Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Internet Safety
... but, are they safe there?
What is a
What is a username?
Adware, Spyware and Malware
Online Fraud, Scams and Hoaxes
Hacker is, a contentious term used in computing for several types of person:
Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send
bulk messages indiscriminately.
The term was coined by author William Gibson in his sci-fi novel Neuromancer (1984).
It's a metaphor for describing the non-physical terrain created by computer systems.
is an agent, either a human agent (end-user) or software agent, who uses a computer or network service.
often has a user account and is identified by a username, screen name, or nickname.
is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password).
should be kept secret from those not allowed access
The Internet is a global system of interconnected computer networks and serve billions of users worldwide.
What is Internet?
Worms and others
Test Safe Online: http://www.getsafeonline.org/nqcontent.cfm?a_id=1446
History of Internet
What do we need to do to stay safe online?
What is an E-mail?
World Wide Web
That's what we are going to talk about now!!!
Hacker (computer security) or cracker, who accesses a computer system by circumventing its security system
Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment
Hacker (programmer subculture), who shares an anti-authoritarian approach to software development now associated with the free software movement
Online systems, for example, create a
within which people can communicate with one another (via e-mail), do research, or simply window shop.
Like physical space,
contains objects (files, mail messages, graphics, etc.) and different modes of transportation and delivery.
Some programs, particularly computer games, are designed to create a special
, one that resembles physical reality in some ways but defies it in others. In its extreme form, called virtual reality, users are presented with visual, auditory, and even tactile feedback that makes
While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam.
Unlike real space, though, exploring
does not require any physical movement other than pressing keys on a keyboard or moving a mouse.