You are on page 1of 25

Presented by: B.

SHASHIDHAR

G.SREEMAN

SRI VENKATESHWARA ENGINEERING COLLEGE


1

WWW[WORLD WIDE WEB]


World wide web[www] is not a waste wide web its a

place where values are considered in a broadest sense. So we must take care while shaping content and services and we should recognize that internet is not apart from universal society but it is a primary component of it.

We must not use internet to fool others by pretending

to be someone else. We must not use rude or bad language while E mailing, chatting , blogging or social networking. We need to respect others views and should not criticize anyone of the internet.

PHISHING
Phishing is a type of deception to steal your valuable

personal data , such as credit card numbers , passwords , account data or other information. Ignore links in E mail messages. Use the latest versions of softwares and services to help , warn and protect you from online scam. Install up-to-date anti-virus and anti-spyware to update your computer.

SPAM
Spam is unsolicited E mail and the electronic equivalent

of junk mail. SPAM can fill your inbox , waste your time ,expose you to content youd rather not see .Come with graphics that have hidden links or viruses inside , alert the sender that you have read the mail and add you to its mail list and potentially harm your computer with harmful attachments called malware and even lead to online fraud if the spam is sent to you by criminals who are phishing for extracting your personal information .

Use an E mail service provider with an effective anti

spam software. Beware of all E mail attachments and use anti-virus softwares. Report any E mail abuse which you observe. Check your personalized spam settings frequently.

SOCIAL-NETWORKING
Social-networking means grouping of individuals into

specific groups , like small communities. Social networking is used to meet internet users to gather and share information of experiences on a number of topics , developing friendship or to start a professional relationship. A simple social networking site is where different people keep different info. related to any particular thing at one place. For example : Orkut , yahoo , twitter , facebook .

Avoid giving or filling personal or sensitive

information about your family details , address , personal photographs. Be careful about the information you post online. Set the privacy settings accordingly so that strangers dont have any access to your personal info.

PASSWORDS
Password represents the identity of an individual for a

system. This helps individuals in protecting personal and confidential information from being viewed by unauthorized users. Hence it is important to secure passwords. Passwords act like barrier between the user and his personal information. The passwords shared with other persons could be misused . Forgotten and the stolen passwords can be used by an unauthorized user to collect your personal information .

Always keep strong passwords and easy to remember

passwords. Never write down or store passwords on disks. Try to memorize them.

10

Providing mobile PC to access internet for remote

access to all personal , business applications may put a personal or organizations vital information at risk. These are various threats which can effect the mobile users in several ways in the form of exposure of devices , mobile virus , sending nameless un wanted messages etc.

11

Keep the blue tooth connection in invisible mode

unless you need some user to access your mobile phone or laptops. Avoid downloading the content into mobile phones or laptop from any un trusted source. Delete the MMS message received from any unknown user without opening it.

12

Instant messaging
IM[instant messaging] is real time text based

communication between two or more people. Connected over a network like the internet. E-mail is an offline communicating system whereas IM is used for online communication.

13

Choose a nickname that doesnt give away your real

name. Never post or share photographs on internet without completely knowing about the person you are chatting with because strangers may trap you . If someone makes you feel uncomfortable and abuses you inform your parents or teachers.

14

E-Mail
Electronic mail often abbreviated as E-mail , is a

method of exchanging digital messages in store and forward model. It is an essential part on todays digital communication.

15

Using somebodys e-mail on behalf of him/her to

spoof others. Harassing or threatening other members on internet. Routing chain e-mails telling recipents to send money to the person on the top list. Sending offensive sexually explicit e-mail. Spreading computer virus using e-mail attachments. Spoofing others e-mail ID is not part of internet ethics. Always open attachments after scanning through updated anti-virus. Never click links in web based e-mails and if required type the same directly in browser.
16

Defend yourself from viruses and worms.


There are malicious programs like viruses , worms ,

Trojans that can cause damage to your computer , your personal information and your data. They may come through e-mail attachments , hidden programs as part of downloads etc.

17

Always use latest and updated anti-virus software.


Scan your system along with booting on daily basis . All downloads should be scanned with anti-virus

before opening them.

18

The first layer of security you need to take into account

is the physical security of your computer systems. it is an extremely important part of keeping your computers and data secure . If an experienced hacker can just walk up to your machine, it can be compromised in a matter of minutes. That may seem like a remote threat, but there are other risks , like theft ,data loss, and physical damage-whick make it important to check physical security posture for holes.

19

You may secure your PC by keeping the system in a

good environment by providing proper air , humidity conditions , setting BIOS passwords to restrict booting options.

20

ONLINE BANKING
Online banking provides you with a fast and

convenient way to undertake various banking transactions during and after banking hours. As in any other system , there are risks involved in online banking too. Phishing attacks , pharming attacks and man-in the middle.

21

Never reveal your Login ID and passwords to others.

Properly check for the right and secure website.


Use vital keyboards provided by websites to protect

from key loggers . Protect your from hackers , viruses and other malicious programs.

22

CYBER BULLYING
Cyber bullying or cyber harassment is when a person

is threatened , harassed , humiliated , embarrassed or otherwise targeted by others using the internet , interactive and digital technologies or mobile phones. Cyber bullying can be done in the following ways: Forwarding a private IM communication to others without their consent. Impersonating someone else to spread rumors .

23

Posting embarrassing photos or videos. Humiliating text sent over cell phones etc.

Never send any hatred mails , rumors by using e-mail

or mobile for impersonating someone. Never post pictures/videos of someone or self without proper guidelines. Never send massages humiliating anyone through cell phone or IM.

24

25

You might also like