SlideShare a Scribd company logo
1 of 17
 ANYTHING YOU POST ON THE INTERNET IT
WILL BE THERE FOR A LONG TIME
 73%OF TEEN AND 68% OF YOUNG ADULTS
USE SOCIAL NETWORKS
 AND THE HALF OF THEM POST PERSONAL
INFORMATION ON THEN
 IF YOU DO THAT, THE HACKERS OR PEOPLE
CAN ATTACK YOU
 IN THE ERA OF SMARTPHONES
CIBERSAFETY SHOULD EXTEND TO YOUR
SMARTPHONE TOO
 DONT ACCEPT INCOMING CALLS OF TEXT
FROM UNKNOWN PEOPLE
 NO MATTER HOW SECURE YOU ARE, YOU
CAN STILL GET HACKED
1. CHANGE YOUR PASSWORD AND MAKE IT
IMPREDICTIBLE.
2. DO THE TWO STEPS VERIFICATION
3. CHECK YOUR BOX AND NOTIFY YOUR
CONTACTS
4. SEARCH VIRUS
5. BACK UP YOUR FILES
 YOU MUST HAVE ACTUALIZED YOUR
OPERATING SISTEM AND APPLICATIONS
WITH THE NEWEST SECUITY SISTEM
 TIP 6: DONT DOWNLOAD ANITHING FROM A
SUSPICIUS PAGE
 IF YOU DOWNLOAD SOMETHING FROM A
SUSPICIUS PAGE, IT CAN HAVE VIRUS
 TIP 7: ACCEPT ONLY KNOWN CONTACTS
 BECAUSE IF YOU ACCEPT ALL THE
CONTACTS YOU HAVE, ITS POSSIBLE THAT
ONE OF THEM CAN BE DANGEROUS
 IF A HACKER ATTACK YOU, IT WILL BE MORE
DIFFICULT TO DO IT IF YOU HAVE A STRONG
PASSWORD

More Related Content

What's hot

How to can someone track your whatsapp
How to can someone track your whatsappHow to can someone track your whatsapp
How to can someone track your whatsappashley228
 
How to monitor whatsapp messages android
How to monitor whatsapp messages androidHow to monitor whatsapp messages android
How to monitor whatsapp messages androidashley228
 
10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezen10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezenMarijkePasman1
 
Marleah
MarleahMarleah
Marleahmorag
 
Hack Snapchat Account
Hack Snapchat  AccountHack Snapchat  Account
Hack Snapchat Accountjack ordert
 
Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer securityshivam paswan
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructionsSTCC Library
 
Internet safety by justin p.
Internet safety by justin p.Internet safety by justin p.
Internet safety by justin p.Justin Park
 
SAFETIS - early fire detection system
SAFETIS - early fire detection systemSAFETIS - early fire detection system
SAFETIS - early fire detection systemWorkswell
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Can you track viber messages
Can you track viber messagesCan you track viber messages
Can you track viber messagestommy116
 
Arlan2
Arlan2Arlan2
Arlan2morag
 
Chromebook instructions
Chromebook instructionsChromebook instructions
Chromebook instructionsSTCC Library
 

What's hot (18)

How to can someone track your whatsapp
How to can someone track your whatsappHow to can someone track your whatsapp
How to can someone track your whatsapp
 
How to monitor whatsapp messages android
How to monitor whatsapp messages androidHow to monitor whatsapp messages android
How to monitor whatsapp messages android
 
10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezen10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezen
 
Marleah
MarleahMarleah
Marleah
 
Hack Snapchat Account
Hack Snapchat  AccountHack Snapchat  Account
Hack Snapchat Account
 
How to access espn3
How to access espn3How to access espn3
How to access espn3
 
Mcx enews app
Mcx enews appMcx enews app
Mcx enews app
 
Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructions
 
Internet safety by justin p.
Internet safety by justin p.Internet safety by justin p.
Internet safety by justin p.
 
