1 / 8

lesson 3

lesson 3. Security on the Internet. Objectives. Students will know about encryption, Malware, Viruses, Antivirus. Collecting information. Cookies: Small text files that are stored on your computer when you visit a web site. Cache:

vangie
Download Presentation

lesson 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. lesson 3 Security on the Internet

  2. Objectives • Students will know about encryption, Malware, Viruses, Antivirus

  3. Collecting information • Cookies: Small text files that are stored on your computer when you visit a web site. • Cache: Temporary internet files that are also stored on your computer when you visit a web site. These speed up the display of pages that you have already visited. • What is the damage that cache and cookies do? They take up space on your hard drive, but if desired they can be deleted. • Protected sites: Web sites that cannot be accessed without a user name and password.

  4. Encryption • Sensitive information passing between you and the target website is encrypted and can only be deciphered at the target site. • Banks that provide an online banking service use extremely high levels of encryption. • Digital certificate: A web site certificate is obtained by the site owner to verify its identity and encrypt transmissions.

  5. Malware • Malware(malicious software): Any annoying or intrusive software or code designed to damage a computer without the owner’s knowledge. • Viruses: Programs intended to cause harm to your computer. • Worm: A specific type of threat that is a self replicating program, which sends copies of itself to linked computers. • Trojan horse: Another threat that appears to do one thing, but in reality does another. Neither a worm or a Trojan horse is a virus. • Spyware: A software that is installed without your knowledge . It can collect various types of personal information. It can change your computer settings

  6. Anti-virus software • It is vital to have anti-virus software installed and to keep it updated on a weekly basis at least. • It is also possible to install a firewall. • Firewall: Is a program that protects your computer from any unauthorized access from outside. • Secure shopping: If you decide to do some shopping on the internet, make sure you pay using a secure server. These web pages can be identified by a small padlock symbol on the status bar and https at the beginning of the address.

  7. Advantages and disadvantages of shopping online: • Advantages: You don’t have to go out and jostle your way through crowds of find city center parking. It is possible to buy almost anything you can think of from all over the world. • Disadvantages: There is risk of credit card fraud when paying for goods online.

  8. Parent control • Parents should supervise their children’s online time. • They can also restrict their browsing. • Supervise games playing and restrict time spent on the internet. • Internet browsers and some firewalls include content filters, which can allow or restrict access based on a rating system or by individual site.

More Related