SlideShare uma empresa Scribd logo
1 de 53
Baixar para ler offline
Computing Ethics
Towards Safe Computing
       By: Dheeraj Mehrotra
 www.computerscienceexpertise.com

             computerscienceexpertise.com
               Towards Quality IT Literacy
computerscienceexpertise.com
  Towards Quality IT Literacy
Ensure you have the latest
 updates. Install updates and
security patches on all servers,
   desktop and laptop PCs.



          computerscienceexpertise.com
            Towards Quality IT Literacy
Reduce the risk of viruses.
 There are numerous things you
 can do to protect your computer
and your network against viruses.
  Using anti-virus software and
keeping it current is the first step,


            computerscienceexpertise.com
              Towards Quality IT Literacy
Use Windows Security Centre
to manage your settings. Get a
    clear picture of the security
  settings on your PC using the
 single, unified view provided in
  the Windows Security Centre.


           computerscienceexpertise.com
             Towards Quality IT Literacy
Download internet files from
 trusted sources only. If you're
  unsure if the files you want to
   download are safe, consider
   downloading them to a disk
  separate from your hard drive,
such as a CD or floppy. Then you
can scan the files with your virus
             scanner.
           computerscienceexpertise.com
             Towards Quality IT Literacy
Use password encryption to protect Office
  files. Improved encryption technology has
strengthened password security in Word 2003
     and Excel 2003 and extends password
encryption to PowerPoint 2003. Look under the
Tools menu in each of these three programs to
    activate password protection. This is an
 effective way to restrict access to confidential
              business information.




                computerscienceexpertise.com
                  Towards Quality IT Literacy
Clean your hard drive before you discard a
 PC. If you're getting a new PC or notebook and
   your old one is being discarded, be sure to
   remove any sensitive business or personal
  information before you let it go. This doesn't
  mean simply deleting files and emptying your
 Recycle Bin. Your options include reformatting
the hard drive or acquiring software that wipes it
                       clean.




                computerscienceexpertise.com
                  Towards Quality IT Literacy
Use a firewall. If your company
   uses always-on broadband to
  connect to the internet, install a
firewall as a basic line of defence
     against outside intruders.



            computerscienceexpertise.com
              Towards Quality IT Literacy
Never surf the web from a
server. As the command centre
for your entire network, a server
typically stores critical business
           information.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Be smart about passwords.
  Always use strong passwords
that are at least eight characters
 long and a combination of lower
and upper case letters, numbers
and symbols. Don't use the same
password repeatedly and make it
      a point to change your
      passwords frequently.
           computerscienceexpertise.com
             Towards Quality IT Literacy
Create secure, original
  passwords. Creating unique
 passwords is one of the easiest
  ways for consumers to ensure
their privacy and security online.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Avoid deceptive attempts to trick
 you into revealing credit card
   numbers, bank accounts,
 passwords or other personal
          information.



          computerscienceexpertise.com
            Towards Quality IT Literacy
To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
  any doubt, call the institution
claiming to need the information.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Avoid Phishing
                    What is phishing?
Phishing means sending an e-mail that falsely claims to
   be from a particular enterprise (like your bank) and
        asking for sensitive financial information.
 Phishing is sending out a 'bait' in the form of a spoofed
   e-mail that closely mimics most bank notifications.
 The fraudulent mail is socially engineered to convince
recipients to divulge sensitive information such as credit
 card numbers, PIN, social security numbers and some
          such information as per the experts.




                   computerscienceexpertise.com
                     Towards Quality IT Literacy
Practice basic e-mail and
 downloading quot;street smarts.quot;
Most viruses are transmitted as
     e-mail attachments.



          computerscienceexpertise.com
            Towards Quality IT Literacy
Avoid opening e-mail
attachments that contain quot;.vbs,quot;
     quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file
   extensions. Files that end in
these extensions are most likely
  to contain some sort of virus.


           computerscienceexpertise.com
             Towards Quality IT Literacy
Be wary of e-mail messages that
   ask for personal or financial
information such as user names
   and passwords, credit card
  numbers, and other sensitive
personal information, especially
   those that are alarming and
        upsetting in tone.

          computerscienceexpertise.com
            Towards Quality IT Literacy
Do not click any links inside an e-
   mail that is suspected to be
 spoofed. Instead, go directly to
the valid company's site then log
on from there or call the company
              directly.


