Top Banner
ITC Presentation Topic: Internet Use, Security, Privacy & Working. Muhammad Umar Khan (14) Awais Haider (02) M. Jawad Bashir (31) © 2015 We-3 Productions ® All Rights Reserved.
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet Use, Privacy and security

ITC PresentationTopic: Internet Use,

Security,

Privacy & Working.

• Muhammad Umar Khan (14)• Awais Haider (02)• M. Jawad Bashir (31)

© 2015 We-3 Productions®

All Rights Reserved.

Page 2: Internet Use, Privacy and security

Internet

A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

Page 3: Internet Use, Privacy and security

Working of Internet

Page 4: Internet Use, Privacy and security

How a computer connects to other:

IP Addresses

Internet Service Providers:

HTTP & WWW

Page 5: Internet Use, Privacy and security

• Data Centers:

• Servers

Page 6: Internet Use, Privacy and security

• Internet Security & Privacy

Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. Following are some methods adopted for internet security.

Page 7: Internet Use, Privacy and security

Network Layer Security

Firewalls

Page 8: Internet Use, Privacy and security

Security Tokens

Page 9: Internet Use, Privacy and security

Encryption:

Page 10: Internet Use, Privacy and security

Example of Encryption:

Page 11: Internet Use, Privacy and security

Common Security Threats:

• Hacking

Page 12: Internet Use, Privacy and security

No one is safe on internet..

Even the Giants of ComputerTechnology

Popular HACKS:• Recently “Sony Inc.” computers hacked.• American NSA databases hacked and leaked

on internet..(wikileaks).

Page 13: Internet Use, Privacy and security
Page 14: Internet Use, Privacy and security

• Internet Privacy:

Page 15: Internet Use, Privacy and security
Page 16: Internet Use, Privacy and security

How to stay SAFE on Internet..?

i. Do not share more than you need to

ii. Minimize details that identify you or your whereabouts.

iii. Keep your account numbers, user names, and passwords secret.

iv. Enter only required information—often marked with an asterisk (*)—on registration and other forms.

Page 17: Internet Use, Privacy and security

Protect your computer

You can greatly reduce your risk of online identity theft by taking these four steps to protect your computer:

1. Use an Internet firewall. 

2. Visit Microsoft Update to verify your settings and check for updates. 

3. Subscribe to antivirus software and keep it current. 

Create strong passwords

Strong passwords are at least 14 characters long and include a combination of letters (both upper and lower case), numbers, and symbols. They are easy for you to remember but difficult for others to guess.

4. Don’t share your passwords with friends.

5. Avoid using the same password everywhere. If someone steals it, all the information that password protects is at risk.

Page 18: Internet Use, Privacy and security

What are Internet Cookies & how they work?

Page 19: Internet Use, Privacy and security
Page 20: Internet Use, Privacy and security

Internet Uses:

Education:

Page 21: Internet Use, Privacy and security

Communication:

Shopping:

Page 22: Internet Use, Privacy and security

Social Networking & Entertainment:

Page 23: Internet Use, Privacy and security

Online Banking:

Research:

Page 24: Internet Use, Privacy and security

Business:

Job Search:

Page 25: Internet Use, Privacy and security

The End

Thank you.© 2015 We-3

Productions®

All Rights Reserved.