SlideShare uma empresa Scribd logo
1 de 17
Protecting online data
By callum baughen
podcasts
What is a podcast?
A blog is a downloadable media file
What are podcasts used for?
To listen to someone you like while you on the
move.
How are podcasts different from blogs?
You listen to podcast you don’t need to write
anything
wikis
what is a wiki
A wiki is a web page where people can add, delete or
modify content
What are wikis used for?
Wikis are used to share information, tracking revision,
archiving Information
How are wikis different from blogs?
Wikis are different form blogs because you don’t have a
limit of text that you can send and also you can send
pictures.
blogs
A blog is a personal page or web site.
People can comment on your blog and post
there views
The bad thing is anyone can see it
Communication channels
Video conferencing
6 ways to keep safe when video conferencing
1. Segment your network.
2. Understand how your system uses the network.
3. Be prepared for firewall failure.
4. Restrict the links between video conferencing systems and the VoIP network.
5. Have a business continuity plan
6. avoid weak passwords
keeping Personal data online safe
Storing personal information
You should keep the information up to date
You shouldn't give the information out to
anyone
You should keep all the information in the work
place and not take it out
Don’t use a weak password
Safely viewing digital content
• Make sure you upload it and then only allow
certain people to view it and disable the
people you don’t want see it
• Don’t go to websites that you think are fake
you could be right and that website could be a
virus.
Safely uploading digital content
• When you upload somewhere you might not
be able to delete it.
• Never put your home address, mobile
number, if you want people to contact you
they should use a social media site.
• Never upload a picture of you in your uniform
if they see the badge or logo they can find
where you live
Data protection regulations
safety and security when setting up
and using your blog
• Whatever you post anyone can read it if you
not set it to private
• You need to password protection
• Don’t allow people to comment on your post
Securing data encryption
Firewalls
• Firewalls blocks information coming in or
coming out
• Firewalls are good to keep viruses out
• Never lose work to viruses
• Fast and easily to download
• Need to be up to date
Backups
We should back up because we don’t want to
lose work so then we have to do it again.
Many ways to back up you have memory sticks
floppy disks
Or even on the internet for example google.docs
or drop box
Secure sites.
• you know when a website is secure because it
has “https” this means Hyper Text Transfer
Protocol with Secure Sockets.
• If it is not secure it will say this HTTP so this is
hyper text transfer protocol.
• Blogs are effective communication channels
because anyone can post there views
• blogs can put peoples ideas together
• If you get stuck on something you can get help
from the blog by posting what you are stuck
on.

Mais conteúdo relacionado

Mais procurados

Sp13 w200-w11-part3
Sp13 w200-w11-part3Sp13 w200-w11-part3
Sp13 w200-w11-part3
educw200
 
Web 2.0 presentation
Web 2.0  presentationWeb 2.0  presentation
Web 2.0 presentation
c2charro
 

Mais procurados (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.
 
[THEC Talk] The Secure Network
[THEC Talk] The Secure Network[THEC Talk] The Secure Network
[THEC Talk] The Secure Network
 
Wordpress security best practices - WordCamp Waukesha 2017
Wordpress security best practices - WordCamp Waukesha 2017Wordpress security best practices - WordCamp Waukesha 2017
Wordpress security best practices - WordCamp Waukesha 2017
 
Security 101
Security 101Security 101
Security 101
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?
 
Free Web2.0 Tools for Really Cool Schools
Free Web2.0 Tools for Really Cool SchoolsFree Web2.0 Tools for Really Cool Schools
Free Web2.0 Tools for Really Cool Schools
 
Sp13 w200-w11-part3
Sp13 w200-w11-part3Sp13 w200-w11-part3
Sp13 w200-w11-part3
 
Disaster Proof your WordPress Website
Disaster Proof your WordPress WebsiteDisaster Proof your WordPress Website
Disaster Proof your WordPress Website
 
Web 2.0 presentation
Web 2.0  presentationWeb 2.0  presentation
Web 2.0 presentation
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
WAS-for-dummies
WAS-for-dummiesWAS-for-dummies
WAS-for-dummies
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
Blogging Basics
Blogging BasicsBlogging Basics
Blogging Basics
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Introduction to Modern Identity with Auth0's Developer
 Introduction to Modern Identity with Auth0's Developer Introduction to Modern Identity with Auth0's Developer
Introduction to Modern Identity with Auth0's Developer
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 

Destaque

My Philosophy of Teaching July 11-last draft A
My Philosophy of Teaching July 11-last draft AMy Philosophy of Teaching July 11-last draft A
My Philosophy of Teaching July 11-last draft A
Juanita V. Rodriguez
 
Zebra Waste Management Presentation
Zebra Waste Management PresentationZebra Waste Management Presentation
Zebra Waste Management Presentation
Yash Kajve
 

Destaque (18)