           computerscienceexpertise.com
             Towards Quality IT Literacy
Ensure that any Web site visited
  is secure when submitting
 sensitive information such as
      credit card numbers



          computerscienceexpertise.com
            Towards Quality IT Literacy
Knowledge is still the best
protection from getting scammed.
It is important to educate oneself
         on Internet fraud.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Ensure that any Web site visited
  is secure when submitting
 sensitive information such as
      credit card numbers



          computerscienceexpertise.com
            Towards Quality IT Literacy
Visit websites by typing the URL
  directly into the address bar.
 Make sure any site you reveal
information to uses encryption.



          computerscienceexpertise.com
            Towards Quality IT Literacy
Check credit card and bank
 statements routinely. Notify
authorities if you suspect any
   abuses of your personal
         information.



         computerscienceexpertise.com
           Towards Quality IT Literacy
To avoid being a victim, never
respond to an e-mail requesting
personal information; if you have
  any doubt, call the institution
claiming to need the information.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Keep your passwords strong,
and keep them in your head.




        computerscienceexpertise.com
          Towards Quality IT Literacy
BACK UP THE HARD DRIVE
REGULARLY: Backing up files
 will not prevent exposure or
damage from a virus but it can
 minimize the consequences.



         computerscienceexpertise.com
           Towards Quality IT Literacy
INSTALL ANTI VIRUS
SOFTWARE: Make sure that you
have antivirus software installed
    and that it is up to date.



           computerscienceexpertise.com
             Towards Quality IT Literacy
Don't share your password
with anyone, and don't write it
down - the only secure place
 for your password is in your
            head.



          computerscienceexpertise.com
            Towards Quality IT Literacy
USE GOOD PASSWORDS: Use
Good Passwords. Do NOT allow
a password to be blank or empty.




          computerscienceexpertise.com
            Towards Quality IT Literacy
SCAN EVERY FILE DOWNLOADED
   FROM THE INTERNET BEFORE
  USING OR OPENING IT: Another
 way computers are infected is from
files downloaded from the internet. If
       you scan every file every
      time immediately after it is
     downloaded, the risk of being
      infected is greatly reduced

            computerscienceexpertise.com
              Towards Quality IT Literacy
BE WARY OF PUTTING YOUR
       DISK INTO OTHER
 COMPUTERS. If you use other
computers such as a colleague’s
computer, these computers may
not be protected. Make sure you
   scan any disk that has been
 in another computer as soon as
 you insert it into your computer.
           computerscienceexpertise.com
             Towards Quality IT Literacy
computerscienceexpertise.com
  Towards Quality IT Literacy
SCAN YOUR HARD DISK
REGULARLY FOR VIRUSES.




       computerscienceexpertise.com
         Towards Quality IT Literacy
Get anti-virus software. Use it.
     Keep it up to date.




          computerscienceexpertise.com
            Towards Quality IT Literacy
If you can't trust the source
you're downloading from, you
      can't trust the file.




         computerscienceexpertise.com
           Towards Quality IT Literacy
Don't leave a computer you're
 logged into unattended or
         unprotected.




         computerscienceexpertise.com
           Towards Quality IT Literacy
3.      When considering what services should
     be running on your system, here are a few
                    easy rules of thumb:
     If you don't know what it is or what it does,
     don't turn it on. In most every case, if you
       find out later that you need it, you can go
                     back and turn it on.
     If it's on, and you don't need it, turn it off.
      If it's off, and you don't need it, don't turn
                           it on.


                  computerscienceexpertise.com
                    Towards Quality IT Literacy
Oath by kids:
   I will not give out any personal information
  online without my parents' permission. This
includes my name, phone number, address, e-
 mail, location of my school, my parents' work
  address/ telephone numbers and credit card
     numbers, and my picture. This goes for
anywhere on the Internet, including e-mail, chat
   rooms, newsgroups - even Web sites that
   promise me free stuff or prizes, or on Web
             pages that I make myself.


                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:


  When using the Internet, I will
  always use a pretend name or
   nickname that doesn't reveal
    whether I'm a boy or a girl.



