internet security
TRANSCRIPT
![Page 1: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/1.jpg)
INTERNET SECURITY
THE IMPORTANCE OF INTERNET SECURITY AND HOW TO SECURE IT
By:
![Page 2: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/2.jpg)
WHAT IS INTERNET SECURITY?
• Involving the security for all data transaction made over the internet.
• Browser security (e.g. Chrome, Firefox) also under internet security.
![Page 3: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/3.jpg)
INTERNET IS NOT A SAFE PLACE
• “Man in the middle attack” by hackers during browsing the internet.
• The spreading of digital virus and malware.
![Page 4: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/4.jpg)
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)User browsing website like usual.
![Page 5: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/5.jpg)
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)Hacker gathering information from the user by capturing “network packets” from the data transferred between the user and website.
![Page 6: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/6.jpg)
MAN IN THE MIDDLE ATTACK (DEMONSTRATION)Hackers can get any private information from the captured data if the data is not encrypted.
![Page 7: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/7.jpg)
HOW TO SECURE YOUR INFORMATIONSTEPS TO BE TAKEN TO ENSURE THAT YOUR DATA AND PRIVACY STAY SAFE FROM UNAUTHORIZED ACCESS
![Page 8: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/8.jpg)
BE SMART WHEN USING INTERNET
• Make your private picture and video can only be view by people you trust
• Install security software or applications in your devices
![Page 9: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/9.jpg)
FOR AN EXAMPLE
Edited picture Original picture
![Page 10: Internet security](https://reader030.vdocuments.site/reader030/viewer/2022032513/55d2bbbfbb61eb612b8b465b/html5/thumbnails/10.jpg)
END OF SLIDE