My Philosophy of Teaching July 11-last draft A
My Philosophy of Teaching July 11-last draft AMy Philosophy of Teaching July 11-last draft A
My Philosophy of Teaching July 11-last draft A
 
Mapas mentales gerencia de proyectos
Mapas mentales gerencia de proyectosMapas mentales gerencia de proyectos
Mapas mentales gerencia de proyectos
 
Enum
EnumEnum
Enum
 
El universo desde Eratóstenes a Newton
El universo desde Eratóstenes a NewtonEl universo desde Eratóstenes a Newton
El universo desde Eratóstenes a Newton
 
Relatório IBM X-Force ameaças e tendências de riscos
Relatório IBM X-Force ameaças e tendências de riscos Relatório IBM X-Force ameaças e tendências de riscos
Relatório IBM X-Force ameaças e tendências de riscos
 
Evolución estelar
Evolución estelarEvolución estelar
Evolución estelar
 
Tm t20
Tm t20Tm t20
Tm t20
 
Zebra Waste Management Presentation
Zebra Waste Management PresentationZebra Waste Management Presentation
Zebra Waste Management Presentation
 
Forcelandia 2016 Wave App Development
Forcelandia 2016   Wave App DevelopmentForcelandia 2016   Wave App Development
Forcelandia 2016 Wave App Development
 
Industrial communication 2016 English
Industrial communication 2016 EnglishIndustrial communication 2016 English
Industrial communication 2016 English
 
Mp10 pinpad bluetooth
Mp10 pinpad bluetoothMp10 pinpad bluetooth
Mp10 pinpad bluetooth
 
ET5x
ET5xET5x
ET5x
 
Interface in java By Dheeraj Kumar Singh
Interface in java By Dheeraj Kumar SinghInterface in java By Dheeraj Kumar Singh
Interface in java By Dheeraj Kumar Singh
 
Mc40 Zebra
Mc40 ZebraMc40 Zebra
Mc40 Zebra
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Java OOP Programming language (Part 3) - Class and Object
Java OOP Programming language (Part 3) - Class and ObjectJava OOP Programming language (Part 3) - Class and Object
Java OOP Programming language (Part 3) - Class and Object
 
C++ Files and Streams
C++ Files and Streams C++ Files and Streams
C++ Files and Streams
 
李聖傑 最近
李聖傑   最近李聖傑   最近
李聖傑 最近
 

Semelhante a Protecting online data unit 1

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Web 2 0 For Academic Researchers
Web 2 0 For Academic ResearchersWeb 2 0 For Academic Researchers
Web 2 0 For Academic Researchers
femi adi
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Cloud storage
Cloud storageCloud storage
Cloud storage
Era-Emyra
 

Semelhante a Protecting online data unit 1 (20)

Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Keep Your SIte Secure
Keep Your SIte SecureKeep Your SIte Secure
Keep Your SIte Secure
 
Green Hectares Rural Tech Factsheet – Webinars
Green Hectares Rural Tech Factsheet – WebinarsGreen Hectares Rural Tech Factsheet – Webinars
Green Hectares Rural Tech Factsheet – Webinars
 
Web 2 0 For Academic Researchers
Web 2 0 For Academic ResearchersWeb 2 0 For Academic Researchers
Web 2 0 For Academic Researchers
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Social Networking Tools for Novices
Social Networking Tools for NovicesSocial Networking Tools for Novices
Social Networking Tools for Novices
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 

Último

Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
ZurliaSoop
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Heena Escort Service
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
Cara Menggugurkan Kandungan 087776558899
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 

Último (20)

The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsSri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
 
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsCoorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMadikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Content strategy : Content empire and cash in
Content strategy : Content empire and cash inContent strategy : Content empire and cash in
Content strategy : Content empire and cash in
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
 
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsJhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 

