Name Job Title Library Name

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SPYWARE Presented by The State Security Office November 17, 2004.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Free Software Alternatives: Avast! Anti-virus
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
W elcome to our Presentation. Presentation Topic Virus.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
E-safety Technical Advice for Parents Nick Hockin Information Manager, Priory School.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Lecture-16(B) Taking Protective Measures
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Risk of the Internet At Home
Internet Safety for Everyone
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Connecting Remotely Winter 2014.
Internet Safety for Everyone
How to Stay Safe Online Rollie Edwards.
Internet Safety for Everyone
Internet Safety for Everyone
Introduction-Cyber Safety
Presentation transcript:

Name Job Title Library Name Cybersecurity Basics Name Job Title Library Name

Agenda What’s a Virus? Antivirus Software Web Browsers Passwords Safe Internet Use Buying online Updating Backup

Searching through ads What’s a Virus?

A malicious set of code meant to harm you and/or your computer What is a Virus? A malicious set of code meant to harm you and/or your computer How can my computer become infected? Emails from infected computers Downloads Bad websites Clicking dangerous popups source: for list of virus types http://computer.howstuffworks.com/virus.htm USE DEFINITION OF VIRUS AND EXAMPLES – HD (Changed this part up a bit. Viruses are on the next two pages PS)

A Virus Can… Record your keyboard strokes (Spyware) Steal private information such as passwords, credit card numbers, etc. (Spyware) Hold your files hostage (Ransomware)

A Virus Can… Use your processing power and internet for nefarious purposes (Worm) Masquerade as a normal program which then installs a virus (Trojan Horse) Cause your computer to malfunction, crash and become non-responsive (Malware)

Searching through ads Antivirus Software

Free Antivirus Software Windows Defender Avira Consumer Reports pick 2016! AVG Windows Defender is built into Windows 8 and up Panda Security

Subscription Antivirus Software Kaspersky: Top rated by most reviews! Bitdefender Plus Norton USE ON HANDOUT McAfee

Secondary Defense Software Malwarebytes Spybot USE ON HANDOUT Microsoft Malicious Software Removal Tool

Firewalls What is a Firewall? A program that monitors and blocks bad traffic attempting to hack your computer. Do I have already have a Firewall? Windows Firewall Built into antivirus software Use on Handout

Searching through ads Web Browsers

Safest Web Browsers Google Chrome Fire Fox Windows Edge & Safari (mac only) Opera Based off of security tests and reviews http://www.browserscope.org/ http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/ USE ON HD – ICONS – SEE COMPUTER MAINTENANCE BASICS

Browser Extensions for Privacy Adblock Plus Disconnect Ghostery *sells your anonymized data to ad companies

Searching through ads Passwords

Passwords Create a Strong Password Use a minimum of 8 characters Use a long string of words Add numbers & symbols (IE: !@#$) Use Upper and Lowercase letters 4Exampl3: Thi$wou!dbeGood Dogs&cAtsrocK! 2Fast2cAtch!? USE ON HD

Passwords Best Password Practices Never use the same password for multiple accounts Save your passwords on paper rather than on the computer Avoid letting your browser save passwords

Searching through ads Safe Internet Use

Safe Internet Use Question to consider before proceeding Is this a well know site? Have I used this site safely before? Does this site make me feel uncomfortable? Is this site asking for things I don’t want to share? Do I have a reason to trust this site?

Safe Internet Use Only download from official company websites Do not click on popups Only give out private information to a trusted site Avoid clicking on strange links or advertisements If it sounds too good to be true it probably is

Browser Blocking Tools

Safe Internet Use https://www.google.com/transparencyreport/safebrowsing/diagnostic/

Safe Email Use Only click on links or download files from trusted emails Beware of hacked messages from “friends” Delete emails asking for personal information Google text of sketchy emails to check for scams

Safe Email Use https://www.consumer.ftc.gov/scam-alerts Get emails alerts and check on the latest Scams

2-Step Verification Increases your security by texting you a code to access your account Greatly increases security of any account You know if your account was hacked right away

Safe Email Use Marking an Email as Spam Select the email USE ON HD Select the email Mark it as spam

Safe Email Use Spam Filters

Searching through ads Purchasing Online

Purchasing Online Use an electronic payment system for higher security. It is safer to keep your credit card information in one place. PayPal Apple Pay Google Wallet

Safe Internet Use www.scamadviser.com

2-Step Authentication Use credit cards with two step authentication for highest security Credit cards with 2 step authentication Chase Discover Citibank Bank of America Charles Schwab

Searching through ads Updating

Updating Avoid using unsupported Operating system (example: Windows XP, Windows Vista, Mac OS X Leopard) Upgrade to the newest operating system available for your device when possible Update your apps or programs when notified Set up automatic updates

Searching through ads Privacy

For the best privacy use a VPN Privacy VPNs For the best privacy use a VPN What is a VPN? Stands for Virtual Private Network Encrypts your internet Data Private web browsing, downloading, and uploading Almost impossible to be tracked

Advanced VPNs Opera developer browser has a free VPN built in Total VPN (Free) Cyber Ghost VPN (Free) Tunnel Bear (Free) Total VPN paid version $4.99 per month Private Internet Access VPN $6.95 per month Nord VPN $8 per month

Private search engines DuckDuckgo.com Ixquick.com These search engines do not… Track your browsing info Save your searches No ad targeting No bias search results

Private Web Browser Tor browser www.torproject.org Prevents tracking Creates an anonymous browsing experience

Questions? THANKS FOR COMING!