How to protect yourself, your computer, and others on the internet

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Developed by Technology Services 1:1 Laptop Initiative
Part I: Making Good Online Choices
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
An Introduction to Phishing and Viruses
Protect Your Computer Against Harmful Attacks!
Internet Safety Vocabulary
Rules To Help You Navigate the Internet Safely
Presentation transcript:

How to protect yourself, your computer, and others on the internet Internet Safety How to protect yourself, your computer, and others on the internet http://www.thetechlabs.com/tech-news/internet-explorer-9-release-candidate/

Internet in society Communication Education Business Global Networking- communicate with people around the world through social networking sites, webcams, instant messaging, email, etc. Education Use the internet to spread information and help students learn Classes can be taken online Research information can be found online Business Online business management is available Businesses can sell merchandise online Online advertisement

Internet Security & Safety Internet Security is the use of software that helps protect your computer from harm. Internet Safety is habits and precautions that you can take to help protect your computer and your safety.

Internet risks Computer- can get infected with viruses, Trojans, worms, and spyware, which can all damage your computer and/or steal your personal information. Family- your privacy can be invaded and your family can be put in danger. Personal Information- criminals can steal your personal information and put you in financial distress.

Viruses WORMs A software program designed to invade your computer and copy, damage, or delete your data. A virus that needs no human interaction to infect a computer It must be executed before it can infect your computer. Worms spread through computer systems on their own You must activate the virus on your computer by visiting unprotected websites or downloading infected files.

A program used to track online activity Trojan Spyware A virus that pretends to be a helpful program while destroying your data, damaging your computer and stealing your personal information A program used to track online activity Once spyware has infected your computer, it can track your online path and your location

Cyber Bullies File Sharing Abuse Predators Disturbing Content Risks to children Cyber Bullies File Sharing Abuse Predators Disturbing Content Invasion of Privacy

Cyber Bullying is illegal Cyber bullies Cyber Bullies are online abusers who target and bully other through use of the internet Cyber Bullying is illegal

File sharing abuse File sharing abuse is the downloading of illegal content through use of the internet. (music, video, etc.) Like cyber bullying, this is a crime that is punishable by law.

predators An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. Be careful of giving out personal information. You never know who is on the other end.

Disturbing content If unsupervised, children may stumble upon disturbing content that you probably don’t want them to see.

Invasion of privacy Children can unknowingly give away personal information that thieves can use to invade your other personal information.

Online safety RISKS Identity Theft Phishing Hoaxes Spam

Identity Theft Criminals can get your personal information through the internet. If you are asked to give out personal information over the internet or phone, for example by your credit card company, check with your credit company by calling and confirming that they need your information. After your information is stolen, thieves use it to open other accounts that ruin your finances and credibility.

Phishing Criminals often pose as trustworthy entities that request money or information from your account. They send emails requesting usernames, passwords, and other account information.

Hoaxes Hoaxes are tricks that usually ask for money in return for a fraudulent prize They usually say things such as “You’ve Won!” or “You’re the 100th Winner!”

SPAM Spam is the same email that is sent to massive numbers of people, usually advertisements.

How to protect Your Life Protecting your computer Protecting your family Protecting your personal information

Protecting your computer Keep updated with the latest firewall and antivirus software. Stay away from unknown sites that you are not familiar with. Research them and ensure that they are legitimate before visiting.

Protecting yourself Never respond to any email or message that asks for information and has a sense of urgency. Urgency is a clear giveaway of criminal activity. Check to see if the messages addresses you personally. This is another hint of internet fraud.

Protecting your family Be sure that your family knows the risks and dangers of the internet. Be sure that you and they know what not to do and safe steps to take on the internet.

Backing up your files

Backing up your files Backing up your files means that you keep multiple copies of them, so if one gets damaged or lost, you still have it saved in another place.

Where to back up files 3 Backups Have 3 backup files so that if one gets lost or infected, you wont be at a total loss. Keep one backup away from your original access point It always helps to have a backup

How to back up your files DO NOT back up files on a thumb drive They are meant for convenience, not permanent storage Save files in different locations to avoid a total loss if file trouble occurs

Children's online safety A message to parents Setting rules Protecting information

Setting clear rules Setting clear rules is the first step to leading your child on a safe journey through the internet. Set rules such as internet usage times and sites that shouldn’t be visited.

Keeping your information safe Be sure that your children know not to talk to anyone that they meet on the computer, and not to give out information such as their address.

Internet Privacy settings Keeping safe from PREDATORS

Privacy settings Always have secure privacy settings on any account that you have. Any personal information on your account can be viewed by anyone in the world without proper privacy settings.

PRIVACY ON FACEBOOK To set privacy settings on Facebook, log into your account from the home screen

Privacy settings on Facebook Once you are signed in, scroll to the bottom screen and click the privacy link

PRIVACY SETTINGS Once the link is clicked, the privacy settings options page should be displayed. Read the links to find which privacy settings you want to change. The stricter the settings, the better protected you are.

PRIVACY SETTINGS CONTINUED From the previous screen, click the first link titled “Information we receive and how it is used”. This will take you to steps and information you need to learn about how the public views your personal information.