Risk of the Internet At Home

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Computer Security Keeping you and your computer safe in the digital world.
Cyber Security and Computer Safety
Internet Safety.
INTERNET SAFETY FOR EVERYONE
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Information Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Homeland Security: Computer Protection
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Computer Technology Notes 5
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
4 ways to stay safe online 1. Avoid viruses and phishing scams
Internet Safety for Everyone
Staying safe on the internet
Cyber Security and Computer Safety
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Bethesda Cybersecurity Club
Networking for Home and Small Businesses – Chapter 8
Internet Safety for Everyone
Internet Safety for Everyone
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Networking for Home and Small Businesses – Chapter 8
Lesson 2- Protecting Yourself Online
Test 3 review FTP & Cybersecurity
Internet Safety for Everyone
Internet Safety for Everyone
What devices use the internet?
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

Risk of the Internet At Home By Carlos Villa

Introduction Cybercriminals, predators, bullies, and corrupted businesses will attempt to reach out to a vulnerable individual if the opportunity arises. We as users must adapt and be attentive to where we put our information or insert our private and personal content at all times. We must be vigilant of the sites we visit and reassure not only ourselves but our family members in the same household to be aware of such websites as well as corrupted emails. It’s very easy for another family member to use your computer one night and click on a link that leads to a malicious site. Having no knowledge of cybersecurity could lead to your PC to be contaminated. The basis of this project is to teach the viewers the risk of the internet as well as the proper steps to take to avoid attack or compromises by a malicious attacker.

The Internet Is a global network of billions of computers and other electronic devices. With the Internet, it's possible to access almost any information, communicate with anyone else in the world, and do much more. Because the internet is so easily accessible to anyone, it can be a dangerous place as well. Know who you're dealing with or what you're getting into. Predators, cyber criminals, bullies, and corrupt businesses will try to take advantage of the unwary visitor. Understanding the basics as to what you can do in the Internet, where you can find it or whom you are are dealing with get something done. In the next few slides, we’ll see the risks of accessing the internet.

Risks The risks of the Internet can not only ruin your system with a virus, trojan, ransomware or information breach but it could also cause real life problems like cyberbullying, financial destruction or again, private information being leaked for data mining or blackmailing. Other risks could be the following: Botnets. Distributed denial-of-service (DDoS) Hacking. Malware. Pharming. Phishing. Ransomware. Spam

Most Common Risk at Home Botnet A collection of software robots, or 'bots', that creates an army of infected computers (known as ‘zombies') that are remotely controlled by the originator. Yours may be one of them and you may not even know it. Hacking Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities. Malware Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

How to avoid the risks we learned? Botnets It’s easier to prevent your computer from being infected and becoming part of a botnet in the first place than it is to detect it when it’s too late and try to save it. Don’t click on suspicious or unrecognized links Don’t download any unrequested attachments or files Get a quality antivirus to protect your system and files Updated all your security systems and softwares

How to avoid the risks we learned? Hacking Technically, everything that connects to the Internet can get hacked. But there are several things you can do to protect yourself and your data from an attack. Create complex passwords. Don’t share security information with anyone Use two-factor authentication Log out of accounts when using public systems

How to avoid the risks we learned? Malware Malware looks for weaknesses in the system, whether that’s an unprotected operating system, a software program that hasn’t been updated in months, or a browser whose security protocols aren’t up to date, for example: Internet Explorer, which is why most PC users use Chrome or Firefox. Update ALL: Operating System Browser Plugins Remove all unused softwares Be vigilant in regards to social engineering and unsecure emails Log out of website when done Practice safe browsing Use firewall, antivirus, anti-malware, and anti-exploit technology

Demonstration *Demonstration video provided on the MP4 file submitted on Blackboard.*

Conclusion Errors come from human, not machines. So as users, we should be on top of own security. Make sure any other user in your household is aware of what they can do, what they should touch as well as how to go about their task if they are using your system. Always update your passwords Always update softwares and anti-viruses Always update your browser, including deleting cookies/cache Always remind others to practice safe browsing Always log out when using another PC Remember that there are others out there trying to cause you harm Only trust safe and secure links “Once posted on the internet, it will never be deleted. So always think twice”