SlideShare a Scribd company logo
Internet more secure
Internet more secure
 ANYTHING YOU POST ON THE INTERNET IT
WILL BE THERE FOR A LONG TIME
Internet more secure
 73%OF TEEN AND 68% OF YOUNG ADULTS
USE SOCIAL NETWORKS
 AND THE HALF OF THEM POST PERSONAL
INFORMATION ON THEN
 IF YOU DO THAT, THE HACKERS OR PEOPLE
CAN ATTACK YOU
Internet more secure
 IN THE ERA OF SMARTPHONES
CIBERSAFETY SHOULD EXTEND TO YOUR
SMARTPHONE TOO
 DONT ACCEPT INCOMING CALLS OF TEXT
FROM UNKNOWN PEOPLE
Internet more secure
 NO MATTER HOW SECURE YOU ARE, YOU
CAN STILL GET HACKED
1. CHANGE YOUR PASSWORD AND MAKE IT
IMPREDICTIBLE.
2. DO THE TWO STEPS VERIFICATION
3. CHECK YOUR BOX AND NOTIFY YOUR
CONTACTS
4. SEARCH VIRUS
5. BACK UP YOUR FILES
Internet more secure
 YOU MUST HAVE ACTUALIZED YOUR
OPERATING SISTEM AND APPLICATIONS
WITH THE NEWEST SECUITY SISTEM
 TIP 6: DONT DOWNLOAD ANITHING FROM A
SUSPICIUS PAGE
 IF YOU DOWNLOAD SOMETHING FROM A
SUSPICIUS PAGE, IT CAN HAVE VIRUS
 TIP 7: ACCEPT ONLY KNOWN CONTACTS
 BECAUSE IF YOU ACCEPT ALL THE
CONTACTS YOU HAVE, ITS POSSIBLE THAT
ONE OF THEM CAN BE DANGEROUS
Internet more secure
 IF A HACKER ATTACK YOU, IT WILL BE MORE
DIFFICULT TO DO IT IF YOU HAVE A STRONG
PASSWORD

More Related Content

PPTX
Computer SOS
DOC
How to steps to hack whatsapp messages
DOCX
The internet and safety
DOC
Sarah frye ceo
PPTX
How to Hack Snapchat Account
DOC
How to hacking whatsapp messages 2014
DOC
How to whatsapp hack message spy tool v4.0
DOC
How to spy on texts and calls
Computer SOS
How to steps to hack whatsapp messages
The internet and safety
Sarah frye ceo
How to Hack Snapchat Account
How to hacking whatsapp messages 2014
How to whatsapp hack message spy tool v4.0
How to spy on texts and calls

What's hot (18)

DOC
How to can someone track your whatsapp
DOC
How to monitor whatsapp messages android
PDF
10 redenen casadata om voor casadata te kiezen
PPT
Marleah
PPTX
Hack Snapchat Account
PDF
How to access espn3
PPTX
Mcx enews app
PPTX
Some basics of computer security
PPTX
2 cybersecurity best practices
PDF
Wifi hotspot instructions
PPTX
Internet safety by justin p.
PDF
SAFETIS - early fire detection system
PPTX
Mac Kenzi D. Group#3
PPTX
7 social engineering and insider threats
DOC
Can you track viber messages
PPT
Arlan2
DOCX
Internet policy
PDF
Chromebook instructions
How to can someone track your whatsapp
How to monitor whatsapp messages android
10 redenen casadata om voor casadata te kiezen
Marleah
Hack Snapchat Account
How to access espn3
Mcx enews app
Some basics of computer security
2 cybersecurity best practices
Wifi hotspot instructions
Internet safety by justin p.
SAFETIS - early fire detection system
Mac Kenzi D. Group#3
7 social engineering and insider threats
Can you track viber messages
Arlan2
Internet policy
Chromebook instructions
Ad

Similar to Internet more secure (20)

