INTERNET SAFETY AND DIGITAL ETIQUETTE

Overview of internet safety

The purpose of email security and pivacy

Email encryption protects confidential information such as your credit card number , banking account number, social security number etc.

Without email encryption , hackers can easily intercept , open and read your emails.

Email security refers to the collective measures used to secure the access to access and contentbof an email account or services.

Sensetive information such as personal information and identity, passwords are often associated with personal property and privacy and may present security concerns if leaked

Trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet

Outline the online predators

The best practice for securing online and network transaction to prevent hacking and spyware

The element of strong password
- 8-12 characters( numbers, symbols, capital letters and lower case letters

Use strong passwords and if possible use OTP during transactions

Ensure the use of virtual private network

Protect your computer against threats

Look for the signs that show that your information is safe

Identify ways to prevent online predator

List the online predator characteristics

Watch out for flattery

Be wary of requests to meet

Identity suspicious behaviour

Understand grooming

Look for changes in your child's behavior

Learn common traits of predators

Set boundaries

Purchase safety software

Contact the authorities

Guard your privacy

Check your computer

Avoid chat rooms

Talk to your child

Listen to your instincts

The etiquettes in computer application

The best practise of computer ethics in education

Computer ethics are increasingly becoming important

[Examples of computer ethics include not using a computer to steal or harm others

Regarding teaching young children computer ethics

The best practise of computer ethics in workplace

Thou shalt not use a computer to bear false witness

Thou shalt not copy or use proprietary software for which you have not paid

Thou shalt not use a computer steal

Thou shalt not use other people's computer resources without authorization or proper compensation

Thou shalt not snoop around in other people's computer files

Thou shalt not appropriate other people's intellectual output

Thou shalt not interfere with other people's computer work

Thou shalt think about the social consequences of the program you are writing or the system you are designing

Thou shalt not use a computer to harm other people

Thou shalt always use a computer in ways to ensure consideration and respect for other humans

Inappropriate use of computers can put the company at risk ethically , legally, and financially

Computer security and privacy

List the component of computer system

Computer software

Humanware

Hardware

Type of computer security and privacy

Hackers and predators

Phishing

Spyware threats

Internet scams

Computer viruses

Malware

The nature and security threats

The nature and security threats

Secure your network

Think before you click

Keep your operating system current

Keep your personal information safe

Run regularly scheduled scans with your anti-virus software

Don't use open wi-fi

Keep your anti-virus software up to date

Back up your files

Install anti-virus/ malware software

Use multiple strong passwords

The best way to protect your computer

Don't open suspicious attachments or click unusual links in massages

Use antivirus software and keep it current

Browse the web safely

Keep all software up to date

Stay away from pirated material

Use a firewall

Do not use USBs or other external devices unless you own them

Wiondows security