                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:




   When creating a password, I will
      make one up that is hard to
       guess but easy for me to
     remember. To avoid having it
     stolen, I will never reveal it to
   anyone (except my parents) - not
          even my best friend.
                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:



 I will not respond to any message
  that makes me uncomfortable. I
    will show an adult right away.




                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:


  I will arrange to meet a friend I
 have made on the Internet ONLY
  if one of my parents has been
   informed and will be present.




                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:



 I will not send an insulting or rude
  message to anyone online. This
   is called quot;flamingquot; and it is not
           good Netiquette.



                computerscienceexpertise.com
                  Towards Quality IT Literacy
Oath by kids:


  I will not open e-mail, files, links,
   pictures or games from people
    that I don't know or trust. I will
       always ask an adult first.



                computerscienceexpertise.com
                  Towards Quality IT Literacy
What you need to worry about:
Email frauds:
Emails that cheat you of huge sums of money by
offering fantastic overseas financial schemes and
promising great returns
nasty or obscene emails
People hacking into your account
People publishing your personal details (name,
photograph, telephone numbers) on dating or
pornographic sites without your consent
Identity theft: When people steal your personal
information



                  computerscienceexpertise.com
                    Towards Quality IT Literacy
THINGS YOU NEED TO WORRY
ABOUT:
Social engineering: When people trick you
into revealing your password
Downloading files or attachments that
may have Trojans (destructive programs
that masquerade as benign applications)
Clicking on links that can pick up your
personal details.
Losing money while shopping online
               computerscienceexpertise.com
                 Towards Quality IT Literacy
Precautions you can take:

Email security:
Be careful where you post/submit
your email id on public forums.
Share it only with known people.
Do not download attachments or
files received through emails sent
by unknown persons.
           computerscienceexpertise.com
             Towards Quality IT Literacy
At a cyber café:

Never surf from a cyber café if you are keying in
any sensitive data. The computer may have a
program running in the background that is
storing all your information.
Be careful of inquisitive surfers around.
Always logout of all your messengers and any
mailbox you have open, before you leave.




                computerscienceexpertise.com
                  Towards Quality IT Literacy
At home:


Most companies regularly release patches for security
holes in their software products. Always keep your
operating systems and software you regularly use (like
browsers, instant messengers, email programs, media
players) updated by downloading these patches.
Never click on links that say, 'download software' unless
you are absolutely sure of the content.
Never click on pop-ups that say, 'Click here for more
information'




                   computerscienceexpertise.com
                     Towards Quality IT Literacy
Better safe than sorry


If you stick to the above principle,
 you can avoid most of the online
              dangers.


            computerscienceexpertise.com
              Towards Quality IT Literacy
• An Initiative by:
  – Dheeraj Mehrotra
     • www.computerscienceexpertise.com
     • (TOWARDS QUALITY IT LITERACY FOR ALL)




                 computerscienceexpertise.com
                   Towards Quality IT Literacy
•
    Read a BLOG on QUALITY IN
    EDUCATION:
    http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/


    Visit: www.computerscienceexpertise.com
    The Quality IT learning Portal for All



                         computerscienceexpertise.com
                           Towards Quality IT Literacy

Mais conteúdo relacionado

Mais procurados

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

Mais procurados (19)

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
New internet security
New internet securityNew internet security
New internet security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 

Semelhante a Cyber Security

It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaWikki Verma
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-TechiesRichard Bush
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 

Semelhante a Cyber Security (20)

It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Internet
InternetInternet
Internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-Techies
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 

Mais de Dr. Dheeraj Mehrotra (National Awardee)

Mais de Dr. Dheeraj Mehrotra (National Awardee) (20)

200 wow teaching ideas
200 wow teaching ideas200 wow teaching ideas
200 wow teaching ideas
 
Green School Initiatives
Green School InitiativesGreen School Initiatives
Green School Initiatives
 
Ai session for teachers- A must attend.
Ai session for teachers- A must attend.Ai session for teachers- A must attend.
Ai session for teachers- A must attend.
 
