1 / 42

ICAICT103A

ICAICT103A. Use, communicate and search securely in the internet. Organisational Guidelines. Awareness of company policies on Internet access. Facebook. Facebook fun to use but be careful what you display for all eyes to see. Search Engines. What is a search engine?

jamar
Download Presentation

ICAICT103A

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICAICT103A Use, communicate and search securely in the internet

  2. Organisational Guidelines • Awareness of company policies on Internet access

  3. Facebook • Facebook fun to use but be careful what you display for all eyes to see

  4. Search Engines • What is a search engine? • Search engines are programs that search documents for specified keywords.

  5. Appropriate key words • Keyword searches have a tough time distinguishing between words that are spelled the same way, but mean something different (i.e. hard cider, a hard stone, a hard exam, and the hard drive on your computer). This often results in hits that are completely irrelevant to your query. • Group words with pluses – hard+exam • Or group words in between talking marks “hard exam” • Practice using the + sign Hard+drive

  6. General Hints • Learn how to use quotes or pluses - With most search engines, if you enter two words, say black holes, the engine will search for documents that contain either one of those words. Thus, you will get all documents containing black and all documents containing holes, which is probably not what you intended. • So, instead of entering black holes, try entering "black holes" or black+holes.

  7. Site Search • Site search - The site search appears on the top right of every page on the site: This search works like Google and will bring up a list of all types of material on the DFID website when you type in some key words. Generally, all the words you put in the query will be used.

  8. Advanced Search • Try these: • Google advanced search • Yahoo precise search • HotBot advanced search • Altavista advanced search

  9. Advanced Search • Google advanced search • http://www.google.com.au/advanced_search

  10. Google • http://www.google.com.au/ • I’m feeling lucky • http://www.youtube.com/watch?v=5fvL3mNtl1g • Google privacy watch video

  11. How to delete history • Codes shared over the internet are called cookies • Cookies store bits of information of all the pages you have visited • Cookies can be exploited by hackers to attack your computers system • Open internet explorer, go to tools, go to internet options,

  12. Deleting History Tick cookies and then delete

  13. Security Settings • Go to internet explorer • Tools Button, Internet Options Press security Then click and hold the security slider until you are happy with the security level

  14. Search Expression • How to save a web page Saved on desktop

  15. Bookmarks • How to make a bookmark in internet explorer Add to favorites

  16. Bookmark Folder • Go to your • Add to favorites New folder

  17. Print a Web Page • Printing a web page • Open internet explorer • Find a web page • Select text you want to print • Select print from your ribbon

  18. Print a Web Page • A dialog box will appear • Check the selection button • Select print • The selected text should appear on the printed page

  19. Consumer Sites • Consumer sites are web pages made specifically for buying products • Find these sites using your favorite search engine • Office Works • Bunnings • K-Mart Online forms

  20. Transactions • How do your know when a transaction is safe • Trusted sites – well known sites can be trusted

  21. Online Transaction • Access an online transaction site • http://www.youtube.com/watch?v=v4osQ4oASjY

  22. Security • When sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock () in the bottom right corner of your browser window or next to the address bar.If visible, this lock should also be in the locked position and not unlocked.

  23. Security • While the lock is in the lock position, data is encrypted, which helps anyone from understanding the data it its intercepted . When no lock is visible or in the unlocked position all information is plaintext and can be read by anyone. Encrypted pages usually use log ins can you think of any sites that would use a log in.

  24. High Priority Pages • Log in pages Encrypted pages

  25. CAPTCHA • A CAPTCHA : is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. Computer programs can access websites to retrieve data, as the CAPTCHA is a picture the computer cannot read.

  26. Security • We also suggest making sure the URL begins with https • You can also have a look at the URL: if it starts with “https://", you are on a secured page; if the URL starts with "http://", you're not.

  27. Boolean Search • What is Boolean Search? • Boolean searches allow you to combine words and phrases using the words AND, OR, NOT and NEAR (otherwise known as Boolean operators) to limit, widen, or define your search. Most Internet search engines and Web directories default to these Boolean search parameters anyway, but a good Web searcher should know how to use basic Boolean operators.

  28. Meta-Search Tools • A meta - search engine is a search tool that sends user request to several other search engines or databases and aggregates the result into a single list.

  29. Search • Search your field of expertise and take note of the first site that comes up

  30. Virtual Community • A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interest or goals. • Go to http://en.wikipedia.org/wiki/Virtual_community Type in virtual community logos into your search engine then choose images and see what the result is

  31. Domain Name • What is a Domain Name? • If you see the acronym DNS it means Domain Name System- A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the internet. Domain names are formed by the rules and procedures of the Domain Name System

  32. Domain Name Search • Search this Domain Name and tell me what it is. • http://bloggingpirate.wordpress.com/

  33. What is after the Dot • .com means - .com describes that a web site has some kind of "commercial" intent. This is what we call a "top level domain" address, and it used to be a way for a web site to convey its publishing intent. • .net means - .NET is "Top level domain originally for network providers” • http://www.internetslang.com/.NET-meaning-definition.asp

  34. History • How to check your internet history • Go to the favorites bar • Click on history

  35. Web Page Threats • Smart screen filter • Go to internet explorer • Choose tools • Choose smart screen filter • A pop up dialog box

  36. Spam • Spam email is not only a nuisance, it’s a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email to get a clueless victim to click on a link to a malicious website.

  37. What is a Trojan? • A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is eg to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus.

  38. Spam • Spammers will illegally buy lists of real people's email addresses. • Spammers will use "harvesting" programs that scour the Internet like Google, and copy any text that contains the "@" character. • Spammers will use "dictionary" (brute force) programs like hackers. • You will unwittingly volunteer your email address to dishonest subscribe/unsubscribe online services.

  39. Suspicious Email • Beware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.

  40. Phishing • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.

  41. USB • USB – stands for universal serial bus • A USB lying around an office may have harmful virus in its contents. If a USB is found it is best not to attach it to your computer

  42. Bibliography • http://www.totallylocalhr.com/images/Computer.gif • http://jokesprank.com/blog/wp-content/uploads/2011/01/facebook-cartoon.gif • http://www.coseom.com/wp-content/uploads/Search-Engine-Optimization4.jpg • Webopedia • Wikipedia • http://techzyn.com/cgi-sys/suspendedpage.cgi • http://imagine.gsfc.nasa.gov/docs/ask_astro/web_search.html • http://www.computerhope.com/issues/ch000507.htm • About.com

More Related