1 / 12

TITLE : E-SAFETY

TITLE : E-SAFETY. NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT : 2011390663. E-Safety. E-safety is about measures and best practices fer netizens to guard their personel safety and the security of their network. objective.

maeve
Download Presentation

TITLE : E-SAFETY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT : 2011390663

  2. E-Safety • E-safety is about measures and best practices fernetizens to guard their personel safety and the security of their network.

  3. objective Conditions where digital security breaches & attacks can happen Understand the effects of various kind of security breaches & attacks. Ways to get protect from security breaches & attacks. Important to safe guard digital safety and security. Shared Resources VS Dedicated Resources

  4. Unethical Behavior Downloading pirated software Printing a lot of personel files Storing files that have nothing to do work such as personel photo files in the share storage

  5. INTERNET dangers: • Internet threats can take on a range of forms or attacks • Internet can create illusion to turn strangers into “friends” • It can damage your reputation. • Common Forms of Digital Security Breaches • Identity Theft - • Phishing e-mails • Hacker & Crackers • Cyber stalking • Cyber bully • Internet Predator and Pornography

  6. Phishing e-mail • SPAM emails?- randomly sent email purporting to come from an organisation or individual and claim to contain urgent news, confirmation of a non-existent order. • Why? - to get as much personal information from a user as possible. This includes login information, date of birth, and other identifiable information that can help Cyberstalkers open up bogus accounts under your name or steal from your existing ones. • Effect? Visiting to this web site with an unprotected computer and web browser allows the attacker to run spyware on your PC.

  7. Protection from security breaches & attacks Self Awareness • Online Banking: Only do online banking in the security of your own home if at all possible. • Identity Theft • Phishing. • keeping up to date is very important.

  8. Protection from security breaches & attacks Implement policy • Good Password Practice: • Use strong password. • Hard to guess.use hardly password • Changed periodically by force password change on first login and establish a maximum password lifetime. it will minimize the risk of unauthorized access. • Kept it secret. be VERY careful where it’s stored and don’t tell anyone else your password. And the most important thing is, you can remembered it: • Embedding special characters like “P@sswOrd”. • Use the first letters of a common phrase and throw in some special characters and numbers like “Hope for the best, plan for the worst” to “H4tb,p4tw”.

  9. Protection from security breaches & attacks Implement policy on shared resources • A shared resource or network share is a device or piece of information on a computer that can be remotely accessed from another computer via a local area network or Intranet. It can be a file access, printer, scanner or etc Best Practice: • Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job. • Ensure users have the correct hardware, resources and software in place to protect them against data breaches. • Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications • Ensuring users log off their accounts, turn of computers and don’t share passwords with others to prevent people accessing data. • Plan backup and recovery strategy to ensure organisation functioning well. • Ask user to report immediately to network admin if they see something weird on your pc.

  10. Common forms of digital security breach Identify theft:the importance of securing personel information on that computer. Pishingemail:phish,yir money gone. Hacker and cracker:kaspersky’s Malaysian site Hacked By Turkish Hacker. Cyber Stalking:Cyber Stalking a serious threat Cyber Bullying:Nineteenegerfschared in the death of phoebe Prince Internet Predator:Calgary Man with luring 6 girls.

  11. How erase the data from old computer Dismantle the computer Take out the hard driver Physically destroy the hard disk

  12. ThANKYoU……

More Related