Download - Internet Use, Privacy and security
![Page 1: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/1.jpg)
ITC PresentationTopic: Internet Use,
Security,
Privacy & Working.
• Muhammad Umar Khan (14)• Awais Haider (02)• M. Jawad Bashir (31)
© 2015 We-3 Productions®
All Rights Reserved.
![Page 2: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/2.jpg)
Internet
A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
![Page 3: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/3.jpg)
Working of Internet
![Page 4: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/4.jpg)
How a computer connects to other:
IP Addresses
Internet Service Providers:
HTTP & WWW
![Page 5: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/5.jpg)
• Data Centers:
• Servers
![Page 6: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/6.jpg)
• Internet Security & Privacy
Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. Following are some methods adopted for internet security.
![Page 7: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/7.jpg)
Network Layer Security
Firewalls
![Page 8: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/8.jpg)
Security Tokens
![Page 9: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/9.jpg)
Encryption:
![Page 10: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/10.jpg)
Example of Encryption:
![Page 11: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/11.jpg)
Common Security Threats:
• Hacking
![Page 12: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/12.jpg)
No one is safe on internet..
Even the Giants of ComputerTechnology
Popular HACKS:• Recently “Sony Inc.” computers hacked.• American NSA databases hacked and leaked
on internet..(wikileaks).
![Page 13: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/13.jpg)
![Page 14: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/14.jpg)
• Internet Privacy:
![Page 15: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/15.jpg)
![Page 16: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/16.jpg)
How to stay SAFE on Internet..?
i. Do not share more than you need to
ii. Minimize details that identify you or your whereabouts.
iii. Keep your account numbers, user names, and passwords secret.
iv. Enter only required information—often marked with an asterisk (*)—on registration and other forms.
![Page 17: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/17.jpg)
Protect your computer
You can greatly reduce your risk of online identity theft by taking these four steps to protect your computer:
1. Use an Internet firewall.
2. Visit Microsoft Update to verify your settings and check for updates.
3. Subscribe to antivirus software and keep it current.
Create strong passwords
Strong passwords are at least 14 characters long and include a combination of letters (both upper and lower case), numbers, and symbols. They are easy for you to remember but difficult for others to guess.
4. Don’t share your passwords with friends.
5. Avoid using the same password everywhere. If someone steals it, all the information that password protects is at risk.
![Page 18: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/18.jpg)
What are Internet Cookies & how they work?
![Page 19: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/19.jpg)
![Page 20: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/20.jpg)
Internet Uses:
Education:
![Page 21: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/21.jpg)
Communication:
Shopping:
![Page 22: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/22.jpg)
Social Networking & Entertainment:
![Page 23: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/23.jpg)
Online Banking:
Research:
![Page 24: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/24.jpg)
Business:
Job Search:
![Page 25: Internet Use, Privacy and security](https://reader036.vdocuments.us/reader036/viewer/2022062420/55c3f474bb61eb7c068b4781/html5/thumbnails/25.jpg)
The End
Thank you.© 2015 We-3
Productions®
All Rights Reserved.