SAFETIS - early fire detection system
SAFETIS - early fire detection systemSAFETIS - early fire detection system
SAFETIS - early fire detection system
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Can you track viber messages
Can you track viber messagesCan you track viber messages
Can you track viber messages
 
Arlan2
Arlan2Arlan2
Arlan2
 
Internet policy
Internet policyInternet policy
Internet policy
 
Chromebook instructions
Chromebook instructionsChromebook instructions
Chromebook instructions
 

Viewers also liked

Viewers also liked (17)

Security tips
Security tipsSecurity tips
Security tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet security
Internet securityInternet security
Internet security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security tips
Security tipsSecurity tips
Security tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Harry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
Harry Coumnas Shocking Revelations about the Legendary Lost City Of CleopatraHarry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
Harry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
 
Tic(1)
Tic(1)Tic(1)
Tic(1)
 
Driving DevOps for Oracle with the orawls Puppet Modules
Driving DevOps for Oracle with the orawls Puppet ModulesDriving DevOps for Oracle with the orawls Puppet Modules
Driving DevOps for Oracle with the orawls Puppet Modules
 
Internet more secure
Internet more secureInternet more secure
Internet more secure
 
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Bits en bites magazine media 2017
Bits en bites magazine media 2017Bits en bites magazine media 2017
Bits en bites magazine media 2017
 

Similar to Internet more secure (1)

Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionSelva Orejón
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912TimelineCR
 
Psychological aspect of social engineering
Psychological aspect of social engineeringPsychological aspect of social engineering
Psychological aspect of social engineeringYuvaraj Naresh
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014Greg Hickman
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Safety online radysh do14
Safety online radysh do14Safety online radysh do14
Safety online radysh do14Sergiy Sydoriv
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Timothy Corey
 

Similar to Internet more secure (1) (20)

Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
 
Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
Psychological aspect of social engineering
Psychological aspect of social engineeringPsychological aspect of social engineering
Psychological aspect of social engineering
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Htc itmr 30-05-13
Htc   itmr   30-05-13Htc   itmr   30-05-13
Htc itmr 30-05-13
 
Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
LESSON 2.1.pptx
LESSON 2.1.pptxLESSON 2.1.pptx
LESSON 2.1.pptx
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Safety online radysh do14
Safety online radysh do14Safety online radysh do14
Safety online radysh do14
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?
 

Recently uploaded

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 

Recently uploaded (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 

Internet more secure (1)

  • 1.
  • 2.
  • 3.  ANYTHING YOU POST ON THE INTERNET IT WILL BE THERE FOR A LONG TIME
  • 4.
  • 5.  73%OF TEEN AND 68% OF YOUNG ADULTS USE SOCIAL NETWORKS  AND THE HALF OF THEM POST PERSONAL INFORMATION ON THEN  IF YOU DO THAT, THE HACKERS OR PEOPLE CAN ATTACK YOU
  • 6.
  • 7.  IN THE ERA OF SMARTPHONES CIBERSAFETY SHOULD EXTEND TO YOUR SMARTPHONE TOO  DONT ACCEPT INCOMING CALLS OF TEXT FROM UNKNOWN PEOPLE
  • 8.
  • 9.  NO MATTER HOW SECURE YOU ARE, YOU CAN STILL GET HACKED 1. CHANGE YOUR PASSWORD AND MAKE IT IMPREDICTIBLE. 2. DO THE TWO STEPS VERIFICATION 3. CHECK YOUR BOX AND NOTIFY YOUR CONTACTS 4. SEARCH VIRUS 5. BACK UP YOUR FILES
  • 10.
  • 11.  YOU MUST HAVE ACTUALIZED YOUR OPERATING SISTEM AND APPLICATIONS WITH THE NEWEST SECUITY SISTEM
  • 12.  TIP 6: DONT DOWNLOAD ANITHING FROM A SUSPICIUS PAGE
  • 13.  IF YOU DOWNLOAD SOMETHING FROM A SUSPICIUS PAGE, IT CAN HAVE VIRUS
  • 14.  TIP 7: ACCEPT ONLY KNOWN CONTACTS
  • 15.  BECAUSE IF YOU ACCEPT ALL THE CONTACTS YOU HAVE, ITS POSSIBLE THAT ONE OF THEM CAN BE DANGEROUS
  • 16.
  • 17.  IF A HACKER ATTACK YOU, IT WILL BE MORE DIFFICULT TO DO IT IF YOU HAVE A STRONG PASSWORD