Protecting online data unit 1

  • 1. Protecting online data By callum baughen
  • 2. podcasts What is a podcast? A blog is a downloadable media file What are podcasts used for? To listen to someone you like while you on the move. How are podcasts different from blogs? You listen to podcast you don’t need to write anything
  • 3. wikis what is a wiki A wiki is a web page where people can add, delete or modify content What are wikis used for? Wikis are used to share information, tracking revision, archiving Information How are wikis different from blogs? Wikis are different form blogs because you don’t have a limit of text that you can send and also you can send pictures.
  • 4. blogs A blog is a personal page or web site. People can comment on your blog and post there views The bad thing is anyone can see it
  • 6. Video conferencing 6 ways to keep safe when video conferencing 1. Segment your network. 2. Understand how your system uses the network. 3. Be prepared for firewall failure. 4. Restrict the links between video conferencing systems and the VoIP network. 5. Have a business continuity plan 6. avoid weak passwords
  • 7. keeping Personal data online safe
  • 8. Storing personal information You should keep the information up to date You shouldn't give the information out to anyone You should keep all the information in the work place and not take it out Don’t use a weak password
  • 9. Safely viewing digital content • Make sure you upload it and then only allow certain people to view it and disable the people you don’t want see it • Don’t go to websites that you think are fake you could be right and that website could be a virus.
  • 10. Safely uploading digital content • When you upload somewhere you might not be able to delete it. • Never put your home address, mobile number, if you want people to contact you they should use a social media site. • Never upload a picture of you in your uniform if they see the badge or logo they can find where you live
  • 12. safety and security when setting up and using your blog • Whatever you post anyone can read it if you not set it to private • You need to password protection • Don’t allow people to comment on your post
  • 14. Firewalls • Firewalls blocks information coming in or coming out • Firewalls are good to keep viruses out • Never lose work to viruses • Fast and easily to download • Need to be up to date
  • 15. Backups We should back up because we don’t want to lose work so then we have to do it again. Many ways to back up you have memory sticks floppy disks Or even on the internet for example google.docs or drop box
  • 16. Secure sites. • you know when a website is secure because it has “https” this means Hyper Text Transfer Protocol with Secure Sockets. • If it is not secure it will say this HTTP so this is hyper text transfer protocol.
  • 17. • Blogs are effective communication channels because anyone can post there views • blogs can put peoples ideas together • If you get stuck on something you can get help from the blog by posting what you are stuck on.

Notas do Editor

  1. A podcast is a downloadable media file you can download this to anything you want for example if you want listen to your favouites artists podcast download it on to you iPod the podcast are used for to listen to someone you like while you are on the move and how are podcasts different frim blogs because you can listen to podcast you don’t write anything unlike a blog you rights your views.
  2. What is a wiki, a wiki is a web page where people can add , delete or modify content a wiki is used to share information, tracking revision and archiving information , wikis are different from blogs because wikis you don’t have a limit of text to send.
  3. A blog is a personal page or web page about a set of information where you can comment your thoughts and can link other sites to your blog. For example if you needed help with coding you can put it on you blog and other people commenting answering your question on what is wrong. The advantages of blogs would that you can write your own thoughts on the page, it is quick and easy to set up a page, it is quick and easy to update and add news post, people can write things on your page and if you want to read peoples comments on your page then you can you have lot to choose from. Disadvantages are whatever you publish anyone can see it and put bad things onto it, blogs may be biased, blogs are time consuming it is finding the time to write and update your blog, there are a lot of dull blogs around so it takes time to find one worth reading.
  4. The segment your network, you should use a different LAN and a firewall so then you can make sure the video conferencing traffic from the rest of the network. You need to understand how your system works with the network so then if something goes wrong you can sort it out and you need to be prepared if you firewall fails you need to know how to fix it as it fails, you need to restrict the link between video conferencing systems and the VoIP network so the point here is protect your conferencing form getting interacted by a VoIP call and then listening in. have a business continuity plan make sure you have a plan of attack in case someone attacks your public and private network so then u can close it down and keep them out and then tell people it is down. And lastly Avoid weak passwords if you have a weak password anyone can hack into you network and hack into your video conferencing and listen in and always change it and mixed it up by using numbers , letters and symbols
  5. You need to keep all your information up to date and you shouldn't give the information out to anyone, you should keep all the information in the work place and not take it out you should password protected it and don’t use a weak password, use capital, numbers and symbol.
  6. Make sure you upload it and then only allow certain people to view it and disable the people you don’t want too see it don’t go to webistes that you think are fake you could be right and It could have a virus.
  7. When you upload somewhere you could not be able to delete it. You should never put your home address, mobile number, if you want people to contact you they should use a socail media site, never upload a picture of you in your uniform if they see the badge or logo they can find where you live.
  8. The data protection regulations are fairly and lawfully processed and processed for limited purpose , adequate relevant and not excessive and accurate and not kept longer than necessary and processed in accordance with the data subjects rights , secure and not transferred to countrises outside the European Economic Area with same protection. The offences are punishable as follows: Offence 1. Up to 6 months' prison and up to £5,000 in fines. Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit).
  9. Whatever you post anyone can read it if you do not set it to private , you will need to password protection and you should not allow people to comment on your post as they could post bad comments or abusive.
  10. Firewalls are good to keep virus out of your system so then all your data is safe and the virus won’t be able to get into the firewall, you will never lose work with a virus and it is easy and fast to download but it needs to be up to date so because new viruses are maked everyday and sent everyday
  11. We should back up because we don’t want to lose work so then we have to do it again you have many ways to back up you have memory sticks and floppy disk. You can even use the interent for example google.docs or drop box
  12. A secure sites is when a website is secure because has https this means hyper text transfer protocol with secure sockets and if it is not secure then it will say this http so this is hyper text transfer protocol.
  13. Blogs are effective communication channel for sharing information because anyone can post their views and blogs can put peoples ideas together and if you get stuck on something you can get help from the blog by posting what you are stuck on.