back in the event something happens to the originals on your computer
17
Security Breaches or Attacks Always use a good strong password, It must be; 1.Contain a mixture of characters 2.Upper case 3.Lower case 4.Numbers 5.Hard to guess 6.Change it regularly 7.Keep it a secret
18
Shared Network Areas A shared or Network area is an amount of space where multiple people have access to it. It is mainly used for sharing files between many users. It can also be remotely shared on the internet. Guidelines 1.Limit users to access certain areas. 2.Ensure users know how to use the network area 3.Ensure there is adequate software and hardware in place 4.Ensure users log off properly 5.Ensure users change their passwords 6.Ensure they don't share passwords 7.Make sure there a backup of the network
19
Knowledge Check 1.What is things must you do stay safe online ? 2.What should your password contain? 3. What is a shared or network area? 4.What is a firewall? 5.Name two features of a phishing email ? 6.What is Spyware ? 7. How do you protect yourself when using online banking ? 8. What is ID theft?
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.