icaict103a
DESCRIPTION
ICAICT103A. Use, communicate and search securely in the internet. Organisational Guidelines. Awareness of company policies on Internet access. Facebook. Facebook fun to use but be careful what you display for all eyes to see. Search Engines. What is a search engine? - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/1.jpg)
ICAICT103AUse, communicate and search securely in
the internet
![Page 2: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/2.jpg)
Organisational Guidelines
Awareness of company policies on Internet access
![Page 3: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/3.jpg)
FacebookFacebook fun to use but be careful what you display for all eyes to see
![Page 4: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/4.jpg)
Search EnginesWhat is a search engine?
Search engines are programs that search documents for specified keywords.
![Page 5: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/5.jpg)
Appropriate key words
Keyword searches have a tough time distinguishing between words that are spelled the same way, but mean something different (i.e. hard cider, a hard stone, a hard exam, and the hard drive on your computer). This often results in hits that are completely irrelevant to your query.
Group words with pluses – hard+exam
Or group words in between talking marks “hard exam”
Practice using the + sign Hard+drive
![Page 6: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/6.jpg)
General HintsLearn how to use quotes or pluses - With most search engines, if you enter two words, say black holes, the engine will search for documents that contain either one of those words. Thus, you will get all documents containing black and all documents containing holes, which is probably not what you intended.So, instead of entering black holes, try entering "black holes" or black+holes.
![Page 7: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/7.jpg)
Site SearchSite search - The site search appears on the top right of every page on the site: This search works like Google and will bring up a list of all types of material on the DFID website when you type in some key words. Generally, all the words you put in the query will be used.
![Page 8: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/8.jpg)
Advanced SearchTry these:
Google advanced search
Yahoo precise search
HotBot advanced search
Altavista advanced search
![Page 9: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/9.jpg)
Advanced SearchGoogle advanced search
http://www.google.com.au/advanced_search
![Page 10: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/10.jpg)
Googlehttp://www.google.com.au/
I’m feeling lucky
http://www.youtube.com/watch?v=5fvL3mNtl1g
Google privacy watch video
![Page 11: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/11.jpg)
How to delete history
Codes shared over the internet are called cookies
Cookies store bits of information of all the pages you have visited
Cookies can be exploited by hackers to attack your computers system
Open internet explorer, go to tools, go to internet options,
![Page 12: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/12.jpg)
Deleting History
Tick cookies and then delete
![Page 13: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/13.jpg)
Security SettingsGo to internet explorer
Tools Button, Internet Options
Press security
Then click and hold the security slider until you are happy with the security level
![Page 14: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/14.jpg)
Search ExpressionHow to save a web page Saved
on desktop
![Page 15: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/15.jpg)
BookmarksHow to make a bookmark in internet explorer
Add to favorites
![Page 16: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/16.jpg)
Bookmark FolderGo to your
Add to favorites
New folder
![Page 17: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/17.jpg)
Print a Web PagePrinting a web page
Open internet explorer
Find a web page
Select text you want to print
Select print from your ribbon
![Page 18: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/18.jpg)
Print a Web PageA dialog box will appear
Check the selection button
Select print
The selected text should
appear on the printed page
![Page 19: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/19.jpg)
Consumer SitesConsumer sites are web pages made specifically for buying products
Find these sites using your favorite search engine• Office Works• Bunnings
• K-Mart
Online forms
![Page 20: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/20.jpg)
TransactionsHow do your know when a transaction is safe
Trusted sites – well known sites can be trusted
![Page 21: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/21.jpg)
Online Transaction
Access an online transaction site
http://www.youtube.com/watch?v=v4osQ4oASjY
![Page 22: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/22.jpg)
SecurityWhen sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock () in the bottom right corner of your browser window or next to the address bar.If visible, this lock should also be in the locked position and not unlocked.
![Page 23: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/23.jpg)
SecurityWhile the lock is in the lock position, data is encrypted, which helps anyone from understanding the data it its intercepted . When no lock is visible or in the unlocked position all information is plaintext and can be read by anyone. Encrypted pages usually use log ins can you think of any sites that would use a log in.
