ICAICT103A

42
ICAICT103A Use, communicate and search securely in the internet

description

ICAICT103A. Use, communicate and search securely in the internet. Organisational Guidelines. Awareness of company policies on Internet access. Facebook. Facebook fun to use but be careful what you display for all eyes to see. Search Engines. What is a search engine? - PowerPoint PPT Presentation

Transcript of ICAICT103A

Page 1: ICAICT103A

ICAICT103AUse, communicate and search securely in

the internet

Page 2: ICAICT103A

Organisational Guidelines

Awareness of company policies on Internet access

Page 3: ICAICT103A

FacebookFacebook fun to use but be careful what you display for all eyes to see

Page 4: ICAICT103A

Search EnginesWhat is a search engine?

Search engines are programs that search documents for specified keywords.

Page 5: ICAICT103A

Appropriate key words

Keyword searches have a tough time distinguishing between words that are spelled the same way, but mean something different (i.e. hard cider, a hard stone, a hard exam, and the hard drive on your computer). This often results in hits that are completely irrelevant to your query.

Group words with pluses – hard+exam

Or group words in between talking marks “hard exam”

Practice using the + sign Hard+drive

Page 6: ICAICT103A

General HintsLearn how to use quotes or pluses - With most search engines, if you enter two words, say black holes, the engine will search for documents that contain either one of those words. Thus, you will get all documents containing black and all documents containing holes, which is probably not what you intended.So, instead of entering black holes, try entering "black holes" or black+holes.

Page 7: ICAICT103A

Site SearchSite search - The site search appears on the top right of every page on the site: This search works like Google and will bring up a list of all types of material on the DFID website when you type in some key words. Generally, all the words you put in the query will be used.

Page 9: ICAICT103A

Advanced SearchGoogle advanced search

http://www.google.com.au/advanced_search

Page 10: ICAICT103A

Googlehttp://www.google.com.au/

I’m feeling lucky

http://www.youtube.com/watch?v=5fvL3mNtl1g

Google privacy watch video

Page 11: ICAICT103A

How to delete history

Codes shared over the internet are called cookies

Cookies store bits of information of all the pages you have visited

Cookies can be exploited by hackers to attack your computers system

Open internet explorer, go to tools, go to internet options,

Page 12: ICAICT103A

Deleting History

Tick cookies and then delete

Page 13: ICAICT103A

Security SettingsGo to internet explorer

Tools Button, Internet Options

Press security

Then click and hold the security slider until you are happy with the security level

Page 14: ICAICT103A

Search ExpressionHow to save a web page Saved

on desktop

Page 15: ICAICT103A

BookmarksHow to make a bookmark in internet explorer

Add to favorites

Page 16: ICAICT103A

Bookmark FolderGo to your

Add to favorites

New folder

Page 17: ICAICT103A

Print a Web PagePrinting a web page

Open internet explorer

Find a web page

Select text you want to print

Select print from your ribbon

Page 18: ICAICT103A

Print a Web PageA dialog box will appear

Check the selection button

Select print

The selected text should

appear on the printed page

Page 19: ICAICT103A

Consumer SitesConsumer sites are web pages made specifically for buying products

Find these sites using your favorite search engine• Office Works• Bunnings

• K-Mart

Online forms

Page 20: ICAICT103A

TransactionsHow do your know when a transaction is safe

Trusted sites – well known sites can be trusted

Page 21: ICAICT103A

Online Transaction

Access an online transaction site

http://www.youtube.com/watch?v=v4osQ4oASjY

Page 22: ICAICT103A

SecurityWhen sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock () in the bottom right corner of your browser window or next to the address bar.If visible, this lock should also be in the locked position and not unlocked.

Page 23: ICAICT103A

SecurityWhile the lock is in the lock position, data is encrypted, which helps anyone from understanding the data it its intercepted . When no lock is visible or in the unlocked position all information is plaintext and can be read by anyone. Encrypted pages usually use log ins can you think of any sites that would use a log in.

Page 24: ICAICT103A

High Priority Pages

Log in pagesEncrypted pages

Page 25: ICAICT103A

CAPTCHAA CAPTCHA :

is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. Computer programs can access websites to retrieve data, as the CAPTCHA is a picture the computer cannot read.

Page 26: ICAICT103A

SecurityWe also suggest making sure the URL begins with https

You can also have a look at the URL: if it starts with “https://", you are on a secured page; if the URL starts with "http://", you're not.

Page 27: ICAICT103A

Boolean SearchWhat is Boolean Search?

Boolean searches allow you to combine words and phrases using the words AND, OR, NOT and NEAR (otherwise known as Boolean operators) to limit, widen, or define your search. Most Internet search engines and Web directories default to these Boolean search parameters anyway, but a good Web searcher should know how to use basic Boolean operators.

Page 28: ICAICT103A

Meta-Search ToolsA meta - search engine is a search tool that sends user request to several other search engines or databases and aggregates the result into a single list.

Page 29: ICAICT103A

SearchSearch your field of expertise and take note of the first site that comes up

Page 30: ICAICT103A

Virtual Community

A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interest or goals. Go to http://en.wikipedia.org/wiki/Virtual_community

Type in virtual community logos into your search engine then choose images and see what the result is

Page 31: ICAICT103A

Domain NameWhat is a Domain Name?

If you see the acronym DNS it means Domain Name System- A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the internet. Domain names are formed by the rules and procedures of the Domain Name System

Page 32: ICAICT103A

Domain Name Search

Search this Domain Name and tell me what it is.

http://bloggingpirate.wordpress.com/

Page 33: ICAICT103A

What is after the Dot

.com means - .com describes that a web site has some kind of "commercial" intent. This is what we call a "top level domain" address, and it used to be a way for a web site to convey its publishing intent..net means - .NET is "Top level domain originally for network providers”http://www.internetslang.com/.NET-meaning-definition.asp

Page 34: ICAICT103A

HistoryHow to check your internet history

Go to the favorites bar

Click on history

Page 35: ICAICT103A

Web Page ThreatsSmart screen filter

Go to internet explorerChoose toolsChoose smart screen filterA pop up dialog box

Page 36: ICAICT103A

SpamSpam email is not only a nuisance, it’s a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email to get a clueless victim to click on a link to a malicious website.

Page 37: ICAICT103A

What is a Trojan?A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is eg to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus.

Page 38: ICAICT103A

SpamSpammers will illegally buy lists of real people's email addresses.

Spammers will use "harvesting" programs that scour the Internet like Google, and copy any text that contains the "@" character.

Spammers will use "dictionary" (brute force) programs like hackers.

You will unwittingly volunteer your email address to dishonest subscribe/unsubscribe online services.

Page 39: ICAICT103A

Suspicious EmailBeware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.

Page 40: ICAICT103A

PhishingPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.

Page 41: ICAICT103A

USBUSB – stands for universal serial bus

A USB lying around an office may have harmful virus in its contents. If a USB is found it is best not to attach it to your computer