SlideShare a Scribd company logo
Protecting online data
By callum baughen
podcasts
What is a podcast?
A blog is a downloadable media file
What are podcasts used for?
To listen to someone you like while you on the
move.
How are podcasts different from blogs?
You listen to podcast you don’t need to write
anything
wikis
what is a wiki
A wiki is a web page where people can add, delete or
modify content
What are wikis used for?
Wikis are used to share information, tracking revision,
archiving Information
How are wikis different from blogs?
Wikis are different form blogs because you don’t have a
limit of text that you can send and also you can send
pictures.
blogs
A blog is a personal page or web site.
People can comment on your blog and post
there views
The bad thing is anyone can see it
Communication channels
Video conferencing
6 ways to keep safe when video conferencing
1. Segment your network.
2. Understand how your system uses the network.
3. Be prepared for firewall failure.
4. Restrict the links between video conferencing systems and the VoIP network.
5. Have a business continuity plan
6. avoid weak passwords
keeping Personal data online safe
Storing personal information
You should keep the information up to date
You shouldn't give the information out to
anyone
You should keep all the information in the work
place and not take it out
Don’t use a weak password
Safely viewing digital content
• Make sure you upload it and then only allow
certain people to view it and disable the
people you don’t want see it
• Don’t go to websites that you think are fake
you could be right and that website could be a
virus.
Safely uploading digital content
• When you upload somewhere you might not
be able to delete it.
• Never put your home address, mobile
number, if you want people to contact you
they should use a social media site.
• Never upload a picture of you in your uniform
if they see the badge or logo they can find
where you live
Data protection regulations
safety and security when setting up
and using your blog
• Whatever you post anyone can read it if you
not set it to private
• You need to password protection
• Don’t allow people to comment on your post
Securing data encryption
Firewalls
• Firewalls blocks information coming in or
coming out
• Firewalls are good to keep viruses out
• Never lose work to viruses
• Fast and easily to download
• Need to be up to date
Backups
We should back up because we don’t want to
lose work so then we have to do it again.
Many ways to back up you have memory sticks
floppy disks
Or even on the internet for example google.docs
or drop box
Secure sites.
• you know when a website is secure because it
has “https” this means Hyper Text Transfer
Protocol with Secure Sockets.
• If it is not secure it will say this HTTP so this is
hyper text transfer protocol.
• Blogs are effective communication channels
because anyone can post there views
• blogs can put peoples ideas together
• If you get stuck on something you can get help
from the blog by posting what you are stuck
on.

More Related Content

PDF
Rock Your Blog: Protect Your Brand + Reputation
PPT
PPTX
Staying safe-on-internet
PPTX
Safe Internet Banking Cyber Security
PPT
Internet Safety
PDF
Renfrow Internet Safety
PPTX
online and offline computer security
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Rock Your Blog: Protect Your Brand + Reputation
Staying safe-on-internet
Safe Internet Banking Cyber Security
Internet Safety
Renfrow Internet Safety
online and offline computer security
Onlinesecurityrecomendations2014 141230081030-conversion-gate02

What's hot (19)

PPT
Online Self Defense
PPTX
Small Business Owners – Don’t Get Caught With Out Data Security.
PPTX
[THEC Talk] The Secure Network
PDF
Wordpress security best practices - WordCamp Waukesha 2017
PDF
Security 101
PDF
How Can you Identify your Next Insider Threat?
PPT
Free Web2.0 Tools for Really Cool Schools
PPTX
Sp13 w200-w11-part3
ODP
Disaster Proof your WordPress Website
PPTX
Web 2.0 presentation
PPTX
An Introduction To IT Security And Privacy - Servers And More
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
Computer / Internet Security
PPTX
An Introduction To IT Security And Privacy In Libraries
DOCX
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
PPT
Blogging Basics
KEY
Protect Thy Computer and Thyself
PPTX
An Introduction To IT Security And Privacy for Librarians and Libraries
Online Self Defense
Small Business Owners – Don’t Get Caught With Out Data Security.
[THEC Talk] The Secure Network
Wordpress security best practices - WordCamp Waukesha 2017
Security 101
How Can you Identify your Next Insider Threat?
Free Web2.0 Tools for Really Cool Schools
Sp13 w200-w11-part3
Disaster Proof your WordPress Website
Web 2.0 presentation
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy In Libraries & Anywhere
Computer / Internet Security
An Introduction To IT Security And Privacy In Libraries
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
Blogging Basics
Protect Thy Computer and Thyself
An Introduction To IT Security And Privacy for Librarians and Libraries
Ad