PPTX
The Norton Report 2013
PDF
2012 norton cybercrime_report_master_final_050912
PPTX
Norton Cyber Crime Report 2013
PPTX
Psychological aspect of social engineering
PDF
Norton Cyber Security Insights Report 2017
PPT
Digital safety[1]
PPTX
2012 norton cybercrime report
PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
empowermenttechnologylesson2-210114045455.pptx
PPTX
itEraLesson3. .pptx
PPTX
Awareness about cybercrime among youth
PPTX
Htc itmr 30-05-13
PDF
Brand Aid - Charlotte October 2014
PDF
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
PPTX
COMPUTER ETHICS.pptx
DOCX
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
PPTX
LESSON 2.1.pptx
PPTX
2.Cyber law and Crime.pptx
PPTX
September 2014 cyber safety presentation
PPTX
Safety online radysh do14
The Norton Report 2013
2012 norton cybercrime_report_master_final_050912
Norton Cyber Crime Report 2013
Psychological aspect of social engineering
Norton Cyber Security Insights Report 2017
Digital safety[1]
2012 norton cybercrime report
empowermenttechnologylesson2-210114045455.pptx
empowermenttechnologylesson2-210114045455.pptx
itEraLesson3. .pptx
Awareness about cybercrime among youth
Htc itmr 30-05-13
Brand Aid - Charlotte October 2014
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
COMPUTER ETHICS.pptx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
LESSON 2.1.pptx
2.Cyber law and Crime.pptx
September 2014 cyber safety presentation
Safety online radysh do14
Ad

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Architecture types and enterprise applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Modernising the Digital Integration Hub
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
WOOl fibre morphology and structure.pdf for textiles
Assigned Numbers - 2025 - Bluetooth® Document
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
Developing a website for English-speaking practice to English as a foreign la...
O2C Customer Invoices to Receipt V15A.pptx
A novel scalable deep ensemble learning framework for big data classification...
A contest of sentiment analysis: k-nearest neighbor versus neural network
cloud_computing_Infrastucture_as_cloud_p
Architecture types and enterprise applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
Modernising the Digital Integration Hub
A comparative study of natural language inference in Swahili using monolingua...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
The various Industrial Revolutions .pptx

Internet more secure

  • 3.  ANYTHING YOU POST ON THE INTERNET IT WILL BE THERE FOR A LONG TIME
  • 5.  73%OF TEEN AND 68% OF YOUNG ADULTS USE SOCIAL NETWORKS  AND THE HALF OF THEM POST PERSONAL INFORMATION ON THEN  IF YOU DO THAT, THE HACKERS OR PEOPLE CAN ATTACK YOU
  • 7.  IN THE ERA OF SMARTPHONES CIBERSAFETY SHOULD EXTEND TO YOUR SMARTPHONE TOO  DONT ACCEPT INCOMING CALLS OF TEXT FROM UNKNOWN PEOPLE
  • 9.  NO MATTER HOW SECURE YOU ARE, YOU CAN STILL GET HACKED 1. CHANGE YOUR PASSWORD AND MAKE IT IMPREDICTIBLE. 2. DO THE TWO STEPS VERIFICATION 3. CHECK YOUR BOX AND NOTIFY YOUR CONTACTS 4. SEARCH VIRUS 5. BACK UP YOUR FILES
  • 11.  YOU MUST HAVE ACTUALIZED YOUR OPERATING SISTEM AND APPLICATIONS WITH THE NEWEST SECUITY SISTEM
  • 12.  TIP 6: DONT DOWNLOAD ANITHING FROM A SUSPICIUS PAGE
  • 13.  IF YOU DOWNLOAD SOMETHING FROM A SUSPICIUS PAGE, IT CAN HAVE VIRUS
  • 14.  TIP 7: ACCEPT ONLY KNOWN CONTACTS
  • 15.  BECAUSE IF YOU ACCEPT ALL THE CONTACTS YOU HAVE, ITS POSSIBLE THAT ONE OF THEM CAN BE DANGEROUS
  • 17.  IF A HACKER ATTACK YOU, IT WILL BE MORE DIFFICULT TO DO IT IF YOU HAVE A STRONG PASSWORD