ICAICT103A
description
Transcript of ICAICT103A
ICAICT103AUse, communicate and search securely in
the internet
Organisational Guidelines
Awareness of company policies on Internet access
FacebookFacebook fun to use but be careful what you display for all eyes to see
Search EnginesWhat is a search engine?
Search engines are programs that search documents for specified keywords.
Appropriate key words
Keyword searches have a tough time distinguishing between words that are spelled the same way, but mean something different (i.e. hard cider, a hard stone, a hard exam, and the hard drive on your computer). This often results in hits that are completely irrelevant to your query.
Group words with pluses – hard+exam
Or group words in between talking marks “hard exam”
Practice using the + sign Hard+drive
General HintsLearn how to use quotes or pluses - With most search engines, if you enter two words, say black holes, the engine will search for documents that contain either one of those words. Thus, you will get all documents containing black and all documents containing holes, which is probably not what you intended.So, instead of entering black holes, try entering "black holes" or black+holes.
Site SearchSite search - The site search appears on the top right of every page on the site: This search works like Google and will bring up a list of all types of material on the DFID website when you type in some key words. Generally, all the words you put in the query will be used.
Advanced SearchTry these:
Google advanced search
Yahoo precise search
HotBot advanced search
Altavista advanced search
Advanced SearchGoogle advanced search
http://www.google.com.au/advanced_search
Googlehttp://www.google.com.au/
I’m feeling lucky
http://www.youtube.com/watch?v=5fvL3mNtl1g
Google privacy watch video
How to delete history
Codes shared over the internet are called cookies
Cookies store bits of information of all the pages you have visited
Cookies can be exploited by hackers to attack your computers system
Open internet explorer, go to tools, go to internet options,
Deleting History
Tick cookies and then delete
Security SettingsGo to internet explorer
Tools Button, Internet Options
Press security
Then click and hold the security slider until you are happy with the security level
Search ExpressionHow to save a web page Saved
on desktop
BookmarksHow to make a bookmark in internet explorer
Add to favorites
Bookmark FolderGo to your
Add to favorites
New folder
Print a Web PagePrinting a web page
Open internet explorer
Find a web page
Select text you want to print
Select print from your ribbon
Print a Web PageA dialog box will appear
Check the selection button
Select print
The selected text should
appear on the printed page
Consumer SitesConsumer sites are web pages made specifically for buying products
Find these sites using your favorite search engine• Office Works• Bunnings
• K-Mart
Online forms
TransactionsHow do your know when a transaction is safe
Trusted sites – well known sites can be trusted
Online Transaction
Access an online transaction site
http://www.youtube.com/watch?v=v4osQ4oASjY
SecurityWhen sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock () in the bottom right corner of your browser window or next to the address bar.If visible, this lock should also be in the locked position and not unlocked.
SecurityWhile the lock is in the lock position, data is encrypted, which helps anyone from understanding the data it its intercepted . When no lock is visible or in the unlocked position all information is plaintext and can be read by anyone. Encrypted pages usually use log ins can you think of any sites that would use a log in.
High Priority Pages
Log in pagesEncrypted pages
CAPTCHAA CAPTCHA :
is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. Computer programs can access websites to retrieve data, as the CAPTCHA is a picture the computer cannot read.
SecurityWe also suggest making sure the URL begins with https
You can also have a look at the URL: if it starts with “https://", you are on a secured page; if the URL starts with "http://", you're not.
Boolean SearchWhat is Boolean Search?
Boolean searches allow you to combine words and phrases using the words AND, OR, NOT and NEAR (otherwise known as Boolean operators) to limit, widen, or define your search. Most Internet search engines and Web directories default to these Boolean search parameters anyway, but a good Web searcher should know how to use basic Boolean operators.
Meta-Search ToolsA meta - search engine is a search tool that sends user request to several other search engines or databases and aggregates the result into a single list.
SearchSearch your field of expertise and take note of the first site that comes up
Virtual Community
A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interest or goals. Go to http://en.wikipedia.org/wiki/Virtual_community
Type in virtual community logos into your search engine then choose images and see what the result is
Domain NameWhat is a Domain Name?
If you see the acronym DNS it means Domain Name System- A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the internet. Domain names are formed by the rules and procedures of the Domain Name System
Domain Name Search
Search this Domain Name and tell me what it is.
http://bloggingpirate.wordpress.com/
What is after the Dot
.com means - .com describes that a web site has some kind of "commercial" intent. This is what we call a "top level domain" address, and it used to be a way for a web site to convey its publishing intent..net means - .NET is "Top level domain originally for network providers”http://www.internetslang.com/.NET-meaning-definition.asp
HistoryHow to check your internet history
Go to the favorites bar
Click on history
Web Page ThreatsSmart screen filter
Go to internet explorerChoose toolsChoose smart screen filterA pop up dialog box
SpamSpam email is not only a nuisance, it’s a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email to get a clueless victim to click on a link to a malicious website.
What is a Trojan?A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is eg to grant a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus.
SpamSpammers will illegally buy lists of real people's email addresses.
Spammers will use "harvesting" programs that scour the Internet like Google, and copy any text that contains the "@" character.
Spammers will use "dictionary" (brute force) programs like hackers.
You will unwittingly volunteer your email address to dishonest subscribe/unsubscribe online services.
Suspicious EmailBeware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.
PhishingPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.
USBUSB – stands for universal serial bus
A USB lying around an office may have harmful virus in its contents. If a USB is found it is best not to attach it to your computer
Bibliographyhttp://www.totallylocalhr.com/images/Computer.gif
http://jokesprank.com/blog/wp-content/uploads/2011/01/facebook-cartoon.gif
http://www.coseom.com/wp-content/uploads/Search-Engine-Optimization4.jpg
Webopedia
Wikipedia
http://techzyn.com/cgi-sys/suspendedpage.cgi
http://imagine.gsfc.nasa.gov/docs/ask_astro/web_search.html
http://www.computerhope.com/issues/ch000507.htm
About.com