You are on page 1of 25

A SEMINAR ON

C-DAC
CENTRE FOR DEVELOPMENT OF
ADVANCED COMPUTING
Presented by:
B.SHASHIDHAR
G.SREEMAN

SRI VENKATESHWARA ENGINEERING COLLEGE


1

WWW[WORLD WIDE
WEB]
World wide web[www] is not a waste wide

web its a place where values are considered


in a broadest sense. So we must take care
while shaping content and services and we
should recognize that internet is not apart
from universal society but it is a primary
component of it.

We must not use internet to fool others by

pretending to be someone else.


We must not use rude or bad language while
E -mailing, chatting , blogging or social
networking.
We need to respect others views and should
not criticize anyone of the internet.

PHISHING
Phishing is a type of deception to steal your

valuable personal data , such as credit card


numbers , passwords , account data or other
information.
Ignore links in E mail messages.
Use the latest versions of softwares and
services to help , warn and protect you from
online scam.
Install up-to-date anti-virus and anti-spyware
to update your computer.
4

SPAM
Spam is unsolicited E mail and the electronic

equivalent of junk mail. SPAM can fill your inbox ,


waste your time ,expose you to content youd
rather not see .Come with graphics that have
hidden links or viruses inside , alert the sender
that you have read the mail and add you to its
mail list and potentially harm your computer with
harmful attachments called malware and even
lead to online fraud if the spam is sent to you by
criminals who are phishing for extracting your
personal information .
5

Use an E mail service provider with an

effective anti spam software.


Beware of all E mail attachments and use
anti-virus softwares.
Report any E mail abuse which you observe.
Check your personalized spam settings
frequently.

SOCIAL-NETWORKING
Social-networking means grouping of

individuals into specific groups , like small


communities. Social networking is used to
meet internet users to gather and share
information of experiences on a number of
topics , developing friendship or to start a
professional relationship. A simple social
networking site is where different people keep
different info. related to any particular thing at
one place. For example : Orkut , yahoo ,
twitter , facebook .
7

Avoid giving or filling personal or sensitive

information about your family details , address


, personal photographs.
Be careful about the information you post
online.
Set the privacy settings accordingly so that
strangers dont have any access to your
personal info.

PASSWORDS
Password represents the identity of an

individual for a system. This helps individuals


in protecting personal and confidential
information from being viewed by
unauthorized users. Hence it is important to
secure passwords. Passwords act like barrier
between the user and his personal
information.
The passwords shared with other persons
could be misused . Forgotten and the stolen
passwords can be used by an unauthorized
user to collect your personal information .
9

Always keep strong passwords and easy to

remember passwords.
Never write down or store passwords on
disks. Try to memorize them.

10

Providing mobile PC to access internet for

remote access to all personal , business


applications may put a personal or
organizations vital information at risk.
These are various threats which can effect the
mobile users in several ways in the form of
exposure of devices , mobile virus , sending
nameless un wanted messages etc.

11

Keep the blue tooth connection in invisible

mode unless you need some user to access


your mobile phone or laptops.
Avoid downloading the content into mobile
phones or laptop from any un trusted source.
Delete the MMS message received from any
unknown user without opening it.

12

Instant messaging
IM[instant messaging] is real time text based

communication between two or more people.


Connected over a network like the internet.
E-mail is an offline communicating system
whereas IM is used for online communication.

13

Choose a nickname that doesnt give away

your real name.


Never post or share photographs on internet
without completely knowing about the person
you are chatting with because strangers may
trap you .
If someone makes you feel uncomfortable
and abuses you inform your parents or
teachers.

14

E-Mail
Electronic mail often abbreviated as E-mail , is

a method of exchanging digital messages in


store and forward model. It is an essential part
on todays digital communication.

15

Using somebodys e-mail on behalf of him/her to

spoof others.
Harassing or threatening other members on internet.
Routing chain e-mails telling recipents to send money
to the person on the top list.
Sending offensive sexually explicit e-mail.
Spreading computer virus using e-mail attachments.
Spoofing others e-mail ID is not part of internet
ethics.
Always open attachments after scanning through
updated anti-virus.
Never click links in web based e-mails and if required
type the same directly in browser.
16

Defend yourself from


viruses and worms.

There are malicious programs like viruses ,

worms , Trojans that can cause damage to


your computer , your personal information
and your data. They may come through e-mail
attachments , hidden programs as part of
downloads etc.

17

Always use latest and updated anti-virus

software.
Scan your system along with booting on daily
basis .
All downloads should be scanned with antivirus before opening them.

18

The first layer of security you need to take

into account is the physical security of your


computer systems. it is an extremely
important part of keeping your computers and
data secure . If an experienced hacker can
just walk up to your machine, it can be
compromised in a matter of minutes. That
may seem like a remote threat, but there are
other risks , like theft ,data loss, and physical
damage-whick make it important to check
physical security posture for holes.

19

You may secure your PC by keeping the

system in a good environment by providing


proper air , humidity conditions , setting BIOS
passwords to restrict booting options.

20

ONLINE BANKING
Online banking provides you with a fast and

convenient way to undertake various banking


transactions during and after banking hours.
As in any other system , there are risks
involved in online banking too.
Phishing attacks , pharming attacks and manin the middle.

21

Never reveal your Login ID and passwords to

others.
Properly check for the right and secure
website.
Use vital keyboards provided by websites to
protect from key loggers .
Protect your from hackers , viruses and other
malicious programs.

22

CYBER BULLYING
Cyber bullying or cyber harassment is when a

person is threatened , harassed , humiliated ,


embarrassed or otherwise targeted by others
using the internet , interactive and digital
technologies or mobile phones. Cyber bullying
can be done in the following ways: Forwarding a private IM communication to
others without their consent.
Impersonating someone else to spread rumors
.
23

Posting embarrassing photos or videos.


Humiliating text sent over cell phones etc.
Never send any hatred mails , rumors by

using e-mail or mobile for impersonating


someone.
Never post pictures/videos of someone or self
without proper guidelines.
Never send massages humiliating anyone
through cell phone or IM.

24

THANK YOU

25

You might also like