Viewers also liked (18)

DOCX
My Philosophy of Teaching July 11-last draft A
DOCX
Mapas mentales gerencia de proyectos
PPT
PPTX
El universo desde Eratóstenes a Newton
PPT
Relatório IBM X-Force ameaças e tendências de riscos
PPTX
Evolución estelar
PPTX
Zebra Waste Management Presentation
PPTX
Forcelandia 2016 Wave App Development
PDF
Industrial communication 2016 English
PDF
Mp10 pinpad bluetooth
PPT
Interface in java By Dheeraj Kumar Singh
PDF
Mc40 Zebra
PPT
Philosophy of early childhood education 2
PDF
Java OOP Programming language (Part 3) - Class and Object
PDF
C++ Files and Streams
PPT
李聖傑 最近
My Philosophy of Teaching July 11-last draft A
Mapas mentales gerencia de proyectos
El universo desde Eratóstenes a Newton
Relatório IBM X-Force ameaças e tendências de riscos
Evolución estelar
Zebra Waste Management Presentation
Forcelandia 2016 Wave App Development
Industrial communication 2016 English
Mp10 pinpad bluetooth
Interface in java By Dheeraj Kumar Singh
Mc40 Zebra
Philosophy of early childhood education 2
Java OOP Programming language (Part 3) - Class and Object
C++ Files and Streams
李聖傑 最近
Ad

Similar to Protecting online data unit 1 (20)

PDF
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
PPTX
TheInternetDigitalSecurityfddreeere.pptx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH (1).docx
DOCX
Empowerment Technology
DOCX
REVIEWER ETECH
DOCX
REVIEWER-FOR-ETECH.docx
DOCX
REVIEWER-FOR-ETECH (1).docx
DOCX
REVIEWER-FOR-ETECH.docx
PPT
Sept 2014 cloud security presentation
PPTX
Basic Security Training for End Users
PPT
Computer Security and safety
PDF
Keep Your SIte Secure
PDF
Green Hectares Rural Tech Factsheet – Webinars
PDF
Web 2 0 For Academic Researchers
PPTX
Mark Rogers' Social Network Presentation
PDF
Case - How to protect your website
DOCX
Cloud storage
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
TheInternetDigitalSecurityfddreeere.pptx
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH (1).docx
Empowerment Technology
REVIEWER ETECH
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH.docx
Sept 2014 cloud security presentation
Basic Security Training for End Users
Computer Security and safety
Keep Your SIte Secure
Green Hectares Rural Tech Factsheet – Webinars
Web 2 0 For Academic Researchers
Mark Rogers' Social Network Presentation
Case - How to protect your website
Cloud storage

Recently uploaded (20)

