SlideShare uma empresa Scribd logo
1 de 17
 ANYTHING YOU POST ON THE INTERNET IT
WILL BE THERE FOR A LONG TIME
 73%OF TEEN AND 68% OF YOUNG ADULTS
USE SOCIAL NETWORKS
 AND THE HALF OF THEM POST PERSONAL
INFORMATION ON THEN
 IF YOU DO THAT, THE HACKERS OR PEOPLE
CAN ATTACK YOU
 IN THE ERA OF SMARTPHONES
CIBERSAFETY SHOULD EXTEND TO YOUR
SMARTPHONE TOO
 DONT ACCEPT INCOMING CALLS OF TEXT
FROM UNKNOWN PEOPLE
 NO MATTER HOW SECURE YOU ARE, YOU
CAN STILL GET HACKED
1. CHANGE YOUR PASSWORD AND MAKE IT
IMPREDICTIBLE.
2. DO THE TWO STEPS VERIFICATION
3. CHECK YOUR BOX AND NOTIFY YOUR
CONTACTS
4. SEARCH VIRUS
5. BACK UP YOUR FILES
 YOU MUST HAVE ACTUALIZED YOUR
OPERATING SISTEM AND APPLICATIONS
WITH THE NEWEST SECUITY SISTEM
 TIP 6: DONT DOWNLOAD ANITHING FROM A
SUSPICIUS PAGE
 IF YOU DOWNLOAD SOMETHING FROM A
SUSPICIUS PAGE, IT CAN HAVE VIRUS
 TIP 7: ACCEPT ONLY KNOWN CONTACTS
 BECAUSE IF YOU ACCEPT ALL THE
CONTACTS YOU HAVE, ITS POSSIBLE THAT
ONE OF THEM CAN BE DANGEROUS
 IF A HACKER ATTACK YOU, IT WILL BE MORE
DIFFICULT TO DO IT IF YOU HAVE A STRONG
PASSWORD

Mais conteúdo relacionado

Mais procurados

Marleah
MarleahMarleah
Marleah
morag
 
Internet safety by justin p.
Internet safety by justin p.Internet safety by justin p.
Internet safety by justin p.
Justin Park
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Arlan2
Arlan2Arlan2
Arlan2
morag
 

Mais procurados (18)

How to can someone track your whatsapp
How to can someone track your whatsappHow to can someone track your whatsapp
How to can someone track your whatsapp
 
How to monitor whatsapp messages android
How to monitor whatsapp messages androidHow to monitor whatsapp messages android
How to monitor whatsapp messages android
 
10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezen10 redenen casadata om voor casadata te kiezen
10 redenen casadata om voor casadata te kiezen
 
Marleah
MarleahMarleah
Marleah
 
Hack Snapchat Account
Hack Snapchat  AccountHack Snapchat  Account
Hack Snapchat Account
 
How to access espn3
How to access espn3How to access espn3
How to access espn3
 
Mcx enews app
Mcx enews appMcx enews app
Mcx enews app
 
Some basics of computer security
Some basics of computer securitySome basics of computer security
Some basics of computer security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructions
 
Internet safety by justin p.
Internet safety by justin p.Internet safety by justin p.
Internet safety by justin p.
 
SAFETIS - early fire detection system
SAFETIS - early fire detection systemSAFETIS - early fire detection system
SAFETIS - early fire detection system
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Can you track viber messages
Can you track viber messagesCan you track viber messages
Can you track viber messages
 
Arlan2
Arlan2Arlan2
Arlan2
 
Internet policy
Internet policyInternet policy
Internet policy
 
Chromebook instructions
Chromebook instructionsChromebook instructions
Chromebook instructions
 

Destaque

Destaque (17)

Security tips
Security tipsSecurity tips
Security tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet security
Internet securityInternet security
Internet security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security tips
Security tipsSecurity tips
Security tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Harry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
Harry Coumnas Shocking Revelations about the Legendary Lost City Of CleopatraHarry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
Harry Coumnas Shocking Revelations about the Legendary Lost City Of Cleopatra
 
Tic(1)
Tic(1)Tic(1)
Tic(1)
 
Driving DevOps for Oracle with the orawls Puppet Modules
Driving DevOps for Oracle with the orawls Puppet ModulesDriving DevOps for Oracle with the orawls Puppet Modules
Driving DevOps for Oracle with the orawls Puppet Modules
 
Internet more secure
Internet more secureInternet more secure
Internet more secure
 
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
EMBEDDING THE INTERNATIONAL DIMENSION INTO SUSTAINABLE ARCHITECTURE’S CURRICU...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Bits en bites magazine media 2017
Bits en bites magazine media 2017Bits en bites magazine media 2017
Bits en bites magazine media 2017
 

Semelhante a Internet more secure (1)

2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
TimelineCR
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
Marian Merritt
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 

Semelhante a Internet more secure (1) (20)

Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
2012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_0509122012 norton cybercrime_report_master_final_050912
2012 norton cybercrime_report_master_final_050912
 
Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
Psychological aspect of social engineering
Psychological aspect of social engineeringPsychological aspect of social engineering
Psychological aspect of social engineering
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Htc itmr 30-05-13
Htc   itmr   30-05-13Htc   itmr   30-05-13
Htc itmr 30-05-13
 
Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014Brand Aid - Charlotte October 2014
Brand Aid - Charlotte October 2014
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
LESSON 2.1.pptx
LESSON 2.1.pptxLESSON 2.1.pptx
LESSON 2.1.pptx
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Safety online radysh do14
Safety online radysh do14Safety online radysh do14
Safety online radysh do14
 
Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?Internet safety: Myth or Achievable Goal?
Internet safety: Myth or Achievable Goal?
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Internet more secure (1)

  • 1.
  • 2.
  • 3.  ANYTHING YOU POST ON THE INTERNET IT WILL BE THERE FOR A LONG TIME
  • 4.
  • 5.  73%OF TEEN AND 68% OF YOUNG ADULTS USE SOCIAL NETWORKS  AND THE HALF OF THEM POST PERSONAL INFORMATION ON THEN  IF YOU DO THAT, THE HACKERS OR PEOPLE CAN ATTACK YOU
  • 6.
  • 7.  IN THE ERA OF SMARTPHONES CIBERSAFETY SHOULD EXTEND TO YOUR SMARTPHONE TOO  DONT ACCEPT INCOMING CALLS OF TEXT FROM UNKNOWN PEOPLE
  • 8.
  • 9.  NO MATTER HOW SECURE YOU ARE, YOU CAN STILL GET HACKED 1. CHANGE YOUR PASSWORD AND MAKE IT IMPREDICTIBLE. 2. DO THE TWO STEPS VERIFICATION 3. CHECK YOUR BOX AND NOTIFY YOUR CONTACTS 4. SEARCH VIRUS 5. BACK UP YOUR FILES
  • 10.
  • 11.  YOU MUST HAVE ACTUALIZED YOUR OPERATING SISTEM AND APPLICATIONS WITH THE NEWEST SECUITY SISTEM
  • 12.  TIP 6: DONT DOWNLOAD ANITHING FROM A SUSPICIUS PAGE
  • 13.  IF YOU DOWNLOAD SOMETHING FROM A SUSPICIUS PAGE, IT CAN HAVE VIRUS
  • 14.  TIP 7: ACCEPT ONLY KNOWN CONTACTS
  • 15.  BECAUSE IF YOU ACCEPT ALL THE CONTACTS YOU HAVE, ITS POSSIBLE THAT ONE OF THEM CAN BE DANGEROUS
  • 16.
  • 17.  IF A HACKER ATTACK YOU, IT WILL BE MORE DIFFICULT TO DO IT IF YOU HAVE A STRONG PASSWORD