90 likes | 256 Views
Pelenatino Vito 1 st period. Digital security. Meaning. Theme Meaning: security Security (self-protection): electronic precautions to guarantee safety Protecting hardware and network security by using secure and secret passwords
E N D
Pelenatino Vito 1st period Digital security
Meaning Theme Meaning: security Security (self-protection): electronic precautions to guarantee safety Protecting hardware and network security by using secure and secret passwords Protecting personal by not posting personal information online
Ways to follow Ways to follow: However, governments are also developing the capacity to manipulate, monitor and subvert electronic information. Surveillance and censorship is growing and the lack of security for digitally stored or communicated information is becoming a major problem for human rights defenders in some countries
Consequences Consequences: It might seem like a lot of trouble remembering passwords and asking about security everywhere you use your credit card. Perhaps we should review what happens when you have been hacked. Within minutes of the attack, hackers will have uploaded your personal and financial information to the Internet, where others will acquire it and begin to use it within an hour. You might notice that your computer or device is running more slowly, or an implanted virus might create pop-up advertisements or otherwise interrupt how your device functions. Those tactics, however, have grown long in the tooth. In most cases these days, you might not know about the breach for several months, and even then a third party—your bank or credit card vendor—is more likely to notice the problem than you are.
My Sources Ribble, M. (2012). Digital citizenship. Retrieved from http://www.digitalcitizenship.net/ http://www.frontlinedefenders.org/security-training. (n.d.). Retrieved from Front line defenders Computer applications. (2012). Retrieved from http://www.pensacolachs.org/webpages/ca applications/index.cfm?subpage=428866 Your digital life. (2012). Retrieved from http://www.pcworld.com/article/2010047/ke eping-your-financial-data-safe.html
Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=VWZPwuL8_goHUM:&imgrefurl=http://www.relationship-economy.com/2007/10/the-security-factor/the-digital-security-factors/&docid=IqMTiwQVV-lj1M&imgurl=http://www.relationship-economy.com/wp-content/uploads/2007/10/digital_security2.jpg&w=253&h=380&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=250&sig=104824352009350813061&page=1&tbnh=171&tbnw=114&start=0&ndsp=21&ved=1t:429,r:0,s:0,i:72&tx=82&ty=68&surl=1 http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=36DC8OVa8VIIWM:&imgrefurl=http://pisa.org.pk/&docid=N44DObetg9AByM&imgurl=http://pisa.org.pk/wp-content/uploads/2011/06/HumanElement.jpg&w=600&h=400&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=312&sig=104824352009350813061&page=1&tbnh=130&tbnw=195&start=0&ndsp=21&ved=1t:429,r:18,s:0,i:129&tx=112&ty=67&surl=1
Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=36DC8OVa8VIIWM:&imgrefurl=http://pisa.org.pk/&docid=N44DObetg9AByM&imgurl=http://pisa.org.pk/wp-content/uploads/2011/06/HumanElement.jpg&w=600&h=400&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=312&sig=104824352009350813061&page=1&tbnh=130&tbnw=195&start=0&ndsp=21&ved=1t:429,r:18,s:0,i:129&tx=112&ty=67&surl=1 http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=Yy13v6Lp9KdD3M:&imgrefurl=http://www.docusign.com/jross/3417&docid=1qHNhTVD8cTeoM&imgurl=http://www.docusign.com/sites/default/files/blog/Security.jpeg&w=250&h=235&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=hc&vpx=878&vpy=215&dur=1015&hovh=188&hovw=200&tx=134&ty=148&sig=104824352009350813061&page=1&tbnh=149&tbnw=167&start=0&ndsp=21&ved=1t:429,r:9,s:0,i:100&surl=1
Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=9HiVHd6sGoakTM:&imgrefurl=http://www.amazon.com/Security-Powerpoint-Templates-Template-Background/dp/B0042RMNUW&docid=j0q2RJXOvrUTdM&imgurl=http://ecx.images-amazon.com/images/I/41EQpa9a7oL._SL500_AA300_.jpg&w=300&h=300&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=hc&vpx=176&vpy=499&dur=765&hovh=225&hovw=225&tx=136&ty=152&sig=104824352009350813061&page=3&tbnh=146&tbnw=140&start=48&ndsp=29&ved=1t:429,r:17,s:48,i:285&surl=1 http://www.google.com/imgres?q=digital+security+pics&start=250&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=kfaogw9-DSg6IM:&imgrefurl=http://www.smallbizdaily.com/8432/8432/&docid=o-dZdyxsvcpqNM&imgurl=http://www.smallbizdaily.com/wp-content/uploads/2012/04/95411875-199x300.jpg&w=199&h=300&ei=vHSFUMTdF4n3iwKGlYBQ&zoom=1&iact=rc&dur=125&sig=104824352009350813061&page=10&tbnh=154&tbnw=102&ndsp=30&ved=1t:429,r:25,s:250,i:268&tx=85&ty=51&surl=1