Internet Security and Privacy By Globalscholars of Billabong High International School


E-Safety refers to safety while using the internet. It means to keep personal data safe and applies to all of the following devices:

  • mobile phone
  • computer or tablet
  • games online
  • wireless technology


It is important, because it is essential for protecting personal and business information. High-profile attacks allow hackers to steal credit and debit card information, damaging reputations and causing financial havoc for victims.

Internet Security and Privacy

Internet security is defined as a process to create rules and actions to take to protect against attacks over the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.


In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

Trojan Horse

Types of Threats

  • Malicious software.
  • Denial-of-service attacks.
  • Phishing.
  • Application vulnerabilities.
  • Trojan Horse. Trojan is one of the most complicated threats among all.
  • Virus.
  • Worms.
  • Spyware.
  • Scareware.
  • Keylogger.
  • Adware.
  • Backdoor.

Here are simple, but critical steps to protect your computer

  • Install Firewall.
  • Install Antivirus Software.
  • Install Anti-Spyware Software.
  • Use Complex and Secure Passwords.
  • Check on the Security Settings of the Browser.
  • Keep your software up to date.
  • Don't click on links within unknown emails.
  • Back up your computer.
  • Use a strong password.
  • Minimize downloads.
  • Use a pop-up blocker.


Hacking means to illegally access other people's computer systems in order to destroy, disrupt or carry out something illegal. Hacking is usually carried out remotely, that is someone outside a company wants to try to break into the computer system.

Here are some tips that can help you protect against cyber-attacks:

  • Make your password harder to hack.
  • Change your password regularly.
  • Clear your browser history.
  • Do not use free Wi-Fi.
  • Use HTTPS.
  • Watch what you click.
  • Try not to use public computers.
  • Use anti-virus protection.


Software designed to collect information about what you are doing on the computer. For example a 'key logger' is a type of spyware that monitors and stores a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. Used to harvest passwords.

Here's how to avoid unwanted spyware or adware:

  • Be selective about what you download to your computer. Make sure you really need a program before downloading it.
  • Read licensing agreements.
  • Watch out for anti-spyware scams.
  • Beware of clickable advertisements.
  • Don't click on links within pop-up windows - Because pop-up windows are often a product of spyware,


“Phishing” is a form of Internet fraud where criminals aim to steal valuable information such as credit cards, social security numbers, user IDs and passwords for bank accounts. They set up a fake website which looks identical to a legitimate company such as a bank or insurance company.

Prevention against Phishing

  • Guard against spam. Be especially cautious of emails that come from unrecognized senders.Ask you to confirm personal or financial information over the Internet and/or make urgent requests for this information.
  • Communicate personal information only via phone or secure web sites.
  • When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “https:” URL whereby the “s” stands for “secure” rather than a “http:”.
  • Also, beware of phone phishing schemes. Do not divulge personal information over the phone unless you initiate the call. Be cautious of emails that ask you to call a phone number to update your account information as well.
  • Do not click on links, download files or open attachments in emails from unknown senders. It is best to open attachments only when you are expecting them and know what they contain, even if you know the sender.
  • Never email personal or financial information, even if you are close with the recipient. You never know who may gain access to your email account, or to the person’s account to whom you are emailing.
  • Beware of pop-ups and follow these tips:
  • Never enter personal information in a pop-up screen.
  • Do not click on links in a pop-up screen.
  • Do not copy web addresses into your browser from pop-ups.
  • Legitimate enterprises should never ask you to submit personal information in pop-up screens, so don’t do it.
  • Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Update them all regularly to ensure that you are blocking from new viruses and spyware.
  • Check your online accounts and bank statements regularly to ensure that no unauthorized transactions have been made.
pop ups

Remember that you may be targeted almost anywhere online, so always keep an eye out for those “phishy” schemes.

Created By
Global Scholars Billabong

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a Copyright Violation, please follow Section 17 in the Terms of Use.