Please enable JavaScript.
Coggle requires JavaScript to display documents.
INTERNET SAFETY AND DIGITAL ETIQUETTE - Coggle Diagram
INTERNET SAFETY AND DIGITAL ETIQUETTE
Overview of internet safety
Sensetive information such as personal information and identity, passwords are often associated with personal property and privacy and may present security concerns if leaked
Trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet
The purpose of email security and pivacy
Email encryption protects confidential information such as your credit card number , banking account number, social security number etc.
Without email encryption , hackers can easily intercept , open and read your emails.
Email security refers to the collective measures used to secure the access to access and contentbof an email account or services
.
The element of strong password
- 8-12 characters( numbers, symbols, capital letters and lower case letters
Outline the online predators
Identify ways to prevent online predator
Set boundaries
Purchase safety software
Contact the authorities
Guard your privacy
Check your computer
Avoid chat rooms
Talk to your child
Listen to your instincts
List the online predator characteristics
Watch out for flattery
Be wary of requests to meet
Identity suspicious behaviour
Understand grooming
Look for changes in your child's behavior
Learn common traits of predators
The best practice for securing online and network transaction to prevent hacking and spyware
Use strong passwords and if possible use OTP during transactions
Ensure the use of virtual private network
Protect your computer against threats
Look for the signs that show that your information is safe
The etiquettes in computer application
The best practise of computer ethics in education
Computer ethics are increasingly becoming important
[Examples of computer ethics include not using a computer to steal or harm others
Regarding teaching young children computer ethics
The best practise of computer ethics in workplace
Thou shalt not use a computer to bear false witness
Thou shalt not copy or use proprietary software for which you have not paid
Thou shalt not use a computer steal
Thou shalt not use other people's computer resources without authorization or proper compensation
Thou shalt not snoop around in other people's computer files
Thou shalt not appropriate other people's intellectual output
Thou shalt not interfere with other people's computer work
Thou shalt think about the social consequences of the program you are writing or the system you are designing
Thou shalt not use a computer to harm other people
Thou shalt always use a computer in ways to ensure consideration and respect for other humans
Inappropriate use of computers can put the company at risk ethically , legally, and financially
Computer security and privacy
List the component of computer system
Computer software
Humanware
Hardware
Type of computer security and privacy
Hackers and predators
Phishing
Spyware threats
Internet scams
Computer viruses
Malware
The nature and security threats
The nature and security threats
Secure your network
Think before you click
Keep your operating system current
Keep your personal information safe
Run regularly scheduled scans with your anti-virus software
Don't use open wi-fi
Keep your anti-virus software up to date
Back up your files
Install anti-virus/ malware software
Use multiple strong passwords
The best way to protect your computer
Don't open suspicious attachments or click unusual links in massages
Use antivirus software and keep it current
Browse the web safely
Keep all software up to date
Stay away from pirated material
Use a firewall
Do not use USBs or other external devices unless you own them
Wiondows security