Online Safety and Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

ONLINE

SAFETY AND
SECURITY
INTERNET as the Information
Superhighway
Anyone has access to this high way,
can place information and can grab
information. Any information, even
those you set privately can be access
in one way or another.
• BE MINDFUL OF WHAT YOU SHARE ONLINE
AND WHAT SITE YOU SHARE TO.
• DO NOT JUST ACCEPT TERMS AND
CONDITIONS; READ IT.
• CHECK OUT THE PRIVACY POLICY PAGE OF THE
WEBSITE TO LEARN HOW THE WEBSITE
HANDLES THE INFORMATION YOU SHARED.
• KNOW THE SECURITY FEATURES OF A SOCIAL
NETWORKING SITE YOU USE. BY KEEPING
YOUR PROFILE PRIVATE, SEARCH ENGINES
WILL NOT BE ABLE TO SCAN YOUR PROFILE.
• DO NOT SHARE YOUR PASSWORDS WITH
ANYONE
• AVOID LOGGING IN TO PUBLIC NETWORKS/
WIFI. USE INCOGNITO.
• DO NOT TALK TO STRANGERS WHETHER
ONLINE OR FACE TO FACE.
• NEVER POST ANYTHING ABOUT A FUTURE
VACATION.
• ADD FRIENDS YOU KNOW IN REAL LIFE.
• AVOID VISITING UNTRUSTED WEBSITES.
• INSTALL AND UPDATE AN ANTIVIRUS
SOFTWARE ON YOUR COMPUTER.
• IF YOU HAVE A WIFI AT HOME, MAKE IT A
PRIVATE NETWORK BY ADDING A PASSWORD.
• AVOID DOWNLOADING ANYTHING FROM
UNTRUSTED WEBSITES.
• BUY THE SOFTWARE; DO NOT USE PIRATED
ONES.
• DO NOT REPLY OR CLICK LINKS FROM
SUSPICIOUS EMAILS.
EXPLORE PRIVACY
POLICIES
Visit a social networking site and look
for a site’s privacy policy. The link is
typically found at the bottom of the page
and oftentimes labeled only as
“Privacy”. Write a summary on how the
website handles both your private and
public information.
INTERNET
THREATS
1. MALWARE (Malicious Software)
a. Virus
a malicious program designed to
replicate itself and transfer from one
computer to another either through the
internet and local networks or data storage
like flash drives and CDs.
b. Worm
a malicious program that transfers
from one computer to another by any type of
means. Often, it uses a computer network to
spread itself.
c. Trojan
a malicious program that is disguised
as a useful program but once downloaded or
installed, leaves your PC unprotected and
allows hackers to get your information.
*Rogue Security System- tricks the user into posting that
it is a security software. Asks the users to pay for security
improvement, but in reality, you’re not protected at all.
d. Spyware
a program that runs in the
background without you knowing it (Spy). It
is the ability to monitor what you are
currently doing and typing.
*Keyloggers- used to record the keystroke done by the
users. Usually done to steal passwords or any other sensitive
information types through keyboards.
e. Adware
a program designed to send you an
advertisement, mostly as pop-ups.
2. Spam
- Unwanted email mostly from bots or
advertisers. It can be used to send malware.
3. Phishing
- Its goal is to acquire sensitive personal
information like passwords and credit card
details.
Phishing is done by sending you an email
that will direct the user to visit a website and
be asked to update his/ her username,
password, credit card or personal
information.
* Pharming- a more complicated way of phishing
where it exploits the DNS (Domain Name Service)
System.

You might also like