Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Protecting yourself online

How? Why?

Bani S

on 15 May 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Protecting yourself online

How Can You Protect Yourself and Your Information Online? The Consequences Identity Fraud People use personal information to pose as you. 1) Don't store personal information online.
2) Make sure your firewall is turned on. 3) Use security programs like Norton Anti-virus.
4) Don't click on unknown attachments. 5) Use passwords with at least eight characters.
Top 5 ways...
Internet Scams Sometimes scammers try to cash in on natural disasters.. EG:the Icelandic volcano eruption. Choose a password which no one else would guess. The Obvious Ways Phishing Don't post information about yourself Don't post your address publicly. Don't post your phone number publicly Don't use an unsecured wireless network. Hackers Bibliography Hacked Emails? Don't click on suspicious links from your friends. "10 Ways to Protect Yourself Online - SiliconValley.com." Home - SiliconValley.com. Web. 11 May 2010. <http://www.siliconvalley.com/ghostsinthebrowser/ci_7428024>.

"The Top Five Ways To Protect Yourself From Online Fraud." Free Articles Directory | Submit Articles - ArticlesBase.com. Web. 11 May 2010. <http://www.articlesbase.com/security-articles/the-top-five-ways-to-protect-yourself-from-online-fraud-959472.html>.
"How to Protect Yourself Online." U.S. Securities and Exchange Commission (Home Page). Web. 11 May 2010. <http://www.sec.gov/spotlight/katrina/protectyourselfonline.htm>. Can even attack car control systems Garthwaite, Josie. "Hacking the Car: Next-gen Vehicles at the Mercy of Cyber Attacks." Web log post. Earth2tech, 14 May 2010. Web. 15 May 2010. <http://earth2tech.com/2010/05/14/hacking-the-car-next-gen-vehicles-at-the-mercy-of-cyber-attacks/>.
Full transcript