SlideShare a Scribd company logo
1 of 20
 OUTLINE
 Introduction.
 Internet Security: What it is, and why we need it.
 Hackers: Who is he, Classes, Hacking Phases.
 Attacks examples
 What should I do to be safe online ?
 Conclusion
2
 INTRODUCTION:
 While the internet offers enormous advantages and opportunities, it also presents
various security risks.
 It’s where we access our banking records, credit card statements, tax returns and other
highly sensitive personal information.
 Banks take extensive steps to protect the information transmitted andprocessed
when banking online.
 But with all the good things the Internet offers us, it also opens the door toserious,
potentially devastating threats.
3
 Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection of data
sent via Internet Protocol.
 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that come with
Internet use  Safety
 INTERNET SECURITY: WHAT IT
IS
4
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
The criminals use in accessing :
• your private information.
• stealing your identity or your money.
• It can also be used to highjack your
computer for illegal purposes.
 INTERNET SECURITY:
 WHY YOU NEED IT.
-Identifies your computer
-Where it is located
Request
Response
carries with it unwanted hidden software
5
 HACKERS:
 WHO IS A HACKER ?
Intelligent individuals
with excellent
computer skills with
the ability to create
and explore
computer’s software
and Hardware
For some
hackers,hacking is a
hobby to see how
many computers they
can compromise
Their intention can either be to gain
knowledge or to poke around to do
illegal things
6
 Hackers
 Hacker Classes :
Black Hats Grey Hats White Hats
Individuals with
extraordinary computing
skills, Restoring to malicious
or destructive activities and
also known as Crackers
Individuals professing
hacker skills and using
them for defensive
purposes and are also
known as Security
Analysts
Individuals who work
both offensively and
defensively at various
times
7
 HACKERS
 Hacking Phases :
Reconnaissance Scanning
Gaining
Access
Maintaining
Access
Covering
Tracks
8
 ATTACKS EXAMPLES
 Phishing
“Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication.”
9
 Attacks examples
 Phishing
10
 ATTACKS EXAMPLES
 Pharming
 Is another technique used
to steal confidential
access code. It works by
redirecting users to a
rogue server
11
 ATTACKS EXAMPLES
 SQL injection
 SQL injection is a technique
used to take advantage of non
validated input vulnerabilities
to pass SQL commands
through a web application for
execution by a backend
database
12
 Attacks examples
 SQL injection
13
14
 WHAT SHOULD I DO TO BE SAFE ONLINE ?
 To protect your self
 Keep you passwords private
and create ones too strong that
are hard to “crack”
 If you have received an Email
encounters, you may have been
the target of a common scam
called ‘phishing’.
15
 WHAT SHOULD I DO TO BE SAFE ONLINE
?
 To protect your self
 Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.
 If you make purchases
or do your banking
online, make sure you
protect your financial
information
 Use ‘https://’
16
 WHAT SHOULD I DO TO BE SAFE ONLINE
?
 To protect your Computer
 Use Anti-virus
Software: Anti-virus
software can detect
and destroy computer
viruses before they
cause damage
 Use Anti-spyware
Software: Use anti-spyware
software so unknown
people cannot lurk on
your computer and
potentially
 steal your information
17
 WHAT SHOULD I DO TO BE SAFE ONLINE ?
 To protect your Computer
 Keep Your Computer
Updated.
 Install all security updates as
soon as they are available
Automatic updates provide the
best protection.
 Use a Firewall:
 It is a placed at the gateway
between the two networks
which is usually a private
Network and a public network
such as the internet
18
 CONCLUSION
 Whenever using internet or an online financial system, ensure that your
system is still under your control and not a spoofed puppet.
 Protecting your self from internet threats.
 Being aware of the dangers of the internet and taking the rightsteps to
avoid them means you can enjoy the internet safely.
19
Internet Security.pptx

More Related Content

Similar to Internet Security.pptx

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxDhruvsinhbhati
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 

Similar to Internet Security.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security
Mobile securityMobile security
Mobile security
 

Recently uploaded

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfKartik Tiwari
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 

Internet Security.pptx

  • 1.
  • 2.  OUTLINE  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks examples  What should I do to be safe online ?  Conclusion 2
  • 3.  INTRODUCTION:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted andprocessed when banking online.  But with all the good things the Internet offers us, it also opens the door toserious, potentially devastating threats. 3
  • 4.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety  INTERNET SECURITY: WHAT IT IS 4
  • 5. - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable The criminals use in accessing : • your private information. • stealing your identity or your money. • It can also be used to highjack your computer for illegal purposes.  INTERNET SECURITY:  WHY YOU NEED IT. -Identifies your computer -Where it is located Request Response carries with it unwanted hidden software 5
  • 6.  HACKERS:  WHO IS A HACKER ? Intelligent individuals with excellent computer skills with the ability to create and explore computer’s software and Hardware For some hackers,hacking is a hobby to see how many computers they can compromise Their intention can either be to gain knowledge or to poke around to do illegal things 6
  • 7.  Hackers  Hacker Classes : Black Hats Grey Hats White Hats Individuals with extraordinary computing skills, Restoring to malicious or destructive activities and also known as Crackers Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysts Individuals who work both offensively and defensively at various times 7
  • 8.  HACKERS  Hacking Phases : Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks 8
  • 9.  ATTACKS EXAMPLES  Phishing “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” 9
  • 11.  ATTACKS EXAMPLES  Pharming  Is another technique used to steal confidential access code. It works by redirecting users to a rogue server 11
  • 12.  ATTACKS EXAMPLES  SQL injection  SQL injection is a technique used to take advantage of non validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database 12
  • 13.  Attacks examples  SQL injection 13
  • 14. 14
  • 15.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your self  Keep you passwords private and create ones too strong that are hard to “crack”  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 15
  • 16.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your self  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name.  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 16
  • 17.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your Computer  Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage  Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially  steal your information 17
  • 18.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your Computer  Keep Your Computer Updated.  Install all security updates as soon as they are available Automatic updates provide the best protection.  Use a Firewall:  It is a placed at the gateway between the two networks which is usually a private Network and a public network such as the internet 18
  • 19.  CONCLUSION  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the rightsteps to avoid them means you can enjoy the internet safely. 19