Ten ways to secure zoom
Ten ways to secure zoomTen ways to secure zoom
Ten ways to secure zoom
 
Social distancing in schools
Social distancing in schoolsSocial distancing in schools
Social distancing in schools
 
Learn wow models of strategic thinking
Learn wow models of strategic thinkingLearn wow models of strategic thinking
Learn wow models of strategic thinking
 
Learn about students quality circles
Learn about students quality circlesLearn about students quality circles
Learn about students quality circles
 
Tackling distractions within classrooms
Tackling distractions within classroomsTackling distractions within classrooms
Tackling distractions within classrooms
 
Digital skills for teachers
Digital skills for teachersDigital skills for teachers
Digital skills for teachers
 
How to be a rockstar teacher
How to be a rockstar teacherHow to be a rockstar teacher
How to be a rockstar teacher
 
Learn periodic table of happiness
Learn periodic table of happinessLearn periodic table of happiness
Learn periodic table of happiness
 
Life skills Session
Life skills SessionLife skills Session
Life skills Session
 
Nlp for teachers
Nlp for teachersNlp for teachers
Nlp for teachers
 
20 teaching ideas
20 teaching ideas 20 teaching ideas
20 teaching ideas
 
21st century educator
21st century educator21st century educator
21st century educator
 
Enhancing Creativity in the classrooms
Enhancing Creativity in the classroomsEnhancing Creativity in the classrooms
Enhancing Creativity in the classrooms
 
Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !Academic audit in schools: The Need Today !
Academic audit in schools: The Need Today !
 
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in AcademicsCCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
CCE INITIATIVES BY CBSE: An Initiative towards Quality in Academics
 
The schooling of the 21st century
The schooling of the 21st centuryThe schooling of the 21st century
The schooling of the 21st century
 
Top 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their studentsTop 16 teachers mantras to impress their students
Top 16 teachers mantras to impress their students
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Cyber Security

