420 likes | 536 Views
ICAICT103A. Use, communicate and search securely in the internet. Organisational Guidelines. Awareness of company policies on Internet access. Facebook. Facebook fun to use but be careful what you display for all eyes to see. Search Engines. What is a search engine?
E N D
ICAICT103A Use, communicate and search securely in the internet
Organisational Guidelines • Awareness of company policies on Internet access
Facebook • Facebook fun to use but be careful what you display for all eyes to see
Search Engines • What is a search engine? • Search engines are programs that search documents for specified keywords.
Appropriate key words • Keyword searches have a tough time distinguishing between words that are spelled the same way, but mean something different (i.e. hard cider, a hard stone, a hard exam, and the hard drive on your computer). This often results in hits that are completely irrelevant to your query. • Group words with pluses – hard+exam • Or group words in between talking marks “hard exam” • Practice using the + sign Hard+drive
General Hints • Learn how to use quotes or pluses - With most search engines, if you enter two words, say black holes, the engine will search for documents that contain either one of those words. Thus, you will get all documents containing black and all documents containing holes, which is probably not what you intended. • So, instead of entering black holes, try entering "black holes" or black+holes.
Site Search • Site search - The site search appears on the top right of every page on the site: This search works like Google and will bring up a list of all types of material on the DFID website when you type in some key words. Generally, all the words you put in the query will be used.
Advanced Search • Try these: • Google advanced search • Yahoo precise search • HotBot advanced search • Altavista advanced search
Advanced Search • Google advanced search • http://www.google.com.au/advanced_search
Google • http://www.google.com.au/ • I’m feeling lucky • http://www.youtube.com/watch?v=5fvL3mNtl1g • Google privacy watch video
How to delete history • Codes shared over the internet are called cookies • Cookies store bits of information of all the pages you have visited • Cookies can be exploited by hackers to attack your computers system • Open internet explorer, go to tools, go to internet options,
Deleting History Tick cookies and then delete
Security Settings • Go to internet explorer • Tools Button, Internet Options Press security Then click and hold the security slider until you are happy with the security level
Search Expression • How to save a web page Saved on desktop
Bookmarks • How to make a bookmark in internet explorer Add to favorites
Bookmark Folder • Go to your • Add to favorites New folder
Print a Web Page • Printing a web page • Open internet explorer • Find a web page • Select text you want to print • Select print from your ribbon
Print a Web Page • A dialog box will appear • Check the selection button • Select print • The selected text should appear on the printed page
Consumer Sites • Consumer sites are web pages made specifically for buying products • Find these sites using your favorite search engine • Office Works • Bunnings • K-Mart Online forms
Transactions • How do your know when a transaction is safe • Trusted sites – well known sites can be trusted
Online Transaction • Access an online transaction site • http://www.youtube.com/watch?v=v4osQ4oASjY
Security • When sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock () in the bottom right corner of your browser window or next to the address bar.If visible, this lock should also be in the locked position and not unlocked.
Security • While the lock is in the lock position, data is encrypted, which helps anyone from understanding the data it its intercepted . When no lock is visible or in the unlocked position all information is plaintext and can be read by anyone. Encrypted pages usually use log ins can you think of any sites that would use a log in.
High Priority Pages • Log in pages Encrypted pages
CAPTCHA • A CAPTCHA : is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. Computer programs can access websites to retrieve data, as the CAPTCHA is a picture the computer cannot read.
Security • We also suggest making sure the URL begins with https • You can also have a look at the URL: if it starts with “https://", you are on a secured page; if the URL starts with "http://", you're not.
Boolean Search • What is Boolean Search? • Boolean searches allow you to combine words and phrases using the words AND, OR, NOT and NEAR (otherwise known as Boolean operators) to limit, widen, or define your search. Most Internet search engines and Web directories default to these Boolean search parameters anyway, but a good Web searcher should know how to use basic Boolean operators.
Meta-Search Tools • A meta - search engine is a search tool that sends user request to several other search engines or databases and aggregates the result into a single list.
Search • Search your field of expertise and take note of the first site that comes up
Virtual Community • A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interest or goals. • Go to http://en.wikipedia.org/wiki/Virtual_community Type in virtual community logos into your search engine then choose images and see what the result is
Domain Name • What is a Domain Name? • If you see the acronym DNS it means Domain Name System- A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the internet. Domain names are formed by the rules and procedures of the Domain Name System
Domain Name Search • Search this Domain Name and tell me what it is. • http://bloggingpirate.wordpress.com/
What is after the Dot • .com means - .com describes that a web site has some kind of "commercial" intent. This is what we call a "top level domain" address, and it used to be a way for a web site to convey its publishing intent. • .net means - .NET is "Top level domain originally for network providers” • http://www.internetslang.com/.NET-meaning-definition.asp
History • How to check your internet history • Go to the favorites bar • Click on history
Web Page Threats • Smart screen filter • Go to internet explorer • Choose tools • Choose smart screen filter • A pop up dialog box
Spam • Spam email is not only a nuisance, it’s a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email to get a clueless victim to click on a link to a malicious website.
What is a Trojan? • A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is eg to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus.
Spam • Spammers will illegally buy lists of real people's email addresses. • Spammers will use "harvesting" programs that scour the Internet like Google, and copy any text that contains the "@" character. • Spammers will use "dictionary" (brute force) programs like hackers. • You will unwittingly volunteer your email address to dishonest subscribe/unsubscribe online services.
Suspicious Email • Beware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.
Phishing • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.
USB • USB – stands for universal serial bus • A USB lying around an office may have harmful virus in its contents. If a USB is found it is best not to attach it to your computer
Bibliography • http://www.totallylocalhr.com/images/Computer.gif • http://jokesprank.com/blog/wp-content/uploads/2011/01/facebook-cartoon.gif • http://www.coseom.com/wp-content/uploads/Search-Engine-Optimization4.jpg • Webopedia • Wikipedia • http://techzyn.com/cgi-sys/suspendedpage.cgi • http://imagine.gsfc.nasa.gov/docs/ask_astro/web_search.html • http://www.computerhope.com/issues/ch000507.htm • About.com