ONLINE SAFETY
online safety
ONLINE SAFETY
E N D
Presentation Transcript
Internet safety or online safety or cyber safety or E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime.
In the past, safety and security are all about protecting our computers from different types of virus attacks. Today, online safety and security have been a big issue because of the Internet's vast reach, constantly, and fast-changing technology. Nowadays, knowing online safety as well as security is indeed a must to protect one from numerous online hazards.
Online Safety It is also called cyber safety or digital safety which refers to practices and precautions one should observe when using the Internet.
Online Safety It is also commonly known as internet safety, e-safety, and cyber safety. It encompasses all technological devices which have access to the internet from PCs and laptops to smartphones and tablets.
Internet Security a very broad issue covering security in relation to transactions made over the Internet.
Internet Security Internet security is a branch of computer security specifically related to not only the Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole.
Ethics refers to a set of moral principles that govern an individual or a group on what is considered acceptable behavior while using a computer.
Netiquette means acceptable rules for online behavior.
Mobile Learning Mobile learning (m-learning) is education via the Internet or network using personal mobile devices, such as tablets and smartphones to obtain learning materials through mobile apps, social interactions, and online educational hubs.
Virtual Classroom may also be referred to as a digital classroom where learning takes place over the Internet and not in a physical Classroom
A virtual classroom has the following advantages: • Students are not limited to the courses available in their geography. • Learning is more interactive as its nature forces the student's attention.
It has the following disadvantages, however: • In the case of supervised classes, the schedule may be an issue for some students. • It is limited by the technological capacity of the student; those with slower hardware or Internet speeds are at a disadvantage.
Forum A place on the Internet where users with common interests interact with each other to find information and discuss topics.
Keyword a word or group of words that a person may use to search for in a search engine.
Search Engines Search engines are software systems that people go to search for things on the Internet. Examples of popular search engines are Yahoo!, Google, or bing.
Webinar refers to a "web seminar”. A webinar is a seminar conducted over the Internet making it possible to “virtually attend” through an Internet connection.
Wiki a site written, controlled, and edited by the users themselves.
Webpage The webpage is the page seen by the user when browsing the Internet. The webpage can be compared to a page in a magazine.
Webpage Uniform Resource Locators (URLs) - These are the specific addresses of the Internet pages and files.
E-Commerce is short for electronic commerce. The act of doing business transactions (selling and buying) online
Downloading is a term that generally applies to the transfer of data from the Internet to the computer or mobile device.
Firewall is a broad term used to describe a protective barrier against computer bugs or viruses.
Browser hijacking happens when malware or spyware replaces a web user's browser homepage that redirects the user to unwanted websites while capturing sensitive private data for personal or business gain.
Identity Theft happens when a criminal impersonates a user by stealing his or her personal information to withdraw money or pay for goods online.
Malware Malicious software that is intended to damage or disable computer systems that have codes to collect information without one's knowledge. Viruses, Trojan horses, worms, and the like are considered malware.
Pharming is a technique that redirects a legitimate website's traffic to an illegitimate website to gain access to a user's personal information.
Phishing is an e-mail or instant message scam which looks like an official message from a legitimate organization like a bank and credit card company that asks about one's personal information such as passwords and credit card details. Phishers (criminals who pretend to be a legitimate organization) are responsible for this kind of cybercrime.