![Page 24: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/24.jpg)
High Priority Pages
Log in pagesEncrypted pages
![Page 25: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/25.jpg)
CAPTCHAA CAPTCHA :
is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. Computer programs can access websites to retrieve data, as the CAPTCHA is a picture the computer cannot read.
![Page 26: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/26.jpg)
SecurityWe also suggest making sure the URL begins with https
You can also have a look at the URL: if it starts with “https://", you are on a secured page; if the URL starts with "http://", you're not.
![Page 27: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/27.jpg)
Boolean SearchWhat is Boolean Search?
Boolean searches allow you to combine words and phrases using the words AND, OR, NOT and NEAR (otherwise known as Boolean operators) to limit, widen, or define your search. Most Internet search engines and Web directories default to these Boolean search parameters anyway, but a good Web searcher should know how to use basic Boolean operators.
![Page 28: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/28.jpg)
Meta-Search ToolsA meta - search engine is a search tool that sends user request to several other search engines or databases and aggregates the result into a single list.
![Page 29: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/29.jpg)
SearchSearch your field of expertise and take note of the first site that comes up
![Page 30: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/30.jpg)
Virtual Community
A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interest or goals. Go to http://en.wikipedia.org/wiki/Virtual_community
Type in virtual community logos into your search engine then choose images and see what the result is
![Page 31: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/31.jpg)
Domain NameWhat is a Domain Name?
If you see the acronym DNS it means Domain Name System- A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the internet. Domain names are formed by the rules and procedures of the Domain Name System
![Page 32: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/32.jpg)
Domain Name Search
Search this Domain Name and tell me what it is.
http://bloggingpirate.wordpress.com/
![Page 33: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/33.jpg)
What is after the Dot
.com means - .com describes that a web site has some kind of "commercial" intent. This is what we call a "top level domain" address, and it used to be a way for a web site to convey its publishing intent..net means - .NET is "Top level domain originally for network providers”http://www.internetslang.com/.NET-meaning-definition.asp
![Page 34: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/34.jpg)
HistoryHow to check your internet history
Go to the favorites bar
Click on history
![Page 35: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/35.jpg)
Web Page ThreatsSmart screen filter
Go to internet explorerChoose toolsChoose smart screen filterA pop up dialog box
![Page 36: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/36.jpg)
SpamSpam email is not only a nuisance, it’s a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email to get a clueless victim to click on a link to a malicious website.
![Page 37: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/37.jpg)
What is a Trojan?A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is eg to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus.
![Page 38: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/38.jpg)
SpamSpammers will illegally buy lists of real people's email addresses.
Spammers will use "harvesting" programs that scour the Internet like Google, and copy any text that contains the "@" character.
Spammers will use "dictionary" (brute force) programs like hackers.
You will unwittingly volunteer your email address to dishonest subscribe/unsubscribe online services.
![Page 39: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/39.jpg)
Suspicious EmailBeware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.
![Page 40: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/40.jpg)
PhishingPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.
![Page 41: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/41.jpg)
USBUSB – stands for universal serial bus
A USB lying around an office may have harmful virus in its contents. If a USB is found it is best not to attach it to your computer
![Page 42: ICAICT103A](https://reader035.vdocuments.us/reader035/viewer/2022062501/56816979550346895de16f94/html5/thumbnails/42.jpg)
Bibliographyhttp://www.totallylocalhr.com/images/Computer.gif
http://jokesprank.com/blog/wp-content/uploads/2011/01/facebook-cartoon.gif
http://www.coseom.com/wp-content/uploads/Search-Engine-Optimization4.jpg
Webopedia
Wikipedia
http://techzyn.com/cgi-sys/suspendedpage.cgi
http://imagine.gsfc.nasa.gov/docs/ask_astro/web_search.html
http://www.computerhope.com/issues/ch000507.htm
About.com