PDF
Climate Risk and Credit Allocation: How Banks Are Integrating Environmental R...
PDF
Social Media Marketing Company In Nagpur
PPTX
How to Make Sure Your Video is Optimized for SEO
PDF
Why Blend In When You Can Trend? Make Me Trend
PPTX
Social Media Optimization Services to Grow Your Brand Online
PDF
Customer Churn Prediction in Digital Banking: A Comparative Study of Xai Tech...
PDF
Regulation Study, Differences and Implementation of Bank Indonesia National C...
DOCX
Buy Goethe A1 ,B2 ,C1 certificate online without writing
PDF
Faculty of E languageTruongMinhThien.pdf
PDF
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
PDF
Transform Your Social Media, Grow Your Brand
PDF
25K Btc Enabled Cash App Accounts – Safe, Fast, Verified.pdf
PDF
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
PPTX
Lesson 3: person and his/her relationship with the others NSTP 1
PPTX
Mindfulness_and_Coping_Workshop in workplace
PDF
Does Ownership Structure Play an Important Role in the Banking Industry?
PDF
Your Breakthrough Starts Here Make Me Popular
PDF
Why Digital Marketing Matters in Today’s World Ask ChatGPT
PPTX
Smart Card Face Mask detection soluiondr
PPTX
Eric Starker - Social Media Portfolio - 2025
Climate Risk and Credit Allocation: How Banks Are Integrating Environmental R...
Social Media Marketing Company In Nagpur
How to Make Sure Your Video is Optimized for SEO
Why Blend In When You Can Trend? Make Me Trend
Social Media Optimization Services to Grow Your Brand Online
Customer Churn Prediction in Digital Banking: A Comparative Study of Xai Tech...
Regulation Study, Differences and Implementation of Bank Indonesia National C...
Buy Goethe A1 ,B2 ,C1 certificate online without writing
Faculty of E languageTruongMinhThien.pdf
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
Transform Your Social Media, Grow Your Brand
25K Btc Enabled Cash App Accounts – Safe, Fast, Verified.pdf
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
Lesson 3: person and his/her relationship with the others NSTP 1
Mindfulness_and_Coping_Workshop in workplace
Does Ownership Structure Play an Important Role in the Banking Industry?
Your Breakthrough Starts Here Make Me Popular
Why Digital Marketing Matters in Today’s World Ask ChatGPT
Smart Card Face Mask detection soluiondr
Eric Starker - Social Media Portfolio - 2025

Protecting online data unit 1

  • 1. Protecting online data By callum baughen
  • 2. podcasts What is a podcast? A blog is a downloadable media file What are podcasts used for? To listen to someone you like while you on the move. How are podcasts different from blogs? You listen to podcast you don’t need to write anything
  • 3. wikis what is a wiki A wiki is a web page where people can add, delete or modify content What are wikis used for? Wikis are used to share information, tracking revision, archiving Information How are wikis different from blogs? Wikis are different form blogs because you don’t have a limit of text that you can send and also you can send pictures.
  • 4. blogs A blog is a personal page or web site. People can comment on your blog and post there views The bad thing is anyone can see it
  • 6. Video conferencing 6 ways to keep safe when video conferencing 1. Segment your network. 2. Understand how your system uses the network. 3. Be prepared for firewall failure. 4. Restrict the links between video conferencing systems and the VoIP network. 5. Have a business continuity plan 6. avoid weak passwords
  • 7. keeping Personal data online safe
  • 8. Storing personal information You should keep the information up to date You shouldn't give the information out to anyone You should keep all the information in the work place and not take it out Don’t use a weak password
  • 9. Safely viewing digital content • Make sure you upload it and then only allow certain people to view it and disable the people you don’t want see it • Don’t go to websites that you think are fake you could be right and that website could be a virus.
  • 10. Safely uploading digital content • When you upload somewhere you might not be able to delete it. • Never put your home address, mobile number, if you want people to contact you they should use a social media site. • Never upload a picture of you in your uniform if they see the badge or logo they can find where you live
  • 12. safety and security when setting up and using your blog • Whatever you post anyone can read it if you not set it to private • You need to password protection • Don’t allow people to comment on your post
  • 14. Firewalls • Firewalls blocks information coming in or coming out • Firewalls are good to keep viruses out • Never lose work to viruses • Fast and easily to download • Need to be up to date
  • 15. Backups We should back up because we don’t want to lose work so then we have to do it again. Many ways to back up you have memory sticks floppy disks Or even on the internet for example google.docs or drop box
  • 16. Secure sites. • you know when a website is secure because it has “https” this means Hyper Text Transfer Protocol with Secure Sockets. • If it is not secure it will say this HTTP so this is hyper text transfer protocol.
  • 17. • Blogs are effective communication channels because anyone can post there views • blogs can put peoples ideas together • If you get stuck on something you can get help from the blog by posting what you are stuck on.

