0% found this document useful (0 votes)
89 views12 pages

Information Technology 2019-2020: Internet Security

This document discusses internet security and provides tips to stay safe online. It outlines three types of hackers: black hat hackers who violate security for personal gain, white hat hackers who ensure security, and grey hat hackers who sometimes break laws for non-malicious reasons. The document also lists precautions like installing antivirus software, configuring firewalls, using strong passwords, encrypting data, avoiding unknown attachments/downloads, and only sharing information over secure connections. Overall, the document provides an overview of internet security risks and recommendations for protecting personal information online.

Uploaded by

MR Amazing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views12 pages

Information Technology 2019-2020: Internet Security

This document discusses internet security and provides tips to stay safe online. It outlines three types of hackers: black hat hackers who violate security for personal gain, white hat hackers who ensure security, and grey hat hackers who sometimes break laws for non-malicious reasons. The document also lists precautions like installing antivirus software, configuring firewalls, using strong passwords, encrypting data, avoiding unknown attachments/downloads, and only sharing information over secure connections. Overall, the document provides an overview of internet security risks and recommendations for protecting personal information online.

Uploaded by

MR Amazing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

INFORMATION

TECHNOLOGY
2019-2020

INTERNET SECURITY
NAME: ANUPRIYA
CLASS: 10th E
ROLL NO.: 5
⚔️ INTERNET SECURITY ⚔️

With the rapid growth of internet and its


application in diverse fields, security risks have
also increased. We send over the internet our
personal information like our names and those
of our families, passwords for our accounts
including emails, banking,or even credit card
details. Some knowledgeable persons with bad
intention (crackers) can easily intercept this
information and misues it for their own
benefit.So therefore now days internet security
is very important.
⚔️ TYPES OF HACKERS 👨 👨.
 There are three main types of hackers. They are:
1. BLACK HAT HACKER: black hat hacker is a hacker
who violates computer security for personal gain or
maliciousnes..
2. WHITE HAT HACKER: a computer security expert,
who specializes in penetration testing and in other
testing methodologies that ensures the security of an
organization's information systems.
3. GREY HAT HACKERS:computer security expert who
may sometimes violate laws or typical ethical
standards, but does not have the malicious intent
typical of a black hat hacker.
⚔️WHAT IS INTERNET SECURITY🔒🔓..
Internet security is a branch of computer security specifically related to not
only Internet, often involving browser security and the World Wide Web, but
also network security as it applies to other applications or operating
systems as a whole.
PRECAUTIONS TO BE TAKEN TO

ENSURE INTERNET SECURITY


 1) Install Antivirus and Antimalware🐎
 The first thing you should do before connecting any new
computer, tablet, or smartphone to the Internet is install strong
antivirus and antimalware software to keep it safe. These
programs proactively stop malicious software and scripts from
running on your device in the first place. If they do manage to
be installed, these programs will effectively remove them.
 EXAMPLES Of antivirus : McAfee, Avast, BitDefender etc.
 EXAMPLES of antimalware : Ad-Ware, Malwarebytes etc.
2.CONFIGURE YOUR FIREWALL🔥🔥

 Firewalls help control traffic on your network, opening


and closing communication ports as necessary to allow
internet connectivity as needed. Configuring your
firewall sets rules, so it’s more difficult for hackers to
exploit webcams, printers, and other open ports you
may not even realize are open otherwise.

conjunction with your antivirus and antimalware software


is the best way to provide maximum device-level
protection from malicious code.

There are free and paid apps


like PEERBLOCK and ZONEALARM that provide a
firewall.
3.USE DATA ENCRYPTION
⚔️
 The translation of data into a secret code. Encryption is
the most effective way to achieve data security. To read
an encrypted file, you must have access to a secret key or
password that enables you to decrypt it.

Encryption is important because it allows you to securely


protect data that you don't want anyone else to have
access to. ... Espionage uses encryption to securely
protect folder contents, which could contain emails, chat
histories, tax information, credit card numbers, or any
other sensitive information.
4.DO NOT OPEN ATTACHMENTS FROM

UNKNOWN SOURCE 💻
1. One of the most common way through which virus spreads is email full stop ignore
unsolicited email
2. avoid opening the accha attachments, links, and forms in emails that come from
people you do not know which seems “phishy”.
3. Avoid untrustworthy downloads.
5.KEEP PASSWORD SAFE.****
 Do not use easy toister various sites for accessing their content during which we have to enter
a username and password. If we lost a password to email, bank or credit card account, we
could be facing monatery loss. We should therefore have very strong password. And for that
we have to follow the following steps.
 1.Used very strong password.Keep the length of the password at least 12 to 14 characters.
 do not use your surname, your pet name, your mother’s name, name of any family members
as the password.
 Do not Use easy to guess passwords.
SCAN ALL PORTABLE STORAGE

DEVICES BEFORE USE .🔌


 Pen drives are one of the most popular storage
device in use today due to their convenience
and portability.
 It has been found that they are also the most
common source of infection in computers.
 set up your anti-virus software to automatically
scan every portable device plugged into the
computer to ensure that your system is safe.
7.SECURE

TRANSACTIONS...📱📲📲
Do not send important informations like ok you usernames, passwords, or
any other personal details over an secure connection.
 Look for https: colon instead of of http: in your browser address bar the
‘https:’ indicates a secure connection.
THANK YOU
FOR WATCHING
🙏🙏
PRESENTATION BY :
ANUPRIYA

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy