SlideShare una empresa de Scribd logo
1 de 4
Information TechnologyInformation Technology
Tyler GarrisonTyler Garrison
Professor JohnsonProfessor Johnson
ED 1023 – M1 – OnlineED 1023 – M1 – Online
Week 6Week 6
Internet Search ProcessInternet Search Process
1. Pick the best search tool such as: Bing, Google, Google Chrome, Mozilla
Firefox, or Internet Explorer.
2. Formulate the search query – putting in keywords or more words: God,
man, dog, history.
3. Perform the search – press the enter button/enter key.
4. Examine the search results – pick the best information needed for your
search.
5. Evaluate the credibility of the search results – double check to make sure
the information is valid and up to date.
Online Safety GuidelinesOnline Safety Guidelines
• Don’t post your every move.
• Only communicate with people you know
on a daily basis.
• Try not to get on them as much.
• Keep your contacts to a minimum.
• Avoid posting things that can ruin your
name or reputation.
• Finally, think before posting anything.
Wireless Network Security ThreatWireless Network Security Threat
• Lan Jacking - driving around with a laptop,
antenna, and wireless card searching for
unsecured wireless networks to access.
• Spoofing - hacker accessing a network to
create a fake Web site or sending mail
that looks as if coming from an internal
server.
• Rogue WLAN - hacker installing a
wireless router using a network resource
to expose network to security threats

Más contenido relacionado

La actualidad más candente

Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneHasani Jaali
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyKit O'Connell
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Social networking and internet security
Social networking and internet securitySocial networking and internet security
Social networking and internet securityFrank Brunke
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
 

La actualidad más candente (17)

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Users guide
Users guideUsers guide
Users guide
 
Toastmasters - Securing Your Smartphone
Toastmasters - Securing Your SmartphoneToastmasters - Securing Your Smartphone
Toastmasters - Securing Your Smartphone
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online Privacy
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Social networking and internet security
Social networking and internet securitySocial networking and internet security
Social networking and internet security
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer Security
 

Destacado

Information technology system powerpoint template
Information technology system powerpoint templateInformation technology system powerpoint template
Information technology system powerpoint templatehttp://www.slideworld.com/
 
Effective Communication With PowerPoint
Effective Communication With PowerPointEffective Communication With PowerPoint
Effective Communication With PowerPointLisasisco
 
Computer Animation PowerPoint
Computer Animation PowerPointComputer Animation PowerPoint
Computer Animation PowerPointoacore2
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power pointoacore2
 
New Technologies in our daily life
New Technologies in our daily lifeNew Technologies in our daily life
New Technologies in our daily lifeEcommaster.es
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society pptoacore
 
Advantages and Disadvantages of Technology
Advantages and Disadvantages of TechnologyAdvantages and Disadvantages of Technology
Advantages and Disadvantages of TechnologyPave Maris Cortez
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentationplandeen
 
advantages and disadvantages of technology
advantages and disadvantages of technologyadvantages and disadvantages of technology
advantages and disadvantages of technologypearlreanettedalisay
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationAnusorn Kansap
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentationsismailraesha
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?InterQuest Group
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Destacado (14)

Information technology system powerpoint template
Information technology system powerpoint templateInformation technology system powerpoint template
Information technology system powerpoint template
 
Li fi
Li fi Li fi
Li fi
 
Effective Communication With PowerPoint
Effective Communication With PowerPointEffective Communication With PowerPoint
Effective Communication With PowerPoint
 
Computer Animation PowerPoint
Computer Animation PowerPointComputer Animation PowerPoint
Computer Animation PowerPoint
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
 
New Technologies in our daily life
New Technologies in our daily lifeNew Technologies in our daily life
New Technologies in our daily life
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society ppt
 
Advantages and Disadvantages of Technology
Advantages and Disadvantages of TechnologyAdvantages and Disadvantages of Technology
Advantages and Disadvantages of Technology
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
advantages and disadvantages of technology
advantages and disadvantages of technologyadvantages and disadvantages of technology
advantages and disadvantages of technology
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar a Information technology powerpoint

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 

Similar a Information technology powerpoint (20)

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 

Information technology powerpoint

  • 1. Information TechnologyInformation Technology Tyler GarrisonTyler Garrison Professor JohnsonProfessor Johnson ED 1023 – M1 – OnlineED 1023 – M1 – Online Week 6Week 6
  • 2. Internet Search ProcessInternet Search Process 1. Pick the best search tool such as: Bing, Google, Google Chrome, Mozilla Firefox, or Internet Explorer. 2. Formulate the search query – putting in keywords or more words: God, man, dog, history. 3. Perform the search – press the enter button/enter key. 4. Examine the search results – pick the best information needed for your search. 5. Evaluate the credibility of the search results – double check to make sure the information is valid and up to date.
  • 3. Online Safety GuidelinesOnline Safety Guidelines • Don’t post your every move. • Only communicate with people you know on a daily basis. • Try not to get on them as much. • Keep your contacts to a minimum. • Avoid posting things that can ruin your name or reputation. • Finally, think before posting anything.
  • 4. Wireless Network Security ThreatWireless Network Security Threat • Lan Jacking - driving around with a laptop, antenna, and wireless card searching for unsecured wireless networks to access. • Spoofing - hacker accessing a network to create a fake Web site or sending mail that looks as if coming from an internal server. • Rogue WLAN - hacker installing a wireless router using a network resource to expose network to security threats