Editor's Notes

  • #3: A podcast is a downloadable media file you can download this to anything you want for example if you want listen to your favouites artists podcast download it on to you iPod the podcast are used for to listen to someone you like while you are on the move and how are podcasts different frim blogs because you can listen to podcast you don’t write anything unlike a blog you rights your views.
  • #4: What is a wiki, a wiki is a web page where people can add , delete or modify content a wiki is used to share information, tracking revision and archiving information , wikis are different from blogs because wikis you don’t have a limit of text to send.
  • #5: A blog is a personal page or web page about a set of information where you can comment your thoughts and can link other sites to your blog. For example if you needed help with coding you can put it on you blog and other people commenting answering your question on what is wrong. The advantages of blogs would that you can write your own thoughts on the page, it is quick and easy to set up a page, it is quick and easy to update and add news post, people can write things on your page and if you want to read peoples comments on your page then you can you have lot to choose from. Disadvantages are whatever you publish anyone can see it and put bad things onto it, blogs may be biased, blogs are time consuming it is finding the time to write and update your blog, there are a lot of dull blogs around so it takes time to find one worth reading.
  • #7: The segment your network, you should use a different LAN and a firewall so then you can make sure the video conferencing traffic from the rest of the network. You need to understand how your system works with the network so then if something goes wrong you can sort it out and you need to be prepared if you firewall fails you need to know how to fix it as it fails, you need to restrict the link between video conferencing systems and the VoIP network so the point here is protect your conferencing form getting interacted by a VoIP call and then listening in. have a business continuity plan make sure you have a plan of attack in case someone attacks your public and private network so then u can close it down and keep them out and then tell people it is down. And lastly Avoid weak passwords if you have a weak password anyone can hack into you network and hack into your video conferencing and listen in and always change it and mixed it up by using numbers , letters and symbols
  • #9: You need to keep all your information up to date and you shouldn't give the information out to anyone, you should keep all the information in the work place and not take it out you should password protected it and don’t use a weak password, use capital, numbers and symbol.
  • #10: Make sure you upload it and then only allow certain people to view it and disable the people you don’t want too see it don’t go to webistes that you think are fake you could be right and It could have a virus.
  • #11: When you upload somewhere you could not be able to delete it. You should never put your home address, mobile number, if you want people to contact you they should use a socail media site, never upload a picture of you in your uniform if they see the badge or logo they can find where you live.
  • #12: The data protection regulations are fairly and lawfully processed and processed for limited purpose , adequate relevant and not excessive and accurate and not kept longer than necessary and processed in accordance with the data subjects rights , secure and not transferred to countrises outside the European Economic Area with same protection. The offences are punishable as follows: Offence 1. Up to 6 months' prison and up to £5,000 in fines. Offences 2 and 3. Up to 5 years in prison and any size of fine (there is no limit).
  • #13: Whatever you post anyone can read it if you do not set it to private , you will need to password protection and you should not allow people to comment on your post as they could post bad comments or abusive.
  • #15: Firewalls are good to keep virus out of your system so then all your data is safe and the virus won’t be able to get into the firewall, you will never lose work with a virus and it is easy and fast to download but it needs to be up to date so because new viruses are maked everyday and sent everyday
  • #16: We should back up because we don’t want to lose work so then we have to do it again you have many ways to back up you have memory sticks and floppy disk. You can even use the interent for example google.docs or drop box
  • #17: A secure sites is when a website is secure because has https this means hyper text transfer protocol with secure sockets and if it is not secure then it will say this http so this is hyper text transfer protocol.
  • #18: Blogs are effective communication channel for sharing information because anyone can post their views and blogs can put peoples ideas together and if you get stuck on something you can get help from the blog by posting what you are stuck on.