  • 1. Computing Ethics Towards Safe Computing By: Dheeraj Mehrotra www.computerscienceexpertise.com computerscienceexpertise.com Towards Quality IT Literacy
  • 3. Ensure you have the latest updates. Install updates and security patches on all servers, desktop and laptop PCs. computerscienceexpertise.com Towards Quality IT Literacy
  • 4. Reduce the risk of viruses. There are numerous things you can do to protect your computer and your network against viruses. Using anti-virus software and keeping it current is the first step, computerscienceexpertise.com Towards Quality IT Literacy
  • 5. Use Windows Security Centre to manage your settings. Get a clear picture of the security settings on your PC using the single, unified view provided in the Windows Security Centre. computerscienceexpertise.com Towards Quality IT Literacy
  • 6. Download internet files from trusted sources only. If you're unsure if the files you want to download are safe, consider downloading them to a disk separate from your hard drive, such as a CD or floppy. Then you can scan the files with your virus scanner. computerscienceexpertise.com Towards Quality IT Literacy
  • 7. Use password encryption to protect Office files. Improved encryption technology has strengthened password security in Word 2003 and Excel 2003 and extends password encryption to PowerPoint 2003. Look under the Tools menu in each of these three programs to activate password protection. This is an effective way to restrict access to confidential business information. computerscienceexpertise.com Towards Quality IT Literacy
  • 8. Clean your hard drive before you discard a PC. If you're getting a new PC or notebook and your old one is being discarded, be sure to remove any sensitive business or personal information before you let it go. This doesn't mean simply deleting files and emptying your Recycle Bin. Your options include reformatting the hard drive or acquiring software that wipes it clean. computerscienceexpertise.com Towards Quality IT Literacy
  • 9. Use a firewall. If your company uses always-on broadband to connect to the internet, install a firewall as a basic line of defence against outside intruders. computerscienceexpertise.com Towards Quality IT Literacy
  • 10. Never surf the web from a server. As the command centre for your entire network, a server typically stores critical business information. computerscienceexpertise.com Towards Quality IT Literacy
  • 11. Be smart about passwords. Always use strong passwords that are at least eight characters long and a combination of lower and upper case letters, numbers and symbols. Don't use the same password repeatedly and make it a point to change your passwords frequently. computerscienceexpertise.com Towards Quality IT Literacy
  • 12. Create secure, original passwords. Creating unique passwords is one of the easiest ways for consumers to ensure their privacy and security online. computerscienceexpertise.com Towards Quality IT Literacy
  • 13. Avoid deceptive attempts to trick you into revealing credit card numbers, bank accounts, passwords or other personal information. computerscienceexpertise.com Towards Quality IT Literacy
  • 14. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information. computerscienceexpertise.com Towards Quality IT Literacy
  • 15. Avoid Phishing What is phishing? Phishing means sending an e-mail that falsely claims to be from a particular enterprise (like your bank) and asking for sensitive financial information. Phishing is sending out a 'bait' in the form of a spoofed e-mail that closely mimics most bank notifications. The fraudulent mail is socially engineered to convince recipients to divulge sensitive information such as credit card numbers, PIN, social security numbers and some such information as per the experts. computerscienceexpertise.com Towards Quality IT Literacy
  • 16. Practice basic e-mail and downloading quot;street smarts.quot; Most viruses are transmitted as e-mail attachments. computerscienceexpertise.com Towards Quality IT Literacy
  • 17. Avoid opening e-mail attachments that contain quot;.vbs,quot; quot;.scr,quot; quot;.exe,quot; or quot;.pifquot; file extensions. Files that end in these extensions are most likely to contain some sort of virus. computerscienceexpertise.com Towards Quality IT Literacy
  • 18. Be wary of e-mail messages that ask for personal or financial information such as user names and passwords, credit card numbers, and other sensitive personal information, especially those that are alarming and upsetting in tone. computerscienceexpertise.com Towards Quality IT Literacy
  • 19. Do not click any links inside an e- mail that is suspected to be spoofed. Instead, go directly to the valid company's site then log on from there or call the company directly. computerscienceexpertise.com Towards Quality IT Literacy
  • 20. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers computerscienceexpertise.com Towards Quality IT Literacy
  • 21. Knowledge is still the best protection from getting scammed. It is important to educate oneself on Internet fraud. computerscienceexpertise.com Towards Quality IT Literacy
  • 22. Ensure that any Web site visited is secure when submitting sensitive information such as credit card numbers computerscienceexpertise.com Towards Quality IT Literacy
  • 23. Visit websites by typing the URL directly into the address bar. Make sure any site you reveal information to uses encryption. computerscienceexpertise.com Towards Quality IT Literacy
  • 24. Check credit card and bank statements routinely. Notify authorities if you suspect any abuses of your personal information. computerscienceexpertise.com Towards Quality IT Literacy
  • 25. To avoid being a victim, never respond to an e-mail requesting personal information; if you have any doubt, call the institution claiming to need the information. computerscienceexpertise.com Towards Quality IT Literacy
  • 26. Keep your passwords strong, and keep them in your head. computerscienceexpertise.com Towards Quality IT Literacy
  • 27. BACK UP THE HARD DRIVE REGULARLY: Backing up files will not prevent exposure or damage from a virus but it can minimize the consequences. computerscienceexpertise.com Towards Quality IT Literacy
  • 28. INSTALL ANTI VIRUS SOFTWARE: Make sure that you have antivirus software installed and that it is up to date. computerscienceexpertise.com Towards Quality IT Literacy
