1 / 7

Internet Safety

Internet Safety. By Zak Madges. Personal Details. To protect yourself and your details Don’t give out your home address, telephone number to people you meet on the net. Choose a nickname to use in chat rooms and newsgroups. Never use your real name .

asta
Download Presentation

Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Safety By Zak Madges

  2. Personal Details • To protect yourself and your details • Don’t give out your home address, telephone number to people you meet on the net. • Choose a nickname to use in chat rooms and newsgroups. Never use your real name. • Internet providers will never ask you for your password except when you first sign on. • If you get an email saying that computer problems mean they have to ask you to confirm your password, delete it from your mailbox without answering.

  3. Denial of Service attacks • What is a Dos Attack? • A Denial of Service (DoS) attack or Distributed Denial of Service (DDoS) attack is based upon flooding key servers with useless traffic. • The server has to spend so much time dealing with this traffic that users are denied normal service.

  4. Cyber Bullying • Cyber bullying comes in many different forms Example • Including sending a mean or threatening emails or text/instant message, pretending to be someone by using his or her name online, or tricking someone into revealing personal or embarrassing information and sending it to others • Cyber bullying itself it not a crime but under the Criminal Code it is a crime to harass or communicate causes him or her to fear for his or her own safety or the safety of others • (C.C section 264.1) Uttering threats, in any manner, or death or bodily harm is also punishable by up to 5 years in prison

  5. E-Mails and Attachments from unknown sources • Attachments are files sent with an email. Your email will show a paper clip icon if you have one. • Most of the time, these are safe when sent by friends and family. However, they can also contain viruses and other unwanted programs, such as spyware and adware, especially if sent by someone you don’t know • If you get email asking for your personal details just discard it, its fake.

  6. Downloading files from untrusted websites • To protect your computer and personal details never download files from untrusted websites, if you do it is at your own risk. • The file you download may cause virus and even going on the website may cause harm to your computer. • To prevent file you may download you can install virus protection software and they stop most viruses.

  7. How to protect yourself, your computer or others from each threat • To protect yourself and your computer, you can install virus protecting software like AVG or Norton. • The software will protect you from getting nasty virus that can corrupt your computer to make is crash, also some virus can take you personal details. • These are some of the worst virus we know about; • Love Hurts - Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. • ChernobylVirus - This was considered one of the worst virus types because it could remain undetected in your computer's memory until the damage was done. The worst part of Chernobyl was the fact that once it reached its trigger date, it erased all files on the user's hard drive and overwrote the system's BIOS. Chernobyl was responsible for over $20 billion in damages.

More Related