SlideShare a Scribd company logo
1 of 22
“E-safety” “Cyber safety”
“Online safety”
In simple terms, internet safety refers to
the act of staying safe online.
In simple terms, internet safety refers to
the act of staying safe online.
In simple terms, internet safety refers to
the act of staying safe online.
Do you consider the potential danger(s)
which exist on the web, most especially
for our children?
What are the risks?
R I S K S
Cybercrimes, Online Bullying,
Online Predator, Device Addiction,
Mental Health and Wellbeing, the
type of content they are viewing
and what they are posting online.
R I S K S
Fake News and Impact on our
children’s behavior. Online
Gaming addiction and certain
features of online gaming are
categorized as gambling.
Top 10
Internet Safety
Rules
1. Keep Personal Information Professional and Limited
Potential employers or customers don't need to know your personal relationship status or your
home address.
2. Keep Your Privacy Settings On
Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing
and social media usage.
3. Practice Safe Browsing
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous
neighborhoods online.
4. Make Sure Your Internet Connection is Secure.
When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes
you have no direct control over its security. .
5. Be Careful What You Download
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry
malware or try to steal information.
6. Choose Strong Passwords
Passwords are one of the biggest weak spots in the whole Internet security structure, but there's
currently no way around them.
7. Make Online Purchases From Secure Sites
Any time you make a purchase online, you need to provide credit card or bank account
information—just what cybercriminals are most eager to get their hands on.
9. Be Careful Who You Meet Online
People you meet online are not always who they claim to be. Indeed, they may not even be real.
10. Keep Your Antivirus Program Up To Date
Internet security software cannot protect against every threat, but it will detect and remove most
malware—though you should make sure it's to date.
8. Be Careful What You Post
The Internet does not have a delete key, as that young candidate in New Hampshire found out.
Adopting a safer mindset
Computers can often give us a false sense of security.
Here's one way to think about it:
Treat the Internet as you would a shopping mall.
You shouldn't be afraid to use the Internet, but
remember that it comes with many of the same risks
you'd face in the real world.
Creating strong
passwords
Creating strong
passwords
Why do I need a strong
password?
Never use personal information
such as your name, birthday, user name, or email address. This type of information is often
publicly available, which makes it easier for someone to guess your password.
Use a longer password
Your password should be at least six characters long, although for extra security it should
be even longer.
Don't use the same password for each account.
If someone discovers your password for one account, all of your other accounts will be
vulnerable.
Tips for creating strong
passwords
Try to include numbers, symbols, and both uppercase
and lowercase letters.
Avoid using words that can be found in the dictionary.
For example, swimming1 would be a weak password.
Random passwords are the strongest.
If you're having trouble creating one, you can use a password generator instead.
Tips for creating strong
passwords
Enter title
Click here to add content of the text,
and briefly explain your point of view.
A
Enter title
Click here to add content of the text,
and briefly explain your point of view.
B
PART FOUR
100%
Enter title
Click here to add content of the text,and briefly
explain your point of view.
THANKS

More Related Content

What's hot

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 

What's hot (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Bug Bounty Hunter Tools.pdf
Bug Bounty Hunter Tools.pdfBug Bounty Hunter Tools.pdf
Bug Bounty Hunter Tools.pdf
 
Building the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAseBuilding the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAse
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
 
social engineering
 social engineering social engineering
social engineering
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 

Similar to Internet Safety.pptx

Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 

Similar to Internet Safety.pptx (20)

10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Users guide
Users guideUsers guide
Users guide
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 

Internet Safety.pptx

  • 1.
  • 3. In simple terms, internet safety refers to the act of staying safe online.
  • 4. In simple terms, internet safety refers to the act of staying safe online.
  • 5. In simple terms, internet safety refers to the act of staying safe online.
  • 6. Do you consider the potential danger(s) which exist on the web, most especially for our children?
  • 7. What are the risks?
  • 8. R I S K S Cybercrimes, Online Bullying, Online Predator, Device Addiction, Mental Health and Wellbeing, the type of content they are viewing and what they are posting online.
  • 9. R I S K S Fake News and Impact on our children’s behavior. Online Gaming addiction and certain features of online gaming are categorized as gambling.
  • 11. 1. Keep Personal Information Professional and Limited Potential employers or customers don't need to know your personal relationship status or your home address. 2. Keep Your Privacy Settings On Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. 3. Practice Safe Browsing You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online.
  • 12. 4. Make Sure Your Internet Connection is Secure. When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. . 5. Be Careful What You Download A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. 6. Choose Strong Passwords Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them.
  • 13. 7. Make Online Purchases From Secure Sites Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. 9. Be Careful Who You Meet Online People you meet online are not always who they claim to be. Indeed, they may not even be real. 10. Keep Your Antivirus Program Up To Date Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. 8. Be Careful What You Post The Internet does not have a delete key, as that young candidate in New Hampshire found out.
  • 14. Adopting a safer mindset Computers can often give us a false sense of security. Here's one way to think about it: Treat the Internet as you would a shopping mall. You shouldn't be afraid to use the Internet, but remember that it comes with many of the same risks you'd face in the real world.
  • 16. Creating strong passwords Why do I need a strong password?
  • 17. Never use personal information such as your name, birthday, user name, or email address. This type of information is often publicly available, which makes it easier for someone to guess your password. Use a longer password Your password should be at least six characters long, although for extra security it should be even longer. Don't use the same password for each account. If someone discovers your password for one account, all of your other accounts will be vulnerable. Tips for creating strong passwords
  • 18. Try to include numbers, symbols, and both uppercase and lowercase letters. Avoid using words that can be found in the dictionary. For example, swimming1 would be a weak password. Random passwords are the strongest. If you're having trouble creating one, you can use a password generator instead. Tips for creating strong passwords
  • 19. Enter title Click here to add content of the text, and briefly explain your point of view. A Enter title Click here to add content of the text, and briefly explain your point of view. B
  • 21. 100% Enter title Click here to add content of the text,and briefly explain your point of view.