You are on page 1of 28

Online Safety and Security,

Ethics and Netiquette


Are you safe
and secured
online?
ONLINE
SAFETY
Always be secure
1. Keep your passwords to yourself
2. Should always log out or log off your
account.
Be respectful
1. Always be polite and use appropriate
language
2. Do not look at anyone else’s files without
their permission
3. Cyber bullying unacceptable
Be Safe
1. Do not share personal information in the
social media

2. Be aware of emails that ask for personal


information
3. Never meet up with anyone that you have
only met online.
Be responsible
1. Keep focus only on the things you are
working on
2. Take good care of the equipment you use
3. Use your device in school only at agreed
time.
Be legal
1. Copy/upload publish materials that are
appropriate
2. Take images or video of other people with
their full permission
3. Everything you do or upload will be there
forever.
Security
Anti Virus
INTERNET
THREATS
INTERNET THREATS
1. MALWARE
2. SPAM
3. PHISHING
4. BOTNET
5. DENIAL OF SERVICE ATTACK
1. MALWARE

malicious software, is any program or file that is


harmful to a computer user.
Types of Malware
1. Virus
2. Worm
3. Trojan
4. Spyware
5. Adware
Virus
A malicious program designed to replicate itself
and transfer from one computer to another.
Example:
Internet
Local Network
Cd’s
Flashdrive
Worm
A malicious program that transfers from one
computer to another by any types of means
Trojan
A malicious program that disguises as a useful
program but once downloaded or installed,
leaves your PC unprotected and allows hackers
to get your information.
Spyware
A program that runs in the background without
you knowing it. It has the ability to monitor what
you currently doing and typing through
keylogging.
Adware
A program designed
to send you
advertisements,
mostly as pop-ups.
2. SPAM
An unwanted email from bots or advertisers.
It can be used to send malware.
3. PHISHING
An unwanted acquisition of sensitive personal
information like passwords and credit card
details.
4. BOTNET
Botnets can be used to perform distributed
denial-of-service attack (DDoS attack), steal
data, send spam, and allows the attacker to
access the device and its connection.
5. DENIAL OF SERVICE
ATTACK
Disrupts computer access to internet services
A denial-of-service attack is a security event that
occurs when an attacker prevents legitimate
users from accessing specific computer systems,
devices, services or other IT resources.
O Denial-of-service (DoS) attacks typically
flood servers, systems or networks with traffic
in order to overwhelm the victim's resources
and make it difficult or impossible for
legitimate users to access them.

You might also like