Upload
fersie-ann-malacas
View
31
Download
0
Embed Size (px)
Citation preview
ONLINE SAFETY & MALWARES
Fersie Ann M. MalacasMarinduque National High School
ONLINE SAFETY ONLINE
SAFETY
©fmalacas2016
ONLINE SAFETY
Web safety, or online safety or Internet Safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
As the number of internet users continues to grow worldwide, internet safety is a growing concern for both children and adults. Common concerns regarding safety on the internet include: malicious users (spam, phishing, cyberbullying, cyberstalking etc.), websites and software (malware, computer viruses, etc.) and various types of obscene or offensive content. Several crimes can be committed on the Internet such as stalking, identity theft and more.
©fmalacas2016
https://en.wikipedia.org/wiki/Internet_safety
Don’t post any personal information online – like your address, email address or mobile number.Think carefully before posting pictures or videos of yourself. Once you’ve put a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.Keep your privacy settings as high as possible.Never give out your passwords.Don’t befriend people you don’t know.Don’t meet up with people you’ve met online. Speak to your parent or carer about people suggesting you do.
©fmalacas2016
http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/
TIPS
ONLINESAFETY
Remember that not everyone online is who they say they
are.
Think carefully about what you say before you post
something online.
Respect other people’s views, even if you don’t agree with
someone else’s views doesn’t mean you need to be rude.
If you see something online that makes you feel
uncomfortable, unsafe or worried: leave the website, turn
off your computer if you want to and tell a trusted adult
immediately.
©fmalacas2016
http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/
TIPS
ONLINESAFETY
Constantly monitor the students’ online activity.
Install filtering software.
Keep the computer in a place where teachers/ lab
technician can monitor.
Tell students to never give out personal informations.
©fmalacas2016
RULES
PROFESSOR/
LAB TECHNICIAN
When you are in computer laboratory, observe proper
behavior.
Treat everyone with consideration and respect.
Listen and follow directions.
Chewing gums, foods and drinks are NOT allowed in
the computer laboratory
Respect the equipment. Do NOT connect or disconnect
parts, cables or labels without the administrator’s
advice and assistance.©fmalacas2016
RULES
COMPUTERLABORATOR
Y
Internet use is limited to teacher’s assigned activities
or classwork. Using Facebook/Youtube is PROHIBITED.
Do NOT erase or delete any file or software from the
computers.
Do NOT change any of the setting in the computers.
This includes such things as colors, screen savers,
backgrounds and options. Changing these setting can
interface with the normal operation of the computer. ©fmalacas2016
RULES
COMPUTERLABORATOR
Y
Do NOT download any software from the internet
unless authorized. Loading or installing of any
software, programs and games on the computer is
STRICTLY PROHIBITED.
Do NOT insert USB/SD onto the computer.
Once computer is turned on leave it on, it will be
turned off at the end of the day.
Before you leave the lab, please make sure you have
done the following things: ©fmalacas2016
RULES
COMPUTERLABORATOR
Y
Quit all applications.
Clean area around the computer, that
includes discarding scrap papers and
printouts.
Put things back when you are finished with
them, including cover, keyboard, mouse
and chair under the table.
©fmalacas2016
RULES
COMPUTERLABORATOR
Y
MALWARESMALWARES
©fmalacas2016
MALWARES
a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party's benefitprograms can range from being simple annoyances (pop-up advertising) to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network)designed to transmit information about your web-browsing habits to advertisers or other third party interests without you knowing
©fmalacas2016
https://ist.mit.edu/security/malware
MALWARES
TYPES OF MALWARES
©fmalacas2016
TYPES OF MALWARESTYPES OF MALWARES
VIRUSSoftware that can replicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory.There are two types of computer viruses 'parasitic' and 'boot' virus.
A Parasitic virus attaches itself to other programs and is activated when the host program is executed. It tries to get attached to more programs so that chances of getting activated is more. It spreads to other computers when the affected programs are copied. 'Jerusalem' and 'Datacrime' are parasitic viruses.
©fmalacas2016
https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
A Boot virus is designed to enter the boot sector of a floppy disc. It works by replacing the first sector on the disc with part of itself. It hides the rest of itself elsewhere on the disc, with a copy of the first sector. The virus is loaded by the computers built-in start-up program when the machine is switched on. The virus loads, installs itself, hides the rest of itself and then loads the original program. On a hard disc, virus can occupy DOS boot sector or master boot sector.
©fmalacas2016
https://ist.mit.edu/security/malware http://www.streetdirectory.com/etoday/examples-of-computer-viruses-apjjf.html
ADWAREpresents unwanted advertisements to the user of a computeradvertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window“
SPYWARESoftware that surreptitiously gathers information and transmits it to interested parties. Types of information that is gathered includes the Websites visited, browser and system information, and your computer IP address.
©fmalacas2016
https://en.wikipedia.org/wiki/Adware https://ist.mit.edu/security/malware
BROWSER HIJACKING SOFTWAREAdvertising software that modifies your browser settings (e.g., default home page, search bars, toolbars), creates desktop shortcuts, and displays intermittent advertising pop-ups. Once a browser is hijacked, the software may also redirect links to other sites that advertise, or sites that collect Web usage information
©fmalacas2016
https://ist.mit.edu/security/malware