  • 29. Don't share your password with anyone, and don't write it down - the only secure place for your password is in your head. computerscienceexpertise.com Towards Quality IT Literacy
  • 30. USE GOOD PASSWORDS: Use Good Passwords. Do NOT allow a password to be blank or empty. computerscienceexpertise.com Towards Quality IT Literacy
  • 31. SCAN EVERY FILE DOWNLOADED FROM THE INTERNET BEFORE USING OR OPENING IT: Another way computers are infected is from files downloaded from the internet. If you scan every file every time immediately after it is downloaded, the risk of being infected is greatly reduced computerscienceexpertise.com Towards Quality IT Literacy
  • 32. BE WARY OF PUTTING YOUR DISK INTO OTHER COMPUTERS. If you use other computers such as a colleague’s computer, these computers may not be protected. Make sure you scan any disk that has been in another computer as soon as you insert it into your computer. computerscienceexpertise.com Towards Quality IT Literacy
  • 34. SCAN YOUR HARD DISK REGULARLY FOR VIRUSES. computerscienceexpertise.com Towards Quality IT Literacy
  • 35. Get anti-virus software. Use it. Keep it up to date. computerscienceexpertise.com Towards Quality IT Literacy
  • 36. If you can't trust the source you're downloading from, you can't trust the file. computerscienceexpertise.com Towards Quality IT Literacy
  • 37. Don't leave a computer you're logged into unattended or unprotected. computerscienceexpertise.com Towards Quality IT Literacy
  • 38. 3. When considering what services should be running on your system, here are a few easy rules of thumb: If you don't know what it is or what it does, don't turn it on. In most every case, if you find out later that you need it, you can go back and turn it on. If it's on, and you don't need it, turn it off. If it's off, and you don't need it, don't turn it on. computerscienceexpertise.com Towards Quality IT Literacy
  • 39. Oath by kids: I will not give out any personal information online without my parents' permission. This includes my name, phone number, address, e- mail, location of my school, my parents' work address/ telephone numbers and credit card numbers, and my picture. This goes for anywhere on the Internet, including e-mail, chat rooms, newsgroups - even Web sites that promise me free stuff or prizes, or on Web pages that I make myself. computerscienceexpertise.com Towards Quality IT Literacy
  • 40. Oath by kids: When using the Internet, I will always use a pretend name or nickname that doesn't reveal whether I'm a boy or a girl. computerscienceexpertise.com Towards Quality IT Literacy
  • 41. Oath by kids: When creating a password, I will make one up that is hard to guess but easy for me to remember. To avoid having it stolen, I will never reveal it to anyone (except my parents) - not even my best friend. computerscienceexpertise.com Towards Quality IT Literacy
  • 42. Oath by kids: I will not respond to any message that makes me uncomfortable. I will show an adult right away. computerscienceexpertise.com Towards Quality IT Literacy
  • 43. Oath by kids: I will arrange to meet a friend I have made on the Internet ONLY if one of my parents has been informed and will be present. computerscienceexpertise.com Towards Quality IT Literacy
  • 44. Oath by kids: I will not send an insulting or rude message to anyone online. This is called quot;flamingquot; and it is not good Netiquette. computerscienceexpertise.com Towards Quality IT Literacy
  • 45. Oath by kids: I will not open e-mail, files, links, pictures or games from people that I don't know or trust. I will always ask an adult first. computerscienceexpertise.com Towards Quality IT Literacy
  • 46. What you need to worry about: Email frauds: Emails that cheat you of huge sums of money by offering fantastic overseas financial schemes and promising great returns nasty or obscene emails People hacking into your account People publishing your personal details (name, photograph, telephone numbers) on dating or pornographic sites without your consent Identity theft: When people steal your personal information computerscienceexpertise.com Towards Quality IT Literacy
  • 47. THINGS YOU NEED TO WORRY ABOUT: Social engineering: When people trick you into revealing your password Downloading files or attachments that may have Trojans (destructive programs that masquerade as benign applications) Clicking on links that can pick up your personal details. Losing money while shopping online computerscienceexpertise.com Towards Quality IT Literacy
  • 48. Precautions you can take: Email security: Be careful where you post/submit your email id on public forums. Share it only with known people. Do not download attachments or files received through emails sent by unknown persons. computerscienceexpertise.com Towards Quality IT Literacy
  • 49. At a cyber café: Never surf from a cyber café if you are keying in any sensitive data. The computer may have a program running in the background that is storing all your information. Be careful of inquisitive surfers around. Always logout of all your messengers and any mailbox you have open, before you leave. computerscienceexpertise.com Towards Quality IT Literacy
  • 50. At home: Most companies regularly release patches for security holes in their software products. Always keep your operating systems and software you regularly use (like browsers, instant messengers, email programs, media players) updated by downloading these patches. Never click on links that say, 'download software' unless you are absolutely sure of the content. Never click on pop-ups that say, 'Click here for more information' computerscienceexpertise.com Towards Quality IT Literacy
  • 51. Better safe than sorry If you stick to the above principle, you can avoid most of the online dangers. computerscienceexpertise.com Towards Quality IT Literacy
  • 52. • An Initiative by: – Dheeraj Mehrotra • www.computerscienceexpertise.com • (TOWARDS QUALITY IT LITERACY FOR ALL) computerscienceexpertise.com Towards Quality IT Literacy
  • 53. Read a BLOG on QUALITY IN EDUCATION: http://www.blogit.com/Blogs/Affil/?315505/Blog.aspx/tqmhead/ Visit: www.computerscienceexpertise.com The Quality IT learning Portal for All computerscienceexpertise.com Towards Quality IT Literacy