SlideShare uma empresa Scribd logo
1 de 39
Internet Safety
Prepared by
Fatih Kazmacan
Muhammet Yasin PAK
Hasan Uçar
Overview
•   Why do people use the internet?
•   Internet usage statistics
•   Potential dangers of the internet
•   Internet safety tips for everyone
•   Survey
Why do people use the internet?
Why do people use the internet?
• Communication
• Information
• Entertainment
Communication
• E-mail
• Social media
• Instant Messaging
  Stay in touch with your friends…
            …from school…
                 …your city…
                       …your world!
Information
The world’s biggest library!
• Look up words
• Read stories
• Learn almost anything!
Entertainment
•   Play games by yourself or with others
•   Listen to music
•   Watch video clips
•   Find out about your favorite sports team or
    movie stars!
Internet usage statistics
Internet usage statistics

• 2,267,233,742 internet users
• 835 million Facebook users
• 526 million daily active users on average in
  March 2012.
• More than 300 million photos uploaded to
  Facebook per day
Internet is good but…
  • The internet is fun.

  • But it could also be
    dangerous.

  • That’s why,please listen
    carefully.
Potential dangers of the internet
 Causes:
 • Harmful softwares
 • The lack of information about
 internet safety

 Results:
 • Personal information can be stolen.
 • Internet fraud and scams
 (your money can be stolen)
Cause : Harmful softwares

• Malware (malicious software)
      Computer viruses
      Spams
      Worms
      Trojan horses
      Spyware
      Adware
Computer viruses

• A computer virus is a computer program that
  can replicate itself and spread from one
  computer to another.
      Delete important files
      Cause the computer to crash
      Spread easily
      Hide itself
Spams
• The term spam most often refers to an e-mail
  message sent to a large number of people
  without their consent.
• Spam: E-mail messages sent from someone you
  don’t know
An example : Send fake mail
Cause: The lack of information about internet
safety

 • Internet users have no enough information
 • Mass media should raise the awareness of public
Facebook

In the Ottoman
Empire
Copy-Paste 
Result: Personal information can be
 stolen
• Bad people may use your information for doing
  bad things

• Photos may be copied and used inappropriately
  by other people
Result: Internet Fraud and Scams (your
money can be stolen)
• Unsafe online shopping
     Especially, via credit card
• Keylogging
  ▫ is the action of tracking (or logging) the keys
    struck on a keyboard
Internet safety tips for everyone
 • NEVER GIVE OUT YOUR PERSONAL
 INFORMATION !
  Your real name   Phone number
  Address          Birthdate School number


 • KEEP YOUR PRIVATE LIFE PRIVATE !

 • USE NICK NAMES !
Internet safety tips for everyone
• DON’T UPLOAD PHOTOS PUBLICLY !
  ▫ Only your friends and family
  ▫ Photos may be copied and used
    inappropriately



• DON’T OPEN UNKNOWN WEBSITES !
  ▫ Especially; full free software websites
     A Quote : “The Only Free Cheese is in the Mousetrap”
Internet safety tips for everyone
• DON’T OPEN EMAIL FROM STRANGERS !
 ▫ Emails may contain viruses
 ▫ Delete emails from strangers !

• DON’T OPEN ANY ATTACHMENTS THAT YOU DON’T
  KNOW !
 ▫ It is so important

• LOG OFF WHEN YOU ARE DONE
 ▫ Especially in public internet cafe
Internet safety tips for everyone
• When using Email & Facebook…
  ▫ Change your password to your login often
  ▫ Keep it in a safe place



• ALWAYS USE A STRONG PASSWORD !
  ▫ Should be a combination of alphabets, number and
    special characters
  ▫ Should have a length of size greater than 8 characters.
Internet safety tips for everyone

• ALWAYS INSTALL GOOD ANTIVIRUS
  SOFTWARE
  ▫ Update it regularly
Most importantly,


• BECOME AWARE OF …
Survey

• About internet usage and safety

• Respondents: Male:56 Female:96

• It was made with Turkish questions
Survey Results
• Do you have any technological tools to connect
  the internet? (pc,mobile phone,tablet)
Do you have internet connection at
home?
Avarage internet usage per day
The frequency of using e-mail
The frequency of changing password
The length of the password
Is the password strong?
The use of Anti-virus programme
Have you ever be exposed to hack ?
Internet safety

Mais conteúdo relacionado

Mais procurados

Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 

Mais procurados (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Internet security
Internet securityInternet security
Internet security
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet security
Internet securityInternet security
Internet security
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 

Semelhante a Internet safety

empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 

Semelhante a Internet safety (20)

Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Computer security
Computer securityComputer security
Computer security
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Internet safety

  • 1. Internet Safety Prepared by Fatih Kazmacan Muhammet Yasin PAK Hasan Uçar
  • 2. Overview • Why do people use the internet? • Internet usage statistics • Potential dangers of the internet • Internet safety tips for everyone • Survey
  • 3. Why do people use the internet?
  • 4. Why do people use the internet? • Communication • Information • Entertainment
  • 5. Communication • E-mail • Social media • Instant Messaging Stay in touch with your friends… …from school… …your city… …your world!
  • 6. Information The world’s biggest library! • Look up words • Read stories • Learn almost anything!
  • 7. Entertainment • Play games by yourself or with others • Listen to music • Watch video clips • Find out about your favorite sports team or movie stars!
  • 9. Internet usage statistics • 2,267,233,742 internet users • 835 million Facebook users • 526 million daily active users on average in March 2012. • More than 300 million photos uploaded to Facebook per day
  • 10. Internet is good but… • The internet is fun. • But it could also be dangerous. • That’s why,please listen carefully.
  • 11. Potential dangers of the internet Causes: • Harmful softwares • The lack of information about internet safety Results: • Personal information can be stolen. • Internet fraud and scams (your money can be stolen)
  • 12. Cause : Harmful softwares • Malware (malicious software)  Computer viruses  Spams  Worms  Trojan horses  Spyware  Adware
  • 13. Computer viruses • A computer virus is a computer program that can replicate itself and spread from one computer to another.  Delete important files  Cause the computer to crash  Spread easily  Hide itself
  • 14. Spams • The term spam most often refers to an e-mail message sent to a large number of people without their consent. • Spam: E-mail messages sent from someone you don’t know
  • 15. An example : Send fake mail
  • 16.
  • 17. Cause: The lack of information about internet safety • Internet users have no enough information • Mass media should raise the awareness of public
  • 18.
  • 21. Result: Personal information can be stolen • Bad people may use your information for doing bad things • Photos may be copied and used inappropriately by other people
  • 22. Result: Internet Fraud and Scams (your money can be stolen) • Unsafe online shopping  Especially, via credit card • Keylogging ▫ is the action of tracking (or logging) the keys struck on a keyboard
  • 23. Internet safety tips for everyone • NEVER GIVE OUT YOUR PERSONAL INFORMATION ! Your real name Phone number Address Birthdate School number • KEEP YOUR PRIVATE LIFE PRIVATE ! • USE NICK NAMES !
  • 24. Internet safety tips for everyone • DON’T UPLOAD PHOTOS PUBLICLY ! ▫ Only your friends and family ▫ Photos may be copied and used inappropriately • DON’T OPEN UNKNOWN WEBSITES ! ▫ Especially; full free software websites  A Quote : “The Only Free Cheese is in the Mousetrap”
  • 25. Internet safety tips for everyone • DON’T OPEN EMAIL FROM STRANGERS ! ▫ Emails may contain viruses ▫ Delete emails from strangers ! • DON’T OPEN ANY ATTACHMENTS THAT YOU DON’T KNOW ! ▫ It is so important • LOG OFF WHEN YOU ARE DONE ▫ Especially in public internet cafe
  • 26. Internet safety tips for everyone • When using Email & Facebook… ▫ Change your password to your login often ▫ Keep it in a safe place • ALWAYS USE A STRONG PASSWORD ! ▫ Should be a combination of alphabets, number and special characters ▫ Should have a length of size greater than 8 characters.
  • 27. Internet safety tips for everyone • ALWAYS INSTALL GOOD ANTIVIRUS SOFTWARE ▫ Update it regularly
  • 29. Survey • About internet usage and safety • Respondents: Male:56 Female:96 • It was made with Turkish questions
  • 30. Survey Results • Do you have any technological tools to connect the internet? (pc,mobile phone,tablet)
  • 31. Do you have internet connection at home?
  • 33. The frequency of using e-mail
  • 34. The frequency of changing password
  • 35. The length of the password
  • 36. Is the password strong?
  • 37. The use of Anti-virus programme
  • 38. Have you